Skip to main content
Log in

A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a novel algorithm for image encryption based on the hyper-chaotic system is proposed. In order to generate the initial conditions of the hyper-chaotic system, 256-bit long external secret key is used. The algorithm consists of three main sections. In the first section, instead of encrypting each pixel, the rows and columns of the image are encrypted using a row-column algorithm. In order to reach higher sensitivity, higher complexity and higher security, the second section employs masking process which is applied to each quarter of the image (i.e. sub-images) that is to be encrypted, using that sub-image data itself and one of the other sub-images and the average data of other quarters of image. Finally in the last diffusion section, the four most significant bit planes will be encrypted. Experimental results and performance analysis prove the viability of this cryptography based on privacy, integrity and authenticity. It is demonstrated that 2D Correlation Coefficients (CC), Mean Absolute Error (MAE), Encryption Quality (EQ), Mean Square Error (MSE), Peak Signal-to-Noise Ratio (PSNR), the Number of Pixel Change Rate (NPCR), the Unified Average Changing Intensity (UACI), entropy and decryption quality can satisfy security and performance requirements (CC < 0.0032, MAE > 80, EQ > 210.90, MSE > 9555, PSNR < 8.3875, NPCR > 99.61243%, UACI > 33.47573% and Entropy > 7.99734). It can be seen that this algorithm yields better security performance in comparison to the results obtained from other algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. J Signal Process 90:2714–2722

    Article  MATH  Google Scholar 

  2. Huang CK, Liao CW, Hsu SL, Jeng YC (2011) Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommun Syst. doi:10.1007/s11235-011-9461-0

    Google Scholar 

  3. Fridrich J (1997) Image encryption based on chaotic maps. IEEE Conf Comput Cybern Simul 2:1105–1110

    Google Scholar 

  4. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. J Chaos Solitons Fractals 21:749–761

    Article  MATH  MathSciNet  Google Scholar 

  5. Mao Y, Chen G, Lian S (2004) A novel fast image encryption scheme based on 3D chaotic baker maps. Int J Bifurc Chaos 14(10):3613–3624

    Article  MATH  MathSciNet  Google Scholar 

  6. Wang Y, Wong KW, Liao X, Xiang T, Chen G (2009) A chaos-based image encryption algorithm with variable control parameters. J Chaos Solitons Fractals 41:1773–1783

    Article  MATH  Google Scholar 

  7. Mazloom S, Eftekhari-Moghadam AM (2009) Color image encryption based on coupled nonlinear chaotic map. J Chaos Solitons Fractals 42:1745–1754

    Article  MATH  Google Scholar 

  8. Akhshani A, Behnia S, Akhavan A, Hassan HA, Hassan Z (2010) A novel scheme for image encryption based on 2D piecewise chaotic maps. J Opt Commun 283:3259–3266

    Article  Google Scholar 

  9. Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two dimensional piecewise chaotic map. J Signal Process 92:1202–1215

    Article  Google Scholar 

  10. Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel Sub-image encryption with hyper chaos. J Nonlinear Dyn 67(1):557–566

    Article  MathSciNet  Google Scholar 

  11. Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. J Opt Commun 285:29–37

    Article  Google Scholar 

  12. Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290–299

    Article  Google Scholar 

  13. Yen JC, Guo JI (2000) A new chaotic key-based design for image encryption and decryption. Proc IEEE Int Conf Circ Syst 4:49–52

    Google Scholar 

  14. Li S, Zheng X (2002) Cryptanalysis of a chaotic image encryption method. Proc IEEE Symp Circ Syst 2:708–711

    Google Scholar 

  15. Belkhouche F, Qidwai U (2003) Binary image encoding using one-dimensional chaotic map. Proc IEEE Annu Techical Conf :39–43

  16. Lian S, Sun J, Wang Z (2005) Security analysis of a chaos-based image encryption algorithm. Physica A 351:645–661

    Article  Google Scholar 

  17. Li C, Li S, Asim M, Nunez J, Alvarez G, Chen G (2009) On the security defects of an image encryption scheme. J Image Vision Comput 27(9):1371–1381

    Article  Google Scholar 

  18. Nian-Sheng L (2011) Pseudo-randomness and complexity of binary sequences generated by the chaotic system. J Commun Nonlinear Sci Numer Simul 16:761–768

    Article  MATH  MathSciNet  Google Scholar 

  19. Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372:394–400

    Article  MATH  Google Scholar 

  20. Rhouma R, Belghith S (2008) Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys Lett A 372:5973–5978

    Article  MATH  Google Scholar 

  21. Ge X, Liu F, Lu B, Yang C (2010) Improvement of Rhouma’s attacks on Gao algorithm. J Phys Lett A 374:1362–1367

    Article  MATH  Google Scholar 

  22. Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. J Opt Commun 284:2775–2780

    Article  Google Scholar 

  23. Akhavan A, Samsudin A, Akhshani A (2011) A symmetric image encryption scheme based on combination of nonlinear chaotic maps. J Frankl Inst 348:1797–1813

    Article  MathSciNet  Google Scholar 

  24. Sun F, Liu S, Li Z, Lu Z (2008) A novel image encryption scheme based on spatial chaos map. J Chaos Solitons Fractals 38:631–640

    Article  MATH  MathSciNet  Google Scholar 

  25. Kwok HS, Tang WKS (2007) A fast image encryption system based on chaotic maps with finite precision representation, Chaos Solitons Fractals 32:1518–1529

    Article  MATH  MathSciNet  Google Scholar 

  26. Borujeni SE, Eshghi M (2011) Chaotic image encryption system using phase-magnitude transformation and pixel substitution. J Telecommun Syst. doi:10.1007/s11235-011-9458-8

