Abstract
This paper presents a novel image encryption scheme using 3-D Arnold cat map and Fisher-Yates shuffling algorithm. A plain image is divided into various slices of equal size and then the 3-D representation of the image is shuffled by the 3-D chaotic map. A fractional order system of nonlinear differential equations is used to implement the diffusion in the intensity values of the shuffled image pixels. The solution of this fractional order system develops a strange attractor which is the onset of the chaos. Fisher-Yates is used to make a chaotic matrix which is used for arranging the data points. Experimental results are given on various images with comprehensive analysis which demonstrates the high security and sensitivity of the scheme.
Similar content being viewed by others
References
Ahmada M, Shamsi U, Khan IR (2015) An enhanced image encryption algorithm using fractional chaotic systems. Procedia Computer Science 57:852–859
Belazi A, Abd El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Proc 128:155–170
Bhatnagar G, Kumar S, Raman B, Sukavanam N (2009) Stereo image coding via digital watermarking. J Electron Imaging (SPIE) 18(3):033012
Bhatnagar G, Saha A, Wu QMJ, Atrey PK (2014) Analysis and extension of multiresolution singular value decomposition. Inf Sci 277:247—262
Chen G, Mao Y, Chui C (2004) A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos, Solitons Fractals 21:749–761
Chen G, Ueta T (1999) Yet another chaotic attractor. Int J Bifurcation Chaos 9:1465–1466
Diethelm K, Ford NJ, Freed AD (2002) A predictor-corrector approach for the numerical solution of fractional differential equations. Nonlinear Dynam 29:3–22
Dosselmann R, Yang XD et al (2008) A formal assessment of the structural similarity index. University of Regina. Department of Computer Science
Durstenfeld R (1964) Algorithm 235: random permutation. Commun ACM 7:420
Ford J, Mantica G, Ristow GH (1991) The Arnol’d cat: failure of the correspondence principle. Physica D: Nonlinear Phenomena 50(3):493–520
Fouda J, Effa J, Sabat S, Ali M (2014) A fast chaotic block cipher for image encryption. Commun Nonlinear Sci Numer Simul 19:578–588
Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcat Chaos 8:1259–1284
Hirsch M, Smale S, Devaney RL (2004) Differential equations, dynamical systems, and an introduction to Chaos. Elsevier Academic Press, New York
Hua Z, Zhou Y, Pun CM, Chen CLP (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80–94
Huang CK, Nien H (2009) Multi chaotic systems based pixel shuffle for image encryption. Opt Commun 282(11):2123–2127
Institute ANS, Committee I.C.S.S, Board IS (1985) IEEE standard for binary floating point arithmetic: IEEE
Kanso A, Ghebleh M (2012) A novel image encryption algorithm based on a 3d chaotic map. Commun Nonlinear Sci Numer Simul 17(7):2943–2959
Kocarev L (2008) Intelligent computing based on chaos. Springer, Berlin
Li C, Peng G (2004) Chaos in Chen’s system with a fractional order. Chaos, Solitons and Fractals 22:443–450
Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(15-17):3895–3903
Liu Y, Zhang L, Nie L, Yan Y (2016) Fortune teller : predicting your career path. AAAI conference on artificial intelligence thirtieth AAAI conference on artificial intelligence
Liu Y, Zheng Y, Liang Y, Liu S, Rosenblum DS (2016) Urban water quality prediction based on multi-task multi-view learning. In: Proceedings of the twenty-fifth international joint conference on artificial intelligence (IJCAI-16)
Liu Y, Nie L, Liu L, Rosenblum DS (2016) From action to activity: sensor-based activity recognition. Neurocomputing 181:108–115
Mao Y, Chen G (2005) Chaos-based image encryption. Springer, Berlin, pp 231–265
Mao Y, Chen G (2004) A novel fast image encryption scheme based on 3d chaotic baker maps. Int J Bifurcat Chaos 14(10):3613–3624
May RM (1976) Simple mathematical models with very complicated dynamics. Nature 261(5560):459–467
Musanna F, Rani A, Kumar S (2018) Image encryption using chaotic 3-D arnold’s cat map and logistic map. In: Chaudhuri B, Kankanhalli M, Raman B (eds) Proceedings of 2nd international conference on computer vision & image processing. Advances in intelligent systems and computing, vol 704. Springer, Singapore
Pareek N, Patidar V, Sud K (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934
Rani A, Raman B, Kumar S (2014) A robust watermarking scheme exploiting balanced neural tree for rightful ownership protection. Multimedia Tools and Applications 72(3):2225–2248
Rivest RL, Shamir A, Adleman L (1978) On digital signatures and public key cryptosystems. Commun Ass Comput 21:120–126
Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Nat. Inst. Standard Technol., Gaithersburg, MD, USA, NIST Special Pub. 800-22, Revision 1a
Smid ME, Branstad DK (1988) Data encryption standard: past and future. Proc IEEE 76(5):550–559
Stallings W (2002) The advanced encryption standard. Cryptologia 26(3):165–188
Volos CK, Kyprianidis IM, Stouboulos IN (2013) Image encryption process based on chaotic synchronization phenomena. Signal Process 93(5):1328–1340
Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using dna sequence operations. Opt Lasers Eng 73:53–61
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13 (4):600–612
Wolf A, Swift JB, Swinney H, Vastano L, John A (1985) Determining Lyapunov exponents from a time series. Physica D: Nonlinear Phenomena 16:285–317
Wong KW (2008) Image encryption using chaotic maps. Springer 14:333–355
Wu Y, Noonan J, Agaian S (2011) Npcr and uaci randomness tests for image encryption. Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT) 1(2):31–38
Xu Y, Hua W, Yongge L (2014) Image encryption based on synchronization of fractional chaotic systems. Commun Nonlinear Sci Numer Simulat 19(10):3735–3744
Zhang W, Hai Y, Zhao Y, Zhu Z (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36–50
Zhang Y, Wang X (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf Sci 273(20):329–51
Zhou Y, Bao L, Chen C (2013) Image encryption using a new parametric switching chaotic system. Signal Process 93(11):3039–3052
Zhu Z, Zhang W, Wong K, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181:1171–1186
Acknowledgements
One of the authors, Farhan Musanna is thankful to IIT Roorkee and Ministry of Human Resource Development (MHRD), Government of India for the financial support for carrying out this work. This work is also supported by the Indian Space Research Organization through their project OGP-150 (RESPOND).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Musanna, F., Kumar, S. A novel fractional order chaos-based image encryption using Fisher Yates algorithm and 3-D cat map. Multimed Tools Appl 78, 14867–14895 (2019). https://doi.org/10.1007/s11042-018-6827-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6827-2