Skip to main content
Log in

An image encryption algorithm based on irregular wave representation

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

For a gray image, every row (column) can be seen as an irregular wave. Activated by the architecture of permutation-diffusion based image encryption scheme, a chaotic image encryption algorithm is proposed to change the representation of irregular waves in the plain-image. To reduce the high correlation, permutation for both rows and columns is taken in the first stage. Due to the transposition of pixels in row/column, wave shapes will be changed according to the pseudo-random sequences generated from chaotic map. Specifically, pixels in each wave (row or column) are divided into two groups by energy (a bigger one and a smaller one). Then different groups are employed to manipulate the production of chaotic sequence. As a result, the chosen-plaintext and known-plaintext attacks will be difficult due to the plain-image dependent keystream. In the second stage, wave-by-wave diffusion in column is carried out such that any tiny change in the plain-image spreads out uniformly to the whole cipher-image. The keystream used in diffusion is designed again dependent on the permuted image obtained from the first stage. In this way, the security of the proposed algorithm can be further strengthened compared with some existing algorithms. Related security analyses also show that our method can satisfy common requirements of secure communication for daily images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Alvarez G, Li SJ (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcation Chaos 16:2129–2151

    Article  MathSciNet  MATH  Google Scholar 

  2. Chai XL, Gan ZH, Lu Y, Zhang MH, Chen YR (2016) A novel color image encryption algorithm based on genetic recombination and the four-dimensional memristive hyperchaotic system. Chin Phys B 25: . Article ID 100503, 10.1088/1674-1056/25/10/100503

  3. Chen JX, Zhu ZL, Fu C, Yu H, Zhang YS (2015) Reusing the permutation matrix dynamically for efficient image cryptographic algorithm. Signal Process 111:294–307

    Article  Google Scholar 

  4. Chiou GH, Chen WT (1989) Secure broadcasting using the secure lock. IEEE Trans Softw Eng 15:929–934

    Article  Google Scholar 

  5. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8:1259–1284

    Article  MathSciNet  MATH  Google Scholar 

  6. Fu ZJ, Sun XM, Liu Q, Zhou L, Shu JG (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun E98-B:190–200

    Article  Google Scholar 

  7. Fouda JSAE, Effa JY, Sabat SL, Ali M (2014) A fast chaotic block cipher for image encryption. Commun Nonlinear Sci Numer Simul 9:578–588

    Article  MathSciNet  Google Scholar 

  8. Ghebleh M, Kanso A, Noura H (2014) An image encryption scheme based on irregularly decimated chaotic maps. Signal Process: Image Commun 29:618–627

    Google Scholar 

  9. Guesmi R, Farah MAB, Kachouri A, Samet M (2016) A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2. Nonlinear Dyn 83:1123–1136

    Article  MathSciNet  MATH  Google Scholar 

  10. Hénon M (1976) A two-dimensional mapping with a strange attractor. Commun Math Phys 50:69–77

    Article  MathSciNet  MATH  Google Scholar 

  11. Hua ZY, Zhou YC (2016) Image encryption using 2D Logistic-adjusted-Sine map. Inf Sci 339:237–253

    Article  Google Scholar 

  12. Lian SG, Sun JS, Wang Z (2005) Security analysis of a chaos-based image encryption algorithm. Phys A: Stat Mech Appl 351:645–661

    Article  Google Scholar 

  13. Li CQ, Li SJ, Chen GR, Halang WA (2009) Cryptanalysis of an image encryption scheme based on a compound chaotic sequence. Image Vis Comput 27:1035–1039

    Article  Google Scholar 

  14. Liu LL, Zhang Q, Wei XP (2012) A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38:1240–1248

    Article  Google Scholar 

  15. Liu HJ, Kadir A (2015) Asymmetric color image encryption scheme using 2D discrete-time map. Signal Process 113:104–112

    Article  Google Scholar 

  16. Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn 67:557–566

    Article  MathSciNet  Google Scholar 

  17. Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71:1469–1497

    Article  Google Scholar 

  18. Özkaynak F, Özer AB, Yavuz S (2012) Cryptanalysis of a novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285:4946–4948

