Skip to main content
Log in

A chaotic image encryption algorithm based on a counting system and the semi-tensor product

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Based on the n-ary counting system, combined with the matrix semi-tensor product theory and Hilbert curve, a chaotic image encryption algorithm is designed. Different from the traditional encryption method, the algorithm proposed in this paper is an encryption algorithm with scrambling and diffusion at the same time. First, the pixel value is converted from decimal to n-ary. In the n-ary counting system, the plaintext image is randomly divided into some groups, and the Hilbert curve is used for scrambling to each group. The blocks are converted into scrambled images, so that the scrambling and diffusion can be carried out at the same time. Then, in order to improve the security of the algorithm, another round of diffusion is carried out based on matrix semi-tensor product mechanism. Chaotic sequence is generated by Chen system. This chaotic sequence performs matrix semi-tensor product operation with the first round of encrypted image, and generate second encrypted images. Finally, this encryption method is applied to color image encryption. Compared with some representative algorithms, the experimental results show that the algorithm proposed in this paper is secure and it can resist common attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. International journal of bifurcation and chaos 16(08):2129–2151

    Article  MathSciNet  MATH  Google Scholar 

  2. Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Processing 128:155–170

    Article  Google Scholar 

  3. Cao G, Wang X (2019) Image encryption based on the combination of roulette wheel selection with linear congruence pixel transformation. Multimedia Tools and Applications 78(8):10625–10,647

    Article  Google Scholar 

  4. Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Optics and Lasers in engineering 88:197–213

    Article  Google Scholar 

  5. Chen WH, Luo S, Zheng WX (2016) Impulsive synchronization of reaction–diffusion neural networks with mixed delays and its application to image encryption. IEEE transactions on neural networks and learning systems 27(12):2696–2710

    Article  Google Scholar 

  6. Cheng D, Qi H (2010) A linear representation of dynamics of Boolean networks. IEEE Transactions on Automatic Control 55(10):2251–2258

    Article  MathSciNet  MATH  Google Scholar 

  7. Cheng DZ, Qi HS (2012) Principle and range of possible applications of sime-tensor product of matrices. Systems Science and Mathematics 32(12):1488–1496

    MATH  Google Scholar 

  8. Cheng DZ, Zhao Y (2011) Semi-tensor product of matrices-A convenient new tool. Chinese Science Bulletin 56(32):2664–2674

    Article  Google Scholar 

  9. Gong LH, He XT, Tan RC et al (2018) Single channel quantum color image encryption algorithm based on HSI model and quantum Fourier transform. International Journal of Theoretical Physics 57(1):59–73

    Article  MATH  Google Scholar 

  10. Hamza R, Titouna F (2016) A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. Information Security Journal: A Global Perspective 25(4–6):162–179

    Google Scholar 

  11. Hamza R, Hassan A, Huang T, et al. (2019) An efficient cryptosystem for video surveillance in the Internet of Things environment. Complexity, 2019, 1,625,678

  12. Hua Z, Zhou Y (2017) Design of image cipher using block-based scrambling and image filtering. Information Sciences 396:97–113

    Article  MATH  Google Scholar 

  13. Hua Z, Zhou Y, Pun CM et al (2015) 2D Sine Logistic modulation map for image encryption. Information Sciences 297:80–94

    Article  Google Scholar 

  14. Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Information Sciences 480:403–419

    Article  Google Scholar 

  15. Li C (2016) Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Processing 118:203–210

    Article  Google Scholar 

  16. Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Optics and Lasers in Engineering 90:238–246

    Article  Google Scholar 

  17. Li H, Zhao G, Meng M et al (2018) A survey on applications of semi-tensor product method in engineering. Science China Information Sciences 61(1):010202

    Article  MathSciNet  Google Scholar 

  18. Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Optics Communications 284(16–17):3895–3903

    Article  Google Scholar 

  19. Liu H, Wen F, Kadir A (2019) Construction of a new 2D Chebyshev-Sine map and its application to color image encryption. Multimedia Tools and Applications 78(12):15997–16,010

    Article  Google Scholar 

  20. Liu H, Zhao B, Huang L (2019) Quantum Image Encryption Scheme Using Arnold Transform and S-box Scrambling. Entropy 21(4):343

    Article  MathSciNet  Google Scholar 

  21. Lorenz EN (1963) Deterministic nonperiodic flow. Journal of the atmospheric sciences 20(2):130–141

    Article  MathSciNet  MATH  Google Scholar 

  22. Mani P, Rajan R, Shanmugam L et al (2019) Adaptive control for fractional order induced chaotic fuzzy cellular neural networks and its application to image encryption. Information Sciences 491:74–89

