Abstract
To overcome the challenges encountered in chaotic image encryption system, such as dynamic degradation, weak security, and low encryption efficiency, this paper proposes a new image encryption algorithm. In terms of key generation method, a roulette wheel selection algorithm is designed, which effectively reduces dynamic degradation. In pixel coding, a linear congruence pixel transformation method is proposed, which enhances the security of pixel transform. In the overall layout of the encryption algorithm, the substitution-permutation-substitution structure is adopted. Under the joint action of various aspects, encryption efficiency is improved while security of our proposed encryption algorithm is guaranteed. Additionally, during design, the motivation of each part of the algorithm is explained. Theoretical analysis and experimental results show our proposed algorithm has a good application prospect.
Similar content being viewed by others
References
Cao GH, Zhou J, Zhang YZ (2014) Quantum chaotic image encryption with one time running key. Int J Secur Appl 8(4):77–88
Cui JS, Liu Y, Xu YD, Zhao HJ, Zhang HB (2013) Tracking generic human motion via fusion of low-and high-dimensional approaches. IEEE Trans Syst Man Cybern Syst Hum 43(4):996–1002
Deng YS, Hu HP, Xiong NX (2015) A general hybrid model for chaos robust synchronization and degradation reduction. Inf Sci 305:146–164
Heidari-Bateni G, McGillem CD (1994) A chaotic direct-sequence spread-spectrum communication system. IEEE Trans Commun 42(2/3/4):1524–1527
Hu HP, Xu Y, Zhu ZQ (2008) A method of improving the properties of digital chaotic system. Chaos, Solitons Fractals 38:439–446
Hua Z, Zhou Y, Pun CM (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80–94
Li C, Chen G (2008) On the security of a class of image encryption schemes. In: IEEE international symposium on circuits and systems (ISCAS 2008) pp 3290–3293
Li S, Mou X, Cai Y, Ji Z, Zhang J (2003) On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision. Comput Phys Commun 153:52–58
Li SJ, Chen GR, Mou XQ (2005) On the dynamical degradation of digital piecewise linear chaotic maps. Int J Bifurcation Chaos 15(10):3119–3151
Li H, Yang Z, Zhang YM, Wen BC (2011) Methodology of estimating the embedding dimension in chaos time series based on the prediction performance of radial basis function neural networks. Acta Phys Sin 60(7):070502–070506
Li CQ, Liu YS, Zhang L (2013) Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation. Int J Bifurcation Chaos 23(4):1350075(1-12)
Li X, Ma J, Wang WD, Xiong YP, Zhang JS (2013) A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Math Comput Model 58:85–95
Liao X, Guo SJ, Yin JJ, Wang H, Li X, Sangaiah AK (2017) New cubic reference table based image steganography. Multimed Tools Appl 4:1–18
Liao X, Qin Z, Ding LP (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146–156
Liu HJ, Zhu ZL, Juang HY (2008) A novel image encryption algorithm based on improved 3D chaotic cat map. In: The 9th international conference for young computer scientists, IEEE computer society, pp 3016–3021
Liu SB, Sun J, Xu ZQ (2009) Digital chaotic sequence generator based on coupled chaotic system. Chin Phys B 18(12):5219–5227
Liu Y, Nie LQ, Liu L, Rosenblum DS (2016) From action to activity: sensor-based activity recognition. Neurocomputing 181:108–115
Liu Y, Zhang L, Nie L, Yan Y, Rosenblum DS (2016) Fortune teller: predicting your career path. In: Proceedings of 30th AAAI conference on Artif Intell, pp 201–207
Liu L, Cheng L, Liu Y, Jia YP, Rosenblum, DS (2016) Recognizing complex activities by a probabilistic interval-based model. In: 30th AAAI conference on Artif Intell, pp 1266–1272
Manish K, Akhlad I (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie–Hellman cryptography. Signal Process 125:187–202
Nagaraj N, Shastry MC, Vaidya PG (2008) Increasing average period lengths by switching of robust chaos maps in finite precision. Eur Phys J Special Topics 165(1):73–83