    Google Scholar 

  27. Rössler OE (1976) An equation for continuous chaos original research article, Phys Lett A 57(5):397–398

    Article  Google Scholar 

  28. Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2012) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl. doi:10.1007/s11042-012-1292-9

    Google Scholar 

  29. Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2013) A novel image encryption based on hash function with only two-round diffusion process. Multimedia Systems. doi:10.1007/s00530-013-0314-4

    Google Scholar 

  30. Behnia S, Akhshani A, Ahadpour S, Mahmodi H, Akhavan A (2007) A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. J Phys Lett A 366:391–396

    Article  Google Scholar 

  31. Khanzadi H, Omam MA, Lotfifar F, Eshghi M (2010) Image encryption based on gyrator transform using chaotic maps. IEEE Conf Signal Process :2608–2612

  32. Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. J Math Comput Model 52:2028–2035

    Article  MATH  MathSciNet  Google Scholar 

  33. Zhong Z, Chang J, Shan M, Hao B (2012) Double image encryption using double pixel scrambling and random phase encoding, J Opt Commun 285:584–588

    Article  Google Scholar 

  34. El-Latif AAA, Li L, Niu X (2012) A New image encryption scheme based on cyclic elliptic curve and chaotic system. Multimed Tool Appl. doi:10.1007/s11042-012-1173-2

    Google Scholar 

  35. Sam IS, Devaraj P, Bhuvaneswaran RS (2012) A novel image cipher based on mixed transformed logistic maps. Multimed Tool Appl 56:315–330. doi:10.1007/s11042-010-0652-6

    Article  Google Scholar 

  36. Taneja N, Raman B, Gupta I (2012) Combinational domain encryption for still visual data. Multimed Tool Appl 59:775–793. doi:10.1007/s11042-011-0775-4

    Article  Google Scholar 

  37. Wang K, Pei, Zou L, Song A, He Z (2005) On the security of 3D Cat map based symmetric image encryption scheme. Phys Lett A 343(6):432–439

    Article  MATH  Google Scholar 

  38. Lian S (2009) Efficient image or video encryption based on spatiotemporal chaos system. Chaos, Solitons Fractals 40:2509–2519

    Article  MATH  Google Scholar 

  39. Rhouma R, Belghith S (2008) Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem. Phys Lett A 372:5790–5794

    Article  MATH  Google Scholar 

  40. Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24:926–934

    Article  Google Scholar 

  41. Li C, Li S, Asim M, Nunez J, Alvarez G, Chen G (2009) On the security defects of an image encryption scheme. Image Vis Comput 27:1371–1381

    Article  Google Scholar 

  42. Patidar V, Pareek NK, Sud KK (2009) A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14:3056–3075

    Article  Google Scholar 

  43. Rhouma R, Solak E, Belghith S (2010) Cryptanalysis of a new substitution–diffusion based image cipher. Commun Nonlinear Sci Numer Simul 15:1887–1892

    Article  MATH  MathSciNet  Google Scholar 

  44. Patidar V, Pareek NK, Purohit G, Sud KK (2010) Modified substitution-diffusion image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 15:2755–2765

    Article  MATH  MathSciNet  Google Scholar 

  45. Li C, Li S, Lo K-T (2011) Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 16:837–843

    Article  MATH  MathSciNet  Google Scholar 

  46. Wang X, Liu L (2013) Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos. Nonlinear Dyn 73:795–800

    Article  MATH  Google Scholar 

  47. Zhu C, Liao C, Deng X (2013) Breaking and improving an image encryption scheme based on total shuffling scheme. Nonlinear Dyn 71:25–34

    Article  MathSciNet  Google Scholar 

  48. Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62(3):615–621

    Article  MATH  Google Scholar 

  49. Zhang Y, Li C, Li Q, Zhang D, Shu S (2012) Breaking a chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 69:1091–1096

    Article  MATH  MathSciNet  Google Scholar 

  50. Li C, Liu Y, Xie T, Chen M (2013) Breaking a novel image encryption scheme based on improved hyperchaotic sequences. Nonlinear Dyn. doi:10.1007/s11071-013-0924-6

    MathSciNet  Google Scholar 

  51. Ye G, Wong K-W (2013) An image encryption scheme based on time-delay and hyperchaotic system. Nonlinear Dyn 71:259–267

    Article  MathSciNet  Google Scholar 

  52. Huang X, Ye G (2013) An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed Tools Appl. doi:10.1007/s11042-012-1331-6

    Google Scholar 

  53. Liu F, Koenig H (2012) Puzzle - an efficient, compression independent video encryption algorithm. Multimed Tools Appl. doi:10.1007/s11042-012-1185-y

    Google Scholar 

  54. Amin M, Faragallah OS, El-Latif AAA (2010) A chaotic block cipher algorithm for image cryptosystems. J Commun Nonlinear Sci Numer Simul 15(11):3484–3497

    Article  MATH  Google Scholar 

  55. Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a Bit-level permutation. J Inform Sci 181:1171–1186

    Article  Google Scholar 

  56. Gao T, Chen Z (2008) Image encryption based on a new total shuffling algorithm. J Chaos Solitons Fractals 38:213–220

    Article  MATH  MathSciNet  Google Scholar 

  57. Huang R, Rhee KH, Uchida S (2012) A parallel image encryption method based on compressive sensing. Multimed Tools Appl. doi:10.1007/s11042-012-1337-0

    Google Scholar 

Download references

Acknowledgments

The authors would like to thank the Editor, the anonymous Referees, and Miss Shirin Saberian for their valuable comments and suggestions to improve this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Benyamin Norouzi.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Norouzi, B., Seyedzadeh, S.M., Mirzakuchaki, S. et al. A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed Tools Appl 74, 781–811 (2015). https://doi.org/10.1007/s11042-013-1699-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-013-1699-y

Keywords

Navigation