Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Based on hyper-chaotic systems, a novel image encryption algorithm is introduced in this paper. The advantages of our proposed approach are that it can be realized easily in one round diffusion process and is computationally very simple while attaining high security level, high key sensitivity, high plaintext sensitivity and other properties simultaneously. The key stream generated by hyper-chaotic system is related to the original image. Moreover, to encrypt each pixel, we use the sum of pixels which are located after that pixel. The algorithm uses different summations when encrypting different input images (even with the same sequence based on hyper-chaotic system). This, in turn, will considerably enhance the cryptosystem resistance against known/chosen-plaintext and differential attacks. The change rate of the number of pixels in the cipher-image when only one pixel of the original image is modified (NPCR) and the Unified Average Changing Intensity (UACI) are already very high (NPCR > 99.80233 % and UACI > 33.55484 %). Also, experimental results such as key space analysis, histograms, correlation coefficients, information entropy, peak signal-to-noise ratio, key sensitivity analysis, differential analysis and decryption quality, show that the proposed image encryption algorithm is secure and reliable, with high potential to be adopted for the secure image communication applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Akhshani A, Behnia S, Akhavan A, Hassan HA, Hassan Z (2010) A novel scheme for image encryption based on 2D piecewise chaotic maps. J Opt Commun 283:3259–3266

    Article  Google Scholar 

  2. Alvarez E, Fernandez A, García P, Jimenez J, Marcano A (1999) New approach to chaotic encryption. J Phys Lett A 263:373–375

    Article  Google Scholar 

  3. Alvarez G, Montoya F, Romera M, Pastor G (2000) Cryptanalysis of a chaotic encryption system. J Phys Lett A 276:191–196

    Article  MATH  MathSciNet  Google Scholar 

  4. Amin M, Faragallah OS, El-Latif AAA (2010) A chaotic block cipher algorithm for image cryptosystems. J Commun Nonlinear Sci Numer Simul 15(11):3484–3497

    Article  MATH  Google Scholar 

  5. Baptista MS (1998) Cryptography with chaos. J Phys Lett A 240:50–54

    Article  MATH  MathSciNet  Google Scholar 

  6. Behnia S, Akhshani A, Ahadpour S, Mahmodi H, Akhavan A (2007) A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. J Phys Lett A 366:391–396

    Article  Google Scholar 

  7. Behnia S, Akhshani A, Mahmodi H, Akhavan A (2008) A novel algorithm for image encryption based on mixture of chaotic maps. J Chaos Solitons Fractals 35(2):408–419

    Article  MATH  MathSciNet  Google Scholar 

  8. Belkhouche F and Qidwai U (2003) Binary image encoding using one-dimensional chaotic map. Proc IEEE Annu Techical Conf 39–43

  9. Borujeni SE and Eshghi M (2009) Chaotic image encryption design using Tompkins-Paige algorithm. J Math Probl Eng 2009(762652)

  10. Borujeni SE, Eshghi M Chaotic image encryption system using phase-magnitude transformation and pixel substitution. J Telecommun Syst. doi:10.1007/s11235-011-9458-8, 2011

  11. Chen HC, Guo JI, Huang LC, Yen JC (2003) Design and realization of a New signal security system for multimedia data transmission. EURASIP J Appl Signal Proc 13:1291–1305

    Article  Google Scholar 

  12. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. J Chaos Solitons Fractals 21:749–761

    Article  MATH  MathSciNet  Google Scholar 

  13. El-Latif AAA, Li L, Niu X (2012) A New image encryption scheme based on cyclic elliptic curve and chaotic system. Multimed Tool Appl. doi:10.1007/s11042-012-1173-2

  14. Encinas LH, Dominguez A (2006) Comment on ‘a technique for image encryption using digital signature’. J Opt Commun 268:261–265

    Article  Google Scholar 

  15. Francois M, Grosges T, Barchiesi D, Erra R (2012) A New image encryption scheme based on a chaotic function. J Signal Process Image Commun 27:249–259

    Article  Google Scholar 

  16. Gao T, Chen Z (2008) A New image encryption algorithm based on hyper-chaos. J Phys Lett A 372:394–400

    Article  MATH  Google Scholar 

  17. Gao T, Chen Z (2008) Image encryption based on a new total shuffling algorithm. J Chaos Solitons Fractals 38:213–220

    Article  MATH  MathSciNet  Google Scholar 

  18. Gao H, Zhang Y, Liang S, Li D (2006) A New chaotic algorithm for image encryption. J Chaos Solitons Fractals 29:393–399