Norouzi BY, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion. Multimed Tools Appl 71(3):1469–1497
Papadimitriou S, Bountis T, Mavroudi S, Bezerianos A (2001) A probabilistic symmetric encryption scheme for very fast secure communication based on chaotic systems of difference. Int J Bifurcat Chaos 11(12):3107–3115
Ping P, Xu F, Wang ZJ (2014) Image encryption based on non-affine and balanced cellular automata. Signal Process 105:419–429
Rowlands T, Rowlands D. A more resilient approach to chaotic encryption http://www.icita.org/previous/icita2002/ICITA2002/papers/223-21.pdf
Shannon CE (1949) Communication theory of secrecy systems[J]. Bell Syst Tech J 28:656–715
Takens F (1981) Detecting strange attractors in turbulence. Dynamical Systems and Turbulance serial. Lecture notes in Mathematics 898:366–381
Wang XY, Jin CQ (2012) Image encryption using game of life permutation and PWLCM chaotic system. Opt Commun 285(4):412–417
Wang XY, Liu CM (2017) A novel and effective image encryption algorithm based on Chaos and DNA encoding. Multimed Tools Appl 76(5):6229–6245
Wang CQ, Zhang X, Zheng Z (2016) An efficient image encryption algorithm based on a novel chaotic map. Multimed Tools Appl 76(22):24251–24280
Wannaporn T, Arit T (2012) Modified genetic algorithm for flexible job-shop scheduling problems. Procedia Comput Sci 12:122–128
Wei D, Wang XY, Hou JL, Liu P (2017) Hybrid projective synchronization of complex Duffing-Holmes oscillators with application to image encryption. Math Methods Appl Sci 40(12):4259–4271
Wheeler DD (1989) Problems with chaotic cryptosystems. Cryptologia 13:243–250
Wheeler DD, Matthews R (1991) Supercomputer investigations of a chaotic encryption algorithm. Cryptologia 15:140–151
Wu Y, Yang G, Jin H, Noonan JP (2012) Image encryption using the two-dimensional logistic chaotic map. JElectronImaging 21(1):3014–3025
Wu Y, Zhou YC, Bao L (2014) Discrete wheel-switching chaotic system and applications. IEEE Trans Circuits Syst 61(12):3469–3477
Xia XH (2012) Particle swarm optimization method based on chaotic local search and roulette wheel mechanism. Phys Procedia 24:269–275
Xiao D, Liao XF, Deng SJ (2005) One-way hash function construction based on the chaotic map with changeable parameter. Chaos, Solitons Fractals 24(1):65–71
Yang YG, Tian J, Lei H (2016) Novel quantum image encryption using one-dimensional quantum cellular automata. Inf Sci 345:257–270
Zhang Y (2016) The image encryption algorithm with plaintext-related shuffling. IETE Tech Rev 33(3):310–322
Zhang X, Zhu G, Ma S (2012) Remote-sensing image encryption in hybrid domains. Opt Commun 285(7):1736–1743
Zhang H, Wang XY, Wang SW et al (2017) Application of coupled map lattice with parameter q in image encryption. Opt Lasers Eng 88:65–74
Zhang XW, Shu L, Tang K. Multi-map orbit hopping chaotic stream cipher https://arxiv.org/ftp/cs/papers/0601/0601010.pdf
Zhong YH, Zhou YC (2016) Image encryption using 2D logistic-adjusted-sine map. Inf Sci 339:237–253
Zhu CX (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(1):29–37
Zou Y, Mi Z, Xu M (2006) Dynamic load balancing based on roulette wheel selection. In: International conference on communications, circuits and systems proceedings pp 1732–1735
Acknowledgments
This research is supported by the National Natural Science Foundation of China (Nos: 61672124, 61370145, 61502216, 61802161 and 51679116), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (No: MMJJ20170203), Natural Science Foundation of Liaoning Province, People Republic of China (Nos: 201602365, 201602372, 20170540434 and 20170540448).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Cao, G., Wang, X. Image encryption based on the combination of roulette wheel selection with linear congruence pixel transformation. Multimed Tools Appl 78, 10625–10647 (2019). https://doi.org/10.1007/s11042-018-6635-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6635-8