Skip to main content
Log in

Digital Image Encryption Scheme Based on Multiple Chaotic Systems

  • Original Paper
  • Published:
Sensing and Imaging: An International Journal Aims and scope Submit manuscript

Abstract

Image encryption is a challenging task due to the significant level of sophistication achieved by forgerers and other cybercriminals. Advanced encryption methods for secure transmission, storage, and retrieval of digital images are increasingly needed for a number of military, medical, homeland security, and other applications. In this paper, we introduce a new digital image encryption algorithm. The new algorithm employs multiple chaotic systems and cryptographic primitive operations within the encryption process, which are efficiently implemented on modern processors, and adopts round keys for encryption using a chaotic map. Experiments conducted show that the proposed algorithm possesses robust security features such as fairly uniform distribution, high sensitivity to both keys and plainimages, almost ideal entropy, and the ability to highly de-correlate adjacent pixels in the cipherimages. Furthermore, it has a large key space, which greatly increases its security for image encryption applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Pareek, N. K., Patidar, V., & Sud, K. K. (2003). Discrete chaotic cryptography using external key. Physics Letters A, 309, 75–82.

    Article  MathSciNet  MATH  Google Scholar 

  2. Chen, G., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitions and Fractals, 21, 749–761.

    Article  MathSciNet  MATH  Google Scholar 

  3. Guan, Z.-H., Huang, F., & Guan, W. (2005). Chaos based image encryption algorithm. Physics Letters A, 346, 153–157.

    Article  MATH  Google Scholar 

  4. Gao, T., & Chen, Z. (2008). A new image encryption algorithm based on hyper-chaos. Physics Letters A, 372, 394–400.

    Article  MATH  Google Scholar 

  5. Lian, S. (2009). Efficient image or video encryption based on spatiotemporal chaos system. Chaos, Solitons & Fractals, 40, 2509–2519.

    Article  MathSciNet  MATH  Google Scholar 

  6. Patidar, V., Pareek, N. K., & Sud, K. K. (2009). A new substitution–diffusion based image cipher using chaotic standard and logistic maps. Communications in Nonlinear Science and Numerical Simulation, 14, 3056–3075.

    Google Scholar 

  7. Patidar, V., Pareek, N. K., Purohit, G., & Sud, K. K. (2010). Modified substitution–diffusion image cipher using chaotic standard and logistic maps. Communications in Nonlinear Science and Numerical Simulation, 15, 2755–2765.

    Article  MathSciNet  MATH  Google Scholar 

  8. Rhouma, R., & Belghith, S. (2008). Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem. Physics Letters A, 372, 5790–5794.

    Article  MATH  Google Scholar 

  9. G. Alvarez, & S. Li, Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption. Communications in Nonlinear Science and Numerical Simulation (2009), doi:10.1016/j.cnsns.2009.02.033.

  10. Rhouma, R., & Belghith, S. (2008). Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Physics Letters A, 372, 5973–5978.

    Article  MATH  Google Scholar 

  11. Li, C., Li, S., & Lo, K.-T. (2011). Breaking a modified substitution–diffusion image cipher based on chaotic standard and logistic maps. Communications in Nonlinear Science and Numerical Simulation, 16(2), 837–843.

    Article  MathSciNet  MATH  Google Scholar 

  12. Amin, M., Abd El-Latif, A. A. (2010). Efficient modified RC5 based on chaos adapted to image encryption. Journal of Electronic Imaging, 19(1). doi:10.1117/1.3360179

  13. Amin, M., Faragallah, O. S., & Abd El-Latif, A. A. (2010). A chaotic block cipher algorithm for image cryptosystems. Communications in Nonlinear Science and Numerical Simulation, 15, 3484–3497.

    Article  MathSciNet  MATH  Google Scholar 

  14. Faragallah, O. S. (2011). An efficient block encryption cipher based on chaotic maps for secure multimedia applications. Information Security Journal: A Global Perspective, 20(3), 135–147.

    Google Scholar 

  15. Lian, S., Sun, J., & Wang, Z. (2005). A block cipher based on a suitable use of chaotic standard map. Chaos, Solitons & Fractals, 26, 117–129.

    Article  MATH  Google Scholar 

  16. Faragallah, O. S. (2011). Digital image encryption based on the RC5 Block Cipher Algorithm. Sensing and Imaging: An International Journal, 12(3–4), 73–94, doi:10.1007/s11220-011-0062-5.

  17. Rivest, R. L., Robshaw, M. J. B., Sidney, R., & Yin, Y. L. (1998). The RC6 Block Cipher. Version1. 1 August 20, 1998. URL:ftp://ftp.rsasecurity.com/pub/rsalabs/rc6/rc6v11.pdf.

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (Project Number: 60832010), the Fundamental Research Funds for the Central Universities (Grant No.HIT.NSRIF.2009050) and Higher Education Commission of Egypt.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ahmed A. Abd El-Latif.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Abd El-Latif, A.A., Li, L., Zhang, T. et al. Digital Image Encryption Scheme Based on Multiple Chaotic Systems. Sens Imaging 13, 67–88 (2012). https://doi.org/10.1007/s11220-012-0071-z

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11220-012-0071-z

Keywords

Navigation