Skip to main content

Advertisement

Log in

An image encryption approach based on chaotic maps and genetic operations

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper puts forward an image encryption approach using chaotic maps and genetic operations. First, the Keccak algorithm is employed to compute the hash values of a plain-image as the initial values for chaotic map. The sensitivity and pseudo randomness of chaotic map used for the initial conditions allows for pseudorandom sequences to be obtained by iterative logistic map to shuffle and permute the pixel positions and values of the image. Second, in combination with the Hénon map and the DNA coding technique, genetic operations at the bit level are used to achieve pixel selection, crossover and mutation, as well as further completion of pixel diffusion and scrambling, which significantly increases the difficulty of deciphering the algorithm. Finally, the diffusion and confusion features of the algorithm are further strengthened by bidirectional exclusive OR operations with chaotic sequences. The theoretical analysis and simulation results indicate that the algorithm is sensitive to keys and can effectively defend statistical and differential attacks, indicating that it has good security and application potential.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4.
Fig. 5.
Fig. 6.
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Emad E Abdallah (2009). Watermarking 3D models using spectral mesh compression. Signal Image & Video Processing

  2. Abdallah EE , Hamza AB. Bhattacharya P (2007). Spectral graph-theoretic approach to 3D mesh watermarking[C]// Proceedings of the Graphics Interface 2007 Conference, may 28-30, 2007, Montreal, Canada ACM

  3. Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEUE-International Journal of Electronics and Communications 66(10):806–816

    Article  Google Scholar 

  4. Adleman LM (1994) Molecular computation of solutions to combinatorial problems. Science 266(5187):1021–1024

    Article  Google Scholar 

  5. Askar SS, Karawia AA, Alammar FS (2018) Cryptographic algorithm based on pixel shuffling and dynamical chaotic economic map. IET Image Process 12(1):158–167

    Article  Google Scholar 

  6. Bakhshandeh A, Eslami Z (2013) An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Opt Lasers Eng 51(6):665–673

    Article  Google Scholar 

  7. Benjeddou A, Taha AK, Fournier-Prunaret D et al (2009) A Fast Color Image Encryption Scheme Based on Multidimensional Chaotic Maps. Global information infrastructure symposium. IEEE 2009:1–4

    Google Scholar 

  8. Celland CT, Risca V, Bancroft C (1999) Hiding messages in DNA microdots. Nature 399(6736):533–534

    Article  Google Scholar 

  9. Dhall S, Pal SK, Sharma K (2018) Cryptanalysis of image encryption scheme based on a new 1D chaotic system. Signal Process 146:22–32

    Article  Google Scholar 

  10. Elsheh E, Hamza AB (2011) Secret sharing approaches for 3D object encryption. Expert Syst Appl 38(11):13906–13911

    Google Scholar 

  11. Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56(5):83–93

    Article  Google Scholar 

  12. Erlich Y, Zielinski D (2017) DNA fountain enables a robust and efficient storage architecture. Science 355(6328):950–954

    Article  Google Scholar 

  13. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8(6):1259–1284

    Article  MathSciNet  MATH  Google Scholar 

  14. Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-Chaos. Phys Lett A 372(4):394–400

    Article  MATH  Google Scholar 

  15. Hu G, Xiao D, Wang Y, Li X (2017) Cryptanalysis of a chaotic image cipher using Latin square-based confusion and diffusion. Nonlinear Dyn 88(2):1305–1316

    Article  MATH  Google Scholar 

  16. Kaur M, Kumar V (2018) Efficient image encryption method based on improved Lorenz chaotic system. Electron Lett 54(9):562–564

    Article  Google Scholar 

  17. Kwok HS, Tang WKS (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons Fractals 32(4):1518–1529

    Article  MathSciNet  MATH  Google Scholar 

  18. Li S, Mou X, Yang BL, Ji Z, Zhang J (2003) Problems with a probabilistic encryption scheme based on chaotic systems. Int J Bifurcation Chaos 13(10):3063–3077

    Article  MathSciNet  MATH  Google Scholar 

  19. Matthews R (1989) On the derivation of a ‘chaotic’encryption algorithm. Cryptologia 3(1):29–42

    Article  MathSciNet  Google Scholar 

  20. Özkaynak F (2018) Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dyn 92(2):305–313

    Article  Google Scholar 

  21. Özkaynak F, Yavuz S (2014) Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Nonlinear Dyn 78(2):1311–1320