    Article  MathSciNet  MATH  Google Scholar 

  23. Ping P, Xu F, Mao Y et al (2018) Designing permutation–substitution image encryption networks with Henon map. Neurocomputing 283:53–63

    Article  Google Scholar 

  24. Preishuber M, Hütter T, Katzenbeisser S et al (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Transactions on Information Forensics and Security 13(9):2137–2150

    Article  Google Scholar 

  25. Tang S, Xu GL, Li QD (2012) New image group encryption algorithm based on high dimensional hyperchaos system and matrix tensor product. Journal of Computer Applications 32(8):2262–2264

    Article  Google Scholar 

  26. Teng L, Wang X, Meng J (2018) A chaotic color image encryption using integrated bit-level permutation. Multimedia Tools and Applications 77(6):6883–6896

    Article  Google Scholar 

  27. Wang X, Gao S (2019) Application of matrix semi-tensor product in chaotic image encryption. Journal of the Franklin Institute 356(18):11638–11,667

    Article  MathSciNet  MATH  Google Scholar 

  28. Wang X, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Information Sciences 507:16–36

    Article  MathSciNet  MATH  Google Scholar 

  29. Wang X, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Information Sciences 539:195–214

    Article  MathSciNet  Google Scholar 

  30. Wang XY, Zhang H (2016) A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems. Nonlinear Dynamics 83(1–2):333–346

    Article  MathSciNet  Google Scholar 

  31. Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Optics and Lasers in Engineering 73:53–61

    Article  Google Scholar 

  32. Wang Q, Chen X, Wei M et al (2016) Simultaneous encryption and compression of medical images based on optimized tensor compressed sensing with 3D Lorenz. Biomedical engineering online 15(1):118

    Article  MathSciNet  Google Scholar 

  33. Wang XY, Feng L, Zhao HY (2019) Fast image encryption algorithm based on parallel computing system. Information Sciences 486:340–358

    Article  MATH  Google Scholar 

  34. Wang C, Wang X, Xia Z et al (2019) Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Information Sciences 470:109–120

    Article  Google Scholar 

  35. Wang X, Gao S, Yu L, et al. (2019) Chaotic image encryption algorithm based on bit-combination scrambling in decimal system and dynamic diffusion. IEEE Access, 7: 103662–103,677

  36. Xie EY, Li C, Yu S et al (2017) On the cryptanalysis of Fridrich’s chaotic image encryption scheme. Signal processing 132:150–154

    Article  Google Scholar 

  37. Ye G, Huang X (2016) A feedback chaotic image encryption scheme based on both bit-level and pixel-level. Journal of Vibration and Control 22(5):1171–1180

    Article  MathSciNet  Google Scholar 

  38. Ye G, Pan C, Huang X et al (2018) An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dynamics 94(1):745–756

    Article  Google Scholar 

  39. Ye X, Wang X, Gao S et al (2020) A new random diffusion algorithm based on the multi-scroll Chua’s chaotic circuit system. Optics and Lasers in Engineering 127:105905

    Article  Google Scholar 

  40. Ye X, Wang X, Gao S et al (2020) A new chaotic circuit with multiple memristors and its application in image encryption. Nonlinear Dynamics 99(2):1489–1506

    Article  Google Scholar 

  41. Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic S-Box. Information Sciences 450:361–377

    Article  MathSciNet  MATH  Google Scholar 

  42. Zhang H, Wang XY, Lin X (2014) Synchronization of Boolean networks with different update schemes. IEEE/ACM Transactions on Computational Biology and Bioinformatics 11(5):965–972

    Article  Google Scholar 

  43. Zhou Y, Bao L, Chen CLP (2013) Image encryption using a new parametric switching chaotic system. Signal Processing 93(11):3039–3052

    Article  Google Scholar 

  44. Zhou N, Chen W, Yan X et al (2018) Bit-level quantum color image encryption scheme with quantum cross-exchange operation and hyper-chaotic system. Quantum Information Processing 17:1–24

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgments

This research was supported by the National Natural Science Foundation of China (No. 61672124), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (No. MMJJ20170203), a Project of the Liaoning Province Science and Technology Innovation Leading Talents Program (No. XLYC1802013), the Key R&D Projects of Liaoning Province (No. 2019JH2/10300057), and the Jinan City ‘20 Universities’ Funding Projects Introducing Innovation Team Program (No. 2019GXRC031), “Double First-rate” Construction Project (“Innovation Project”) (No. SSCXXM012).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gao Suo.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, X., Gao, S. A chaotic image encryption algorithm based on a counting system and the semi-tensor product. Multimed Tools Appl 80, 10301–10322 (2021). https://doi.org/10.1007/s11042-020-10101-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-10101-6

Keywords

Navigation