    Article  MATH  Google Scholar 

  19. Ge X, Liu F, Lu B, Yang C (2010) Improvement of Rhouma’s attacks on Gao algorithm. J Phys Lett A 374:1362–1367

    Article  MATH  Google Scholar 

  20. Habutsu T, Nishio Y, Sasase I, Mori S (1991) A secret key cryptosystem by iterating a chaotic map. J Lect Notes Comput Sci 547:127–140

    Article  MathSciNet  Google Scholar 

  21. Huang X (2010) Image encryption algorithm using chaotic Chebyshev generator. J Nonlinear Dyn 67(4):2411–2417

    Article  Google Scholar 

  22. Kumar A, Ghose MK (2011) Extended substitution–diffusion based image cipher using chaotic standard Map. J Commun Nonlinear Sci Numer Simulat 16:372–382

    Article  MATH  MathSciNet  Google Scholar 

  23. Li S, Zheng X (2002) Cryptanalysis of a chaotic image encryption method. Proc IEEE Symp Circ Syst 2:708–711

    Google Scholar 

  24. Lian S (2009) Efficient image or video encryption based on spatiotemporal chaos system. J Chaos Solitons Fractals 40:2509–2519

    Article  MATH  Google Scholar 

  25. Lian S, Sun J, Wang Z (2005) A block cipher based on a suitable use of the chaotic standard Map. J Chaos Solitons Fractals 26:117–129

    Article  MATH  Google Scholar 

  26. Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. J Signal Process 90:2714–2722

    Article  MATH  Google Scholar 

  27. Mao Y, Chen G, Lian S (2004) A novel fast image encryption scheme based on the three-dimensional chaotic baker Map. J Bifurcat Chaos 14(10):3613–3624

    Article  MATH  MathSciNet  Google Scholar 

  28. Mazloom S, Eftekhari-Moghadam AM (2009) Color image encryption based on coupled nonlinear chaotic map. J Chaos Solitons Fractals 42:1745–1754

    Article  MATH  Google Scholar 

  29. Mirzaei O, Yaghoobi M, Irani H (2012) A New image encryption method: parallel Sub-image encryption with hyper chaos. J Nonlinear Dyn 67(1):557–566

    Article  MathSciNet  Google Scholar 

  30. Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic Map. J Image Vis Comput 24:926–934

    Article  Google Scholar 

  31. Patidar V, Pareek NK, Purohit G, Sud KK (2010) Modified substitution–diffusion image cipher using chaotic standard and logistic maps. J Commun Nonlinear Sci Numer Simul 15(10):2755–2765

    Article  MATH  MathSciNet  Google Scholar 

  32. Patidar V, Pareek NK, Purohit G, Sud KK (2011) A robust and secure chaotic standard Map based pseudorandom permutation-substitution scheme for image encryption. J Opt Commun 284:4331–4339

    Article  Google Scholar 

  33. Patidar V, Pareek NK, Sud KK (2009) A New substitution–diffusion based image cipher using chaotic standard and logistic maps. J Commun Nonlinear Sci Numer Simulat 14:3056–3075

    Article  Google Scholar 

  34. Prasanna SRM, Rao YVS, Mitra A (2006) An image encryption method with magnitude and phase manipulation using carrier images. Int J Electr Comput Eng 1:132–137

    Google Scholar 

  35. Rhouma R, Belghith S (2008) Cryptanalysis of a new image encryption algorithm based on hyper-chaos. J Phys Lett A 372:5973–5978

    Article  MATH  Google Scholar 

  36. Sam IS, Devaraj P, Bhuvaneswaran RS (2012) A novel image cipher based on mixed transformed logistic maps. Multimed Tool Appl 56:315–330. doi:10.1007/s11042-010-0652-6

    Article  Google Scholar 

  37. Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled Two-dimensional piecewise chaotic Map. J Signal Process 92:1202–1215

    Article  Google Scholar 

  38. Singh N, Sinha A (2008) Optical image encryption using fractional Fourier transform and chaos. J Opt Lasers Eng 46:117–123

