Skip to main content
Log in

A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

With the evolution of technologies, the size of an image data has been significantly increased. However, traditional image encryption schemes cannot handle the emerging problems in big data such as noise toleration and compression. In order to meet today’s challenges, we propose a new image encryption scheme based on chaotic maps and orthogonal matrices. The main core of the proposed scheme is based on the interesting properties of an orthogonal matrix. To obtain a random orthogonal matrix via the Gram Schmidt algorithm, a well-known nonlinear chaotic map is used in the proposed scheme to diffuse pixels values of a plaintext image. In the process of block-wise random permutation, the logistic map is employed followed by the diffusion process. The experimental results and security analyses such as key space, differential and statistical attacks show that the proposed scheme is secure enough and robust against channel noise and JPEG compression. In addition to complete encryption for higher security, it also supports partial encryption for faster processing as well.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Guan Z-H, Huang F, Guan W (2005) Chaos-based image encryption algorithm. Phys Lett A 346(1):153–157

    Article  MATH  Google Scholar 

  2. Gao T, Chen Z (2008) Image encryption based on a new total shuffling algorithm. Chaos Solitons Fractals 38(1):213–220

    Article  MathSciNet  MATH  Google Scholar 

  3. Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934

    Article  Google Scholar 

  4. Ye G, Huang X, Zhu C (2007) Image encryption algorithm of double scrambling based on ascii code of matrix element. In: 2007 international conference on computational intelligence and Security. IEEE, pp 843–847

  5. Ahmad J, Hwang SO (2015) Chaos-based diffusion for highly autocorrelated data in encryption algorithms. Nonlinear Dyn 82(4):1839–1850

    Article  MathSciNet  Google Scholar 

  6. Ahmad J, Hwang SO (2015) A secure image encryption scheme based on chaotic maps and affine transformation. Multimed Tools Appl 1–26. doi:10.1007/s11042-015-2973-y

  7. Baptista M (1998) Cryptography with chaos. Phys Lett A 240(1):50–54

    Article  MathSciNet  MATH  Google Scholar 

  8. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos Solitons Fractals 21(3):749–761

    Article  MathSciNet  MATH  Google Scholar 

  9. Li S, Zheng X (2002) Cryptanalysis of a chaotic image encryption method. In: IEEE international symposium on circuits and systems, 2002. (ISCAS’2002). vol 2. IEEE, pp II–708

  10. Wang Y, Wong K-W, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514–522

    Article  Google Scholar 

  11. Ahmad J, Hwang SO, Ali A (2015) An experimental comparison of chaotic and non-chaotic image encryption schemes. Wirel Pers Commun 84(2):901–918

    Article  Google Scholar 

  12. Matthews R (1989) On the derivation of a chaotic encryption algorithm. Cryptologia 13(1):29–42

    Article  MathSciNet  Google Scholar 

  13. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8(06):1259–1284

    Article  MathSciNet  MATH  Google Scholar 

  14. Mao Y, Chen G, Lian S (2004) A novel fast image encryption scheme based on 3d chaotic baker maps. Int J Bifurc Chaos 14(10):3613–3624

    Article  MathSciNet  MATH  Google Scholar 

  15. Zhang L, Liao X, Wang X (2005) An image encryption approach based on chaotic maps. Chaos Solitons Fractals 24(3):759–765

    Article  MathSciNet  MATH  Google Scholar 

  16. Behnia S, Akhshani A, Mahmodi H, Akhavan A (2008) A novel algorithm for image encryption based on mixture of chaotic maps. Chaos Solitons Fractals 35(2):408–419

    Article  MathSciNet  MATH  Google Scholar 

  17. Mazloom S, Eftekhari-Moghadam AM (2009) Color image encryption based on coupled nonlinear chaotic map. Chaos Solitons Fractals 42(3):1745–1754

