Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

An image encryption algorithm based on bit level Brownian motion and new chaotic systems

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a new image encryption algorithm based on Brownian motion and new 1D chaotic system is introduced. Firstly, SHA 256 hash value of the plain image is used to generate the initial values and system parameters of chaotic systems for confusion and diffusion process. Then, 8 bitplanes of the plain image are scrambled based on Brownian motion, respectively, and the position and value of all pixels are changed simultaneously. After the confusion process, a two directional diffusion process is carried out, and it is made up of row diffusion (RD) and column diffusion (CD). The whole process can be repeated many rounds in order to get better encryption effect. Simulation results and security analysis show that our scheme has properties of large key space, high sensitivity to key, strong resisting statistical and differential attack. So, it has high security and important practical application in image transmission and image encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Auli-Llinas F, Marcellin MW (2012) Scanning order strategies for bitplane image coding. IEEE Trans Image Process 21(4):1920–1933

    Article  MathSciNet  Google Scholar 

  2. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749–761

    Article  MathSciNet  MATH  Google Scholar 

  3. Chen JX, Zhu ZL, Fu C, Yu H (2014) A fast image encryption scheme with a novel pixel swapping-based confusion approach. Nonlinear Dyn 77(4):1191–1207

    Article  Google Scholar 

  4. Fouda JSAE, Effa JY, Sabat SL, Ali M (2014) A fast chaotic block cipher for image encryption. Commun Nonlinear Sci 19(3):578–588

    Article  MathSciNet  Google Scholar 

  5. Francoisa M, Grosgesa T, Barchiesia D, Errab R (2012) A new image encryption scheme based on a chaotic function. Signal Process Image Commun 27:249–259

    Article  Google Scholar 

  6. Fu C, Meng WH, Zhan YF, Zhu ZL, Lau FC, Tse CK, Ma HF (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43(8):1000–1010

    Article  Google Scholar 

  7. Gao TG, Chen ZQ (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372(4):394–400

    Article  MATH  Google Scholar 

  8. Hua ZY, Zhou YC, Pun CM, Chen CLP (2015) 2D sine Logistic modulation map for image encryption. Inf Sci 297:80–94

    Article  Google Scholar 

  9. Kulsoom A, Xiao D, Aqeel-ur-Rehman, Abbas SA (2014) An efficient and noise resisitive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimed Tools Appl. doi:10.1007/s11042-014-2221-x

    Google Scholar 

  10. Liao XF, Lai SY, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90:2714–2722

    Article  MATH  Google Scholar 

  11. Ling C, Wu X, Sun S (1999) A general efficient method for chaotic signal estimation. IEEE Trans Signal Process 47(5):1424–1428

    Article  Google Scholar 

  12. Liu Q, Li PY, Zhang MC, Sui YX, Yang HJ (2015) A novel image encryption algorithm based on chaos maps with Markov properties. Commun Nonlinear Sci 20(2):506–515

    Article  MATH  Google Scholar 

  13. Liu SB, Sun J, Xu ZQ (2009) An improved image encryption algorithm based on chaotic system. J Comput 4:1091–1100

    Google Scholar 

  14. Liu HJ, Wang XY (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16–17):3895–3903

    Article  Google Scholar 

  15. Matthes R (1989) On the derivation of a chaotic encryption algorithm. Cryptologia 13(1):29–42

    Article  MathSciNet  Google Scholar 

  16. Mazloom S, Eftekhari-Moghadam AM (2009) Color image encryption based on coupled nonlinear chaotic map. Chaos, Solitons Fractals 42:1745–1754

    Article  MATH  Google Scholar 

  17. Moon D, Chung Y, Pan SB, Moon K, Chung K (2006) An efficient selective encryption of fingerprint images for embedded processors. Electron Telecommun Res Inst J 28(4):444–452

    Google Scholar 

  18. Wang Y, Wong KW, Liao XF, Chen GR (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514–522

    Article  Google Scholar 

  19. Wang XY, Xu DH (2014) A novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn 75(1–2):345–353

    Article  Google Scholar 

  20. Wang XY, Xu DH (2015) A novel image encryption scheme using chaos and Langton’s Ant cellular automaton. Nonlinear Dyn 79(4):2449–2456

    Article  MathSciNet  Google Scholar 

  21. Xu Y, Wang H, Li YG, Pei B (2014) Image encryption based on synchronization of fractional chaotic systems. Commun Nonlinear Sci 19(10):3735–3744

    Article  MathSciNet  Google Scholar 

  22. Ye G (2010) Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn Lett 31(5):347–354

    Article  Google Scholar 

  23. Ye GD (2014) A block image encryption algorithm based on wave transmission and chaotic systems. Nonlinear Dyn 75(3):417–427

    Article  Google Scholar 

  24. Zhang XP, Fan X, Wang JY, Zhao ZM (2014) A chaos-based image encryption scheme using 2D rectangular transform and dependent substitution. Multimed Tools Appl. doi:10.1007/s11042-014-2372-9

    Google Scholar 

  25. Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf Sci 273:329–351

    Article  Google Scholar 

  26. Zhang YQ, Wang XY (2014) Spatiotemporal chaos in mixed linear-nonlinear coupled logistic map lattice. Phys A 402:104–118

    Article  MathSciNet  Google Scholar 

  27. Zhang W, Wong Kwok-wo YH, Zhu ZL (2013) An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun Nonlinear Sci 18(8):2066–2080

    Article  MathSciNet  MATH  Google Scholar 

  28. Zhou YC, Bao L, Chen CLP (2013) Image encryption using a new parametric switching chaotic system. Signal Process 93(11):3039–3052

    Article  Google Scholar 

  29. Zhou YC, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182

    Article  Google Scholar 

  30. Zhou YC, Cao WJ, Chen CLP (2014) Image encryption using binary bitplane. Signal Process 100:197–207

    Article  Google Scholar 

  31. Zhou YC, Panetta K, Agaian S, Chen CLP (2012) Image encryption using P-Fibonacci transform and decomposition. Opt Commun 285(5):594–608

    Article  Google Scholar 

  32. Zhu CX, Xu SY, Hu YP, Sun KH (2014) Breaking a novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn 79(2):1511–1518

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (Grant No. 61203094), Science and Technology Foundation of Henan Province of China (Grant No. 152102210048), Natural Science Foundation of Educational Committee of Henan Province of China (Grant No. 14A413015), the joint funds between Henan Provincial Government and Ministry of Education of China (Grant No. SBGJ090603), the Research Foundation of Henan University (Grant No. xxjc20140006).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiuli Chai.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chai, X. An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multimed Tools Appl 76, 1159–1175 (2017). https://doi.org/10.1007/s11042-015-3088-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-3088-1

Keywords

Navigation