    Article  MATH  Google Scholar 

  22. Peng J, Jin S, and Liao X (2009). A novel digital image encryption algorithm based on Hyperchaos by controlling Lorenz system. Fifth International Conference on Natural Computation

  23. Preishuber M, Hutter T, Katzenbeisser S et al (2018) Depreciating motivation and empirical security analysis of Chaos-based image and video encryption[J]. IEEE Trans Inf Forensics Secur:1–1

  24. Pujari SK, Bhattacharjee G, Bhoi S (2018) A hybridized model for image encryption through genetic algorithm and DNA sequence. Procedia Computer Science 125:165–171

    Article  Google Scholar 

  25. Raj R, Singh PK, Singh RS (2016) Multi-image encryption using genetic computation. CSI Transactions on ICT 4(2–4):1–7

    Google Scholar 

  26. Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2017) DNA chaos blend to secure medical privacy. IEEE Trans Nanobiosci 16(8):850–858

    Article  Google Scholar 

  27. Sivakumar T, Venkatesan R (2014) Image encryption based on pixel shuffling and random key stream. International Journal of Computer and Information Technology 3(6):1468–1476

    Google Scholar 

  28. Tinós R, Zhao L, Chicano F, Whitley D (2018) Nk Hybrid Genetic Algorithm For Clustering. In: IEEE Transactions on Evolutionary Computation. https://doi.org/10.1109/TEVC.2018.2828643

    Chapter  Google Scholar 

  29. Wang X, Zhang HL (2016) A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems. Nonlinear Dyn 83(1–2):333–346

    Article  MathSciNet  Google Scholar 

  30. Wang X, Xu et al (2014) A novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn 75(1–2):345–353

    Article  Google Scholar 

  31. Wei X (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290–299

    Article  Google Scholar 

  32. Wei Z (2017) Dynamical behaviors of a chaotic system with no Equilibria. Phys Lett A 376(2):102–108

    Article  MathSciNet  MATH  Google Scholar 

  33. Wen W, Zhang Y, Su M, Zhang R, Chen J, Li M (2017) Differential attack on a hyper-chaos-based image cryptosystem with a classic bimodular architecture. Nonlinear Dyn 87(1):383–390

    Article  Google Scholar 

  34. Wang X, Zhu X, Zhang Y (2018) An image encryption algorithm based on Josephus traversing and mixed chaotic map. IEEE Access 6:23733–23746

  35. Zhang X, Wang X (2019) Multiple-image encryption algorithm based on DNA encoding and chaotic system. Multimed Tools Appl 78.6:7841–7869

    Article  Google Scholar 

  36. Zhang X, Wang Y, Cui G, Niu Y, Xu J (2009) Application of a novel IWO to the design of encoding sequences for DNA computing. Comput Math Appl 57(11–12):2001–2008

    Article  Google Scholar 

  37. Zhang J, Fang DX, Ren H (2014) Image encryption algorithm based on DNA encoding and chaotic maps. Math Probl Eng. https://doi.org/10.1155/2014/917147

  38. Zhang LY, Liu Y, Pareschi F, Zhang Y, Wong KW, Rovatti R, Setti G (2017) On the security of a class of diffusion mechanisms for image encryption. IEEE Transactions on Cybernetics 48(4):1–13

    Article  Google Scholar 

  39. Zhang X, Han F, Niu Y (2017) Chaotic image encryption algorithm based on bit permutation and dynamic DNA encoding. Comput Intel Neurosc. https://doi.org/10.1155/2017/6919675

  40. Zhang X, Zhou Z, Niu Y (2018) An image encryption method based on the Feistel network and dynamic DNA encoding. IEEE Photonics Journal. https://doi.org/10.1109/JPHOT.2018.2859257

  41. Shiu H J, Ng K L, Fang J F, Lee R CT, Huang C H (2010) Data hiding methods based upon DNA sequences. Inf Sci 180(11):2196–2208

  42. Zhu Z-L, Zhang W, Wong K-W, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171–1186

    Article  Google Scholar 

Download references

Acknowledgments

The work for this paper was supported by the National Natural Science Foundation of China (Grant nos. 61572446, 61602424), and the Key Research and Development Program of Henan Province (Grant nos. 202102210177, 192102210134).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuncai Zhang.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Niu, Y., Zhou, Z. & Zhang, X. An image encryption approach based on chaotic maps and genetic operations. Multimed Tools Appl 79, 25613–25633 (2020). https://doi.org/10.1007/s11042-020-09237-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09237-2

Keywords

Navigation