Skip to main content
Log in

An Efficient Image Encryption Scheme Based on a Peter De Jong Chaotic Map and a RC4 Stream Cipher

  • 3DR Express
  • Published:
3D Research

Abstract

Security is a vital issue in communication and storage of the images and encryption is one of the ways to ensure the security. This paper proposes an efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher. A Peter De Jong map is employed to determine the initial keys for the RC4 stream generator and also during permutation stage. The RC4 stream generator is utilized to generate the pseudo random numbers for the pixel value rotation and diffusion operations. Each encryption round is comprised of three stages: permutation, pixel value rotation and diffusion. The permutation is based on scrambling the rows and columns, in addition, circular rotations of the rows and columns in alternate orientations. The second stage circularly rotates each and every pixel value by utilizing M × N pseudo random numbers. The last stage carries out the diffusion twice by scanning the image in two different ways. Each of the two diffusions accomplishes the diffusion in two orientations (forward and backward) with two previously diffused pixels and two pseudo random numbers. The security and performance of the proposed method is assessed thoroughly by using key space, statistical, differential, entropy and performance analysis. Moreover, two rounds of the call to the encrypt function provide the sufficient security. The experimental results show that the proposed encryption scheme is computationally fast with high security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. El-Latif, A. A. A., Li, L., Zhang, T., Wang, N., Song, X., & Niu, X. (2012). Digital image encryption scheme based on multiple chaotic systems. Sensing and Imaging, 13(2), 67–88. doi:10.1007/s11071-012-0409-z.

    Article  Google Scholar 

  2. Francois, M., Grosges, T., Barchiesi, D., & Erra, R. (2012). A new image encryption scheme based on a chaotic function. Signal Processing, 27(3), 249–259. doi:10.1016/j.image.2011.11.003.

    Google Scholar 

  3. Sam, S., Devaraj, P., & Bhuvaneswaran, R. S. (2012). A novel image cipher based on a mixed transformed logistic maps. Multimedia Tools and Applications, 56(2), 315–330. doi:10.1007/s11042-010-0652-6.

    Article  Google Scholar 

  4. Taneja, N., Raman, B., & Gupta, I. (2012). Combinational domain encryption for still visual data. Multimedia Tools and Applications, 159(3), 775–793. doi:10.1007/s11042-011-0775-4.

    Article  Google Scholar 

  5. Sam, S., Devaraj, P., & Bhuvaneswaran, R. S. (2012). An intertwining chaotic maps based image encryption scheme. Nonlinear Dynamics, 69(4), 1995–2007. doi:10.1007/s11071-012-0402-6.

    Article  MathSciNet  Google Scholar 

  6. Zhang, X., Mao, Y., & Zhao, Z. (2014). An efficient chaotic image encryption based on alternate circular S-boxes. Nonlinear Dynamics, 78(1), 359–369. doi:10.1007/s11071-014-1445-7.

    Article  Google Scholar 

  7. Zhou, Y., Bao, L., & Chen, C. L. P. (2013). Image encryption using a new parametric switching chaotic system. Signal Processing, 93(11), 3039–3052. doi:10.1016/j.sigpro.2013.04.021.

    Article  Google Scholar 

  8. Ye, G., & Wong, K. W. (2012). An efficient chaotic image encryption algorithm based on a generalized Arnold map. Nonlinear Dynamics, 69, 2079–2087. doi:10.1007/s11071-012-0409-z.

    Article  MathSciNet  Google Scholar 

  9. El-Latif, A. A. A., Li, L., & Niu, X. (2014). A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimedia Tools and Applications, 70, 1559–1584. doi:10.1007/s11042-012-1173-2.

    Article  Google Scholar 

  10. Huang, C. K., Liao, C. W., Hsu, S. L., & Jeng, Y. C. (2013). Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommunication Systems, 52(2), 563–571. doi:10.1007/s11235-011-9461-0.

    Google Scholar 

  11. Ye, Guodong. (2010). Image scrambling encryption algorithm of pixel bit based on chao map. Pattern Recognition Letters, 31(5), 347–354. doi:10.1016/j.patrec.2009.11.008.

    Article  Google Scholar 

  12. Yoon, J. W., & Kim, H. (2010). An image encryption scheme with a pseudorandom permutation based on chaotic maps. Communications in Nonlinear Science and Numerical Simulations, 15(12), 3998–4006. doi:10.1016/j.cnsns.2010.01.041.

    Article  MATH  MathSciNet  Google Scholar 

  13. Zhang, L., Liao, X., & Wang, X. (2004). An image encryption approach based on chaotic maps. Chaos, Solitons & Fractals, 24(3), 759–765. doi:10.1016/j.chaos.2004.09.035.

    Article  MathSciNet  Google Scholar 

  14. Liu, Y., Tian, S., Hu, W., & Xing, C. (2012). Design and statistical analysis of a new chaotic block cipher for wireless sensor networks. Communications in Nonlinear Science and Numerical Simulation, 17(8), 3267–3278. doi:10.1016/j.cnsns.2011.11.040.

    Article  MathSciNet  Google Scholar 

  15. Wong, K. K., Carter, G., Dawson, E. (2010). An analysis of the RC4 family of stream ciphers against algebraic attacks. Proceedings 8th Australasian information security conference, 103, pp. 67–74.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gururaj Hanchinamani.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hanchinamani, G., Kulkarni, L. An Efficient Image Encryption Scheme Based on a Peter De Jong Chaotic Map and a RC4 Stream Cipher. 3D Res 6, 30 (2015). https://doi.org/10.1007/s13319-015-0062-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s13319-015-0062-7

Keywords

Navigation