    Article  Google Scholar 

  39. Sinha A, Singh K (2003) A technique for image encryption using digital signature. J Opt Commun 218:229–234

    Article  Google Scholar 

  40. Sun F, Liu S, Li Z, Lu Z (2008) A novel image encryption scheme based on spatial chaos map. J Chaos Solitons Fractals 38:631–640

    Article  MATH  MathSciNet  Google Scholar 

  41. Sun F, Lu Z, Liu S (2010) A New cryptosystem based on spatial chaotic system. J Opt Commun 283:2066–2073

    Article  Google Scholar 

  42. Taneja N, Raman B, Gupta I (2012) Combinational domain encryption for still visual data. Multimed Tool Appl 59:775–793. doi:10.1007/s11042-011-0775-4

    Article  Google Scholar 

  43. Tong X, Cui M, Wang Z (2009) A New feedback image encryption scheme based on perturbation with dynamical compound chaotic sequence cipher generator. J Opt Commun 282:2722–2728

    Article  Google Scholar 

  44. Wang X, Teng L (2012) An image blocks encryption algorithm based on spatiotemporal chaos. J Nonlinear Dyn 67:365–371

    Article  MathSciNet  Google Scholar 

  45. Wang Y, Wong KW, Liao X, Chen G (2011) A New chaos-based fast image encryption algorithm. J Appl Soft Comput 11(1):514–522

    Article  Google Scholar 

  46. Wang Y, Wong KW, Liao X, Xiang T, Chen G (2009) A chaos-based image encryption algorithm with variable control parameters. J Chaos Solitons Fractals 41:1773–1783

    Article  MATH  Google Scholar 

  47. Wang X, Zhao D, Chen L (2006) Image encryption based on extended fractional Fourier transform and digital holography technique. J Opt Commun 260:449–453

    Article  Google Scholar 

  48. Wong KW, Ho SW, Yung CK (2003) A chaotic cryptography scheme for generating short ciphertext. J Phys Lett A 310:67–73

    Article  MATH  MathSciNet  Google Scholar 

  49. Wong KW, Kwok BSH, Law WS (2008) A fast image encryption scheme based on chaotic standard Map. J Phys Lett A 372:2645–2652

    Article  MATH  Google Scholar 

  50. Xiang T, Liao X, Tang G, Chen Y, Wong KW (2006) A novel block cryptosystem based on iterating a chaotic Map. J Phys Lett A 349:109–115

    Article  MATH  Google Scholar 

  51. Xiao D, Liao X, and Wei P Analysis and Improvement of a Chaos-based Image Encryption Algorithm. J Chaos Solitons Fractals 40:2191–2199

  52. Yanchuk S and Kapitaniak T Symmetry-increasing bifurcation as a predictor of a chaos-hyperchaos transition in coupled systems. J Phys Rev E 64, doi: 10.1103/PhysRevE.64.056235

  53. Yanchuk S, Kapitaniak T (2001) Chaos–hyperchaos transition in coupled Rössler systems. J Phys Lett A 290:139–144

    Article  MATH  Google Scholar 

  54. Yen JC, Guo JI (2000) A New chaotic key-based design for image encryption and decryption. Proc IEEE Int Conf Circ Syst 4:49–52

    Google Scholar 

  55. Yujun N, Xingyuan W, Mingjun W, Huaguang Z (2010) A New hyperchaotic system and its circuit implementation. Commun Nonlinear Sci Numer Simul 15(11):3518–3524

    Article  Google Scholar 

  56. Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. J Math Comput Model 52:2028–2035

    Article  MATH  MathSciNet  Google Scholar 

  57. Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. J Opt Commun 284:2775–2780

    Article  Google Scholar 

  58. Zhao L, Adhikari A, Xiao D, Sakurai K (2012) On the security analysis of an image scrambling encryption of pixel Bit and its improved scheme based on self-correlation encryption. J Commun Nonlinear Sci Numer Simulat 17:3303–3327

    Article  MathSciNet  Google Scholar 

  59. Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. J Opt Commun 285:29–37

    Article  Google Scholar 

  60. Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a Bit-level permutation. J Inform Sci 181:1171–1186

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to thank the Editor and the anonymous Referees for their valuable comments and suggestions to improve this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Benyamin Norouzi.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Norouzi, B., Mirzakuchaki, S., Seyedzadeh, S.M. et al. A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71, 1469–1497 (2014). https://doi.org/10.1007/s11042-012-1292-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-012-1292-9

Keywords

Navigation