    Article  MATH  Google Scholar 

  18. Zhu Z-L, Zhang W, Wong K-W, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171–1186

    Article  Google Scholar 

  19. Zhang Y-Q, Wang X-Y (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn 77(3):687–698

    Article  Google Scholar 

  20. Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 92(5):1202–1215

    Article  Google Scholar 

  21. Zhang Y-Q, Wang X-Y (2014) Spatiotemporal chaos in mixed linear-nonlinear coupled logistic map lattice. Phys A: Stat Mech Appl 402:104–118

    Article  MathSciNet  Google Scholar 

  22. Zhang Y-Q, Wang X-Y, Liu J, Chi Z-L (2016) An image encryption scheme based on the mlncml system using dna sequences. Opt Lasers Eng 82:95–103

    Article  Google Scholar 

  23. Zhang Y-Q, Wang X-Y (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf Sci 273:329–351

    Article  Google Scholar 

  24. Zhang Y-Q, Wang X-Y (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10–20

    Article  Google Scholar 

  25. Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16):3895–3903

    Article  Google Scholar 

  26. Wang X-Y, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62(3):615–621

    Article  MathSciNet  MATH  Google Scholar 

  27. Wang X-Y, Yu Q (2009) A block encryption algorithm based on dynamic sequences of multiple chaotic systems. Commun Nonlinear Sci Numer Simul 14(2):574–581

    Article  MathSciNet  MATH  Google Scholar 

  28. Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320–3327

    Article  MathSciNet  MATH  Google Scholar 

  29. Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108

    Article  MathSciNet  Google Scholar 

  30. Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18

    Article  Google Scholar 

  31. May RM et al (1976) Simple mathematical models with very complicated dynamics. Nature 261(5560):459–467

    Article  MATH  Google Scholar 

  32. Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption. Chaos Solitons Fractals 29(2):393–399

    Article  MATH  Google Scholar 

  33. Ye G (2010) Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn Lett 31(5):347–354

    Article  Google Scholar 

  34. Klema V, Laub AJ (1980) The singular value decomposition: its computation and some applications. IEEE Trans Autom Control 25(2):164–176

    Article  MathSciNet  MATH  Google Scholar 

  35. Wall ME, Rechtsteiner A, Rocha LM (2003) Singular value decomposition and principal component analysis. In: Berrar DP, Dubitzky W, Granzow M (eds) A practical approach to microarray data analysis. Springer, Berlin, pp 91–109

    Chapter  Google Scholar 

  36. De Lathauwer L, De Moor B, Vandewalle J (2000) A multilinear singular value decomposition. SIAM J Matrix Anal Appl 21(4):1253–1278

    Article  MathSciNet  MATH  Google Scholar 

  37. Meyer CD (2000) Matrix analysis and applied linear algebra. SIAM, Philadelphia

    Book  Google Scholar 

  38. Liu H, Wang X et al (2012) Image encryption using dna complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466

    Article  Google Scholar 

  39. Wang X, Luan D (2013) A novel image encryption algorithm using chaos and reversible cellular automata. Commun Nonlinear Sci Numer Simul 18(11):3075–3085

    Article  MathSciNet  MATH  Google Scholar 

  40. Wang X-Y, Chen F, Wang T (2010) A new compound mode of confusion and diffusion for block encryption of image based on chaos. Commun Nonlinear Sci Numer Simul 15(9):2479–2485

    Article  MathSciNet  MATH  Google Scholar 

  41. Ahmad J, Ahmed F (2012) Efficiency analysis and security evaluation of image encryption schemes. IJENS 23:18–31

    Google Scholar 

  42. Younas MB, Ahmad J (2014) Comparative analysis of chaotic and non-chaotic image encryption schemes. In: 2014 international conference on emerging technologies (ICET). IEEE, pp 81–86

Download references

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (2012002139) and funded by the Ministry of Education (2014054174). This research was also supported by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the Global IT Talent support program (NIPA-2014-H0905-14-1004) supervised by the NIPA (National IT Industry Promotion Agency).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jawad Ahmad.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahmad, J., Khan, M.A., Hwang, S.O. et al. A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices. Neural Comput & Applic 28 (Suppl 1), 953–967 (2017). https://doi.org/10.1007/s00521-016-2405-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-016-2405-6

Keywords

Navigation