Skip to main content
Log in

A novel image cipher based on mixed transformed logistic maps

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a novel secure cryptosystem is proposed for direct encryption of color images, based on transformed logistic maps. The proposed cipher provides good confusion and diffusion properties that ensures extremely high security due to the mixing of colors pixels. The encryption scheme makes use of six odd secret keys and chaotic keys for each operation. The operations include initial permutation of all pixels with six odd keys, nonlinear diffusion using first chaotic key, xoring the second chaotic key with resultant values and zig-zag diffusion with third chaotic key. The proposed scheme supports key sizes ranging from 192 to 400 bits. The security and performance of the proposed image encryption technique have been analysed thoroughly using statistical analysis, key sensitivity analysis, differential analysis, key space analysis, entropy analysis and performance analysis. Results of the various types of analyses are showing that the proposed image encryption technique is more secure and fast and hence suitable for the real-time applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Alvarez G, Li S (2009) Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption. Commun Nonlinear Sci Numer Simulat 14:3743–3749

    Article  Google Scholar 

  2. Baptista MS (1998) Cryptography with chaos. Phys Lett A 240:50–54

    Article  MATH  MathSciNet  Google Scholar 

  3. Chen GR, Mao YB, Charles KC (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21:749–761

    Article  MATH  MathSciNet  Google Scholar 

  4. Gao TG, Chen ZQ (2008) Image encryption based on a new total shuffling algorithm. Chaos, Solitons Fractals 38:213–220

    Article  MATH  MathSciNet  Google Scholar 

  5. Jun H, Zheng J, Li Z-b, Qian H-f (2009) An improved color image encryption based on chaotic map and OCML model. In: IEEE international conference on networks security, wireless communications and trusted computing, pp 365–369

  6. Liu S, Sun J, Xu Z, Liu J (2008) Analysis on an image encryption algorithm. In: IEEE international workshop on education technology and training & international workshop on geoscience and remote sensing, pp 803–806

  7. Matthew R (1989) On the derivation of a chaotic encryption algorithm. Cryptologia 8(1):29–42

    Article  Google Scholar 

  8. Menezes AJ, Oorschot PCV, Vanstone SA (1997) Handbook of applied cryptography. CRC Press, Boca Raton, FL

    MATH  Google Scholar 

  9. Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24:926–934

    Article  Google Scholar 

  10. Patidar V, Pareek NK, Sud KK (2009) A new substitution diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simulat 14:3056–3075

    Article  Google Scholar 

  11. Rhouma R, Solak E, Belghith S (2010) Cryptanalysis of a new substitution-diffusion based image cipher. Commun Nonlinear Sci Numer Simulat 15:1887–1892

    Article  MATH  MathSciNet  Google Scholar 

  12. Sabery MK, Yaghoobi M (2008) A new approach for image encryption using chaotic logistic map. In: IEEE international conference on advanced computer theory and engineering, pp 585–590

  13. Schneier B (1996) Applied cryptography: protocols algorithms and source code in C. Wiley, New York, USA

    MATH  Google Scholar 

  14. ShuTang LIU, Sun FY (2009) Spatial chaos-based image encryption design. Sci China Ser G Phys Mech Astron 52(2):177–183

    Article  Google Scholar 

  15. Xiao H-P, Zhang G-J (2006) An image encryption scheme based on chaotic systems. In: IEEE international conference on machine learning and cybernetics, pp 2707–2711

  16. Xie J, Yang C, Tian L (2009) An encryption algorithm based on transformed logistic map. In: IEEE international conference on network security, wireless communications and truested computing, pp 111–114

  17. Xu S-J, Wang Y-L, Wang J-Z, Tian M (2008) A novel image encryption scheme based on chaotic maps. In: IEEE ICSP, pp 1014–1018

  18. Zhang Y, Wang Y, Shen X (2007) A chaos-based image encryption algorithm using alternate structure. Sci China Ser F Inf Sci 50(3):334-341

    Article  MATH  MathSciNet  Google Scholar 

Download references

Acknowledgements

This research is partially supported by the All India Council for Technical Education, New Delhi, India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to I. Shatheesh Sam.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Sam, I.S., Devaraj, P. & Bhuvaneswaran, R.S. A novel image cipher based on mixed transformed logistic maps. Multimed Tools Appl 56, 315–330 (2012). https://doi.org/10.1007/s11042-010-0652-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-010-0652-6

Keywords

Navigation