Skip to main content
Log in

Image encryption based on the combination of roulette wheel selection with linear congruence pixel transformation

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

To overcome the challenges encountered in chaotic image encryption system, such as dynamic degradation, weak security, and low encryption efficiency, this paper proposes a new image encryption algorithm. In terms of key generation method, a roulette wheel selection algorithm is designed, which effectively reduces dynamic degradation. In pixel coding, a linear congruence pixel transformation method is proposed, which enhances the security of pixel transform. In the overall layout of the encryption algorithm, the substitution-permutation-substitution structure is adopted. Under the joint action of various aspects, encryption efficiency is improved while security of our proposed encryption algorithm is guaranteed. Additionally, during design, the motivation of each part of the algorithm is explained. Theoretical analysis and experimental results show our proposed algorithm has a good application prospect.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Cao GH, Zhou J, Zhang YZ (2014) Quantum chaotic image encryption with one time running key. Int J Secur Appl 8(4):77–88

    Google Scholar 

  2. Cui JS, Liu Y, Xu YD, Zhao HJ, Zhang HB (2013) Tracking generic human motion via fusion of low-and high-dimensional approaches. IEEE Trans Syst Man Cybern Syst Hum 43(4):996–1002

    Article  Google Scholar 

  3. Deng YS, Hu HP, Xiong NX (2015) A general hybrid model for chaos robust synchronization and degradation reduction. Inf Sci 305:146–164

    Article  Google Scholar 

  4. Heidari-Bateni G, McGillem CD (1994) A chaotic direct-sequence spread-spectrum communication system. IEEE Trans Commun 42(2/3/4):1524–1527

    Article  Google Scholar 

  5. Hu HP, Xu Y, Zhu ZQ (2008) A method of improving the properties of digital chaotic system. Chaos, Solitons Fractals 38:439–446

    Article  Google Scholar 

  6. Hua Z, Zhou Y, Pun CM (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80–94

    Article  Google Scholar 

  7. Li C, Chen G (2008) On the security of a class of image encryption schemes. In: IEEE international symposium on circuits and systems (ISCAS 2008) pp 3290–3293

  8. Li S, Mou X, Cai Y, Ji Z, Zhang J (2003) On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision. Comput Phys Commun 153:52–58

    Article  MathSciNet  Google Scholar 

  9. Li SJ, Chen GR, Mou XQ (2005) On the dynamical degradation of digital piecewise linear chaotic maps. Int J Bifurcation Chaos 15(10):3119–3151

    Article  MathSciNet  Google Scholar 

  10. Li H, Yang Z, Zhang YM, Wen BC (2011) Methodology of estimating the embedding dimension in chaos time series based on the prediction performance of radial basis function neural networks. Acta Phys Sin 60(7):070502–070506

    Google Scholar 

  11. Li CQ, Liu YS, Zhang L (2013) Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation. Int J Bifurcation Chaos 23(4):1350075(1-12)

    MathSciNet  MATH  Google Scholar 

  12. Li X, Ma J, Wang WD, Xiong YP, Zhang JS (2013) A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Math Comput Model 58:85–95

    Article  Google Scholar 

  13. Liao X, Guo SJ, Yin JJ, Wang H, Li X, Sangaiah AK (2017) New cubic reference table based image steganography. Multimed Tools Appl 4:1–18

    Google Scholar 

  14. Liao X, Qin Z, Ding LP (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146–156

    Article  Google Scholar 

  15. Liu HJ, Zhu ZL, Juang HY (2008) A novel image encryption algorithm based on improved 3D chaotic cat map. In: The 9th international conference for young computer scientists, IEEE computer society, pp 3016–3021

  16. Liu SB, Sun J, Xu ZQ (2009) Digital chaotic sequence generator based on coupled chaotic system. Chin Phys B 18(12):5219–5227

    Article  Google Scholar 

  17. Liu Y, Nie LQ, Liu L, Rosenblum DS (2016) From action to activity: sensor-based activity recognition. Neurocomputing 181:108–115

    Article  Google Scholar 

  18. Liu Y, Zhang L, Nie L, Yan Y, Rosenblum DS (2016) Fortune teller: predicting your career path. In: Proceedings of 30th AAAI conference on Artif Intell, pp 201–207

  19. Liu L, Cheng L, Liu Y, Jia YP, Rosenblum, DS (2016) Recognizing complex activities by a probabilistic interval-based model. In: 30th AAAI conference on Artif Intell, pp 1266–1272

  20. Manish K, Akhlad I (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie–Hellman cryptography. Signal Process 125:187–202

    Article  Google Scholar 

  21. Nagaraj N, Shastry MC, Vaidya PG (2008) Increasing average period lengths by switching of robust chaos maps in finite precision. Eur Phys J Special Topics 165(1):73–83

    Article  Google Scholar 

  22. Norouzi BY, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion. Multimed Tools Appl 71(3):1469–1497

    Article  Google Scholar 

  23. Papadimitriou S, Bountis T, Mavroudi S, Bezerianos A (2001) A probabilistic symmetric encryption scheme for very fast secure communication based on chaotic systems of difference. Int J Bifurcat Chaos 11(12):3107–3115