    Article  Google Scholar 

  19. Patidar V, Pareek NK, Purohit G, Sud KK (2011) A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Opt Commun 284:4331–4339

    Article  Google Scholar 

  20. Parvin Z, Seyedarabi H, Shamsi M (2016) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimed Tools Appl 75:10631–10648

    Article  Google Scholar 

  21. Qin C, Zhang XP (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164

    Article  Google Scholar 

  22. Rostami MJ, Saryazdi S, Nezamabadi-pour H, Shahba A (2016) Chaos-based image encryption using sum operation modulo 4 and 256. IETE J Res 62:179–188

    Article  Google Scholar 

  23. Shannon CE (1949) Communication theory of secrecy system. Bell Syst Tech J 28:656–715

    Article  MathSciNet  MATH  Google Scholar 

  24. Tong XJ, Zhang M, Wang Z, Liu Y, Xu H, Ma J (2015) A fast encryption algorithm of color image based on four-dimensional chaotic system. J Vis Commun Image Represent 33:219–234

    Article  Google Scholar 

  25. Wang Y, Lei P, Yang HQ, Cao HY (2015) Security analysis on a color image encryption based on DNA encoding and chaos map. Comput Electr Eng 46:433–446

    Article  Google Scholar 

  26. Wang XY, Liu LT (2013) Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos. Nonlinear Dyn 73:795–800

    Article  MathSciNet  MATH  Google Scholar 

  27. Wang LY, Song HJ, Liu P (2016) A novel hybrid color image encryption algorithm using two complex chaotic systems. Opt Lasers Eng 77:118–125

    Article  Google Scholar 

  28. Xia ZH, Wang XH, Sun XM, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27:340–352

    Article  Google Scholar 

  29. Yang YG, Pan QX, Sun SJ, Xu P (2015) Novel image encryption based on quantum walks. Sci Rep 5: . Article Number 7784

  30. Ye GD (2010) Another constructed chaotic image encryption scheme based on Toeplitz matrix and Hankel matrix. Fundam Inf 101:321–333

    MathSciNet  MATH  Google Scholar 

  31. Ye GD, Zhou JW (2014) A block chaotic image encryption scheme based on self-adaptive modeling. Appl Soft Comput 22:351–357

  32. Zhang YS, Xiao D, Shu YL, Li J (2013) A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations. Signal Process: Image Commun 28:292–300

    Google Scholar 

  33. Zhang XP, Zhao ZM (2014) Chaos-based image encryption with total shuffling and bidirectional diffusion. Nonlinear Dyn 75:319–330

    Article  Google Scholar 

  34. Zhang LY, Hu XB, Liu YS, Wong KW, Gan J (2014) A chaotic image encryption scheme owning temp-value feedback. Commun Nonlinear Sci Numer Simul 19:3653–3659

    Article  MathSciNet  Google Scholar 

  35. Zhang W, Wong KW, Yu H, Zhu ZL (2013) A symmetric color image encryption algorithm using the intrinsic features of bit distributions. Commun Nonlinear Sci Numer Simul 18:584–600

    Article  MathSciNet  MATH  Google Scholar 

  36. Zhang Q, Guo L, Wei XP (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Modell 52:2028–2035

    Article  MathSciNet  MATH  Google Scholar 

  37. Zhou NR, Zhang AD, Zheng F, Gong LH (2014) Novel image compression-encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Opt Laser Technol 62:152–160

    Article  Google Scholar 

  38. Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181:1171–1186

    Article  Google Scholar 

Download references

Acknowledgments

The work described in this paper was fully supported by the National Natural Science Foundations of China (No.61602124, No.11526057, No.11301091), the Natural Science Foundations of Guangdong Province of China (No.2016A030310333, No.2015A030313614, No.2015A030313620), the Science & Technology Planning Projects of Zhanjiang City of China (No.2015B01098, No.2015B01051), the Program for Scientific Research Start-up Funds of Guangdong Ocean University of China, and the Special Funding Program for Excellent Young Scholars of Guangdong Ocean University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guodong Ye.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, X., Ye, G. An image encryption algorithm based on irregular wave representation. Multimed Tools Appl 77, 2611–2628 (2018). https://doi.org/10.1007/s11042-017-4455-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4455-x

Keywords

Navigation