    Article  MathSciNet  Google Scholar 

  24. Ping P, Xu F, Wang ZJ (2014) Image encryption based on non-affine and balanced cellular automata. Signal Process 105:419–429

    Article  Google Scholar 

  25. Rowlands T, Rowlands D. A more resilient approach to chaotic encryption http://www.icita.org/previous/icita2002/ICITA2002/papers/223-21.pdf

  26. Shannon CE (1949) Communication theory of secrecy systems[J]. Bell Syst Tech J 28:656–715

    Article  MathSciNet  Google Scholar 

  27. Takens F (1981) Detecting strange attractors in turbulence. Dynamical Systems and Turbulance serial. Lecture notes in Mathematics 898:366–381

    Article  Google Scholar 

  28. Wang XY, Jin CQ (2012) Image encryption using game of life permutation and PWLCM chaotic system. Opt Commun 285(4):412–417

    Article  Google Scholar 

  29. Wang XY, Liu CM (2017) A novel and effective image encryption algorithm based on Chaos and DNA encoding. Multimed Tools Appl 76(5):6229–6245

    Article  Google Scholar 

  30. Wang CQ, Zhang X, Zheng Z (2016) An efficient image encryption algorithm based on a novel chaotic map. Multimed Tools Appl 76(22):24251–24280

    Article  Google Scholar 

  31. Wannaporn T, Arit T (2012) Modified genetic algorithm for flexible job-shop scheduling problems. Procedia Comput Sci 12:122–128

    Article  Google Scholar 

  32. Wei D, Wang XY, Hou JL, Liu P (2017) Hybrid projective synchronization of complex Duffing-Holmes oscillators with application to image encryption. Math Methods Appl Sci 40(12):4259–4271

    Article  MathSciNet  Google Scholar 

  33. Wheeler DD (1989) Problems with chaotic cryptosystems. Cryptologia 13:243–250

    Article  Google Scholar 

  34. Wheeler DD, Matthews R (1991) Supercomputer investigations of a chaotic encryption algorithm. Cryptologia 15:140–151

    Article  Google Scholar 

  35. Wu Y, Yang G, Jin H, Noonan JP (2012) Image encryption using the two-dimensional logistic chaotic map. JElectronImaging 21(1):3014–3025

    Google Scholar 

  36. Wu Y, Zhou YC, Bao L (2014) Discrete wheel-switching chaotic system and applications. IEEE Trans Circuits Syst 61(12):3469–3477

    Article  Google Scholar 

  37. Xia XH (2012) Particle swarm optimization method based on chaotic local search and roulette wheel mechanism. Phys Procedia 24:269–275

    Article  Google Scholar 

  38. Xiao D, Liao XF, Deng SJ (2005) One-way hash function construction based on the chaotic map with changeable parameter. Chaos, Solitons Fractals 24(1):65–71

    Article  MathSciNet  Google Scholar 

  39. Yang YG, Tian J, Lei H (2016) Novel quantum image encryption using one-dimensional quantum cellular automata. Inf Sci 345:257–270

    Article  Google Scholar 

  40. Zhang Y (2016) The image encryption algorithm with plaintext-related shuffling. IETE Tech Rev 33(3):310–322

    Article  Google Scholar 

  41. Zhang X, Zhu G, Ma S (2012) Remote-sensing image encryption in hybrid domains. Opt Commun 285(7):1736–1743

    Article  Google Scholar 

  42. Zhang H, Wang XY, Wang SW et al (2017) Application of coupled map lattice with parameter q in image encryption. Opt Lasers Eng 88:65–74

    Article  Google Scholar 

  43. Zhang XW, Shu L, Tang K. Multi-map orbit hopping chaotic stream cipher https://arxiv.org/ftp/cs/papers/0601/0601010.pdf

  44. Zhong YH, Zhou YC (2016) Image encryption using 2D logistic-adjusted-sine map. Inf Sci 339:237–253

    Article  Google Scholar 

  45. Zhu CX (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(1):29–37

    Article  Google Scholar 

  46. Zou Y, Mi Z, Xu M (2006) Dynamic load balancing based on roulette wheel selection. In: International conference on communications, circuits and systems proceedings pp 1732–1735

Download references

Acknowledgments

This research is supported by the National Natural Science Foundation of China (Nos: 61672124, 61370145, 61502216, 61802161 and 51679116), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (No: MMJJ20170203), Natural Science Foundation of Liaoning Province, People Republic of China (Nos: 201602365, 201602372, 20170540434 and 20170540448).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guanghui Cao.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cao, G., Wang, X. Image encryption based on the combination of roulette wheel selection with linear congruence pixel transformation. Multimed Tools Appl 78, 10625–10647 (2019). https://doi.org/10.1007/s11042-018-6635-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6635-8

Keywords

Navigation