Skip to main content
Log in

A hybrid color image encryption method based on extended logistic map

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The existence of images containing our personal data or strategic information of states in the developing digital world is an indication that there will be malicious people who want to access this information. Undoubtedly, the attackers’ job will be a little more difficult if the valuable information of importance is transmitted by encrypting on common channels. In this regard, traditional and modern methods are used for encryption. Although traditional cryptosystems are widely used in text encryption processes, they are rarely used in image encryption processes for two reasons. The first is that the encryption process takes a long time due to the fact that the image size is larger than the text size. The second is that, while there are fewer data losses on the text in the decryption process, data losses on the image may cause the image’s structure to be disrupted. In this study, after giving brief information about encryption, the proposed hybrid image encryption method has been explained. In this method, firstly, an encryption process performed with affine and substitution methods from traditional cryptosystems has been applied, then an extended one-dimension (1D) chaotic map has been used to strengthen the encryption process. The superiority of the proposed method has been evaluated with performance analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Data availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Abd Elminaam DS, Abdual-Kader HM, Hadhoud MM (2010) Evaluating the performance of symmetric encryption algorithms. Int J Netw Secur 10(3):216–222

    Google Scholar 

  2. Ahmad J, Hwang SO (2016) A secure image encryption scheme based on chaotic maps and affine transformation. Multimed Tools Appl 75(21):13951–13976. https://doi.org/10.1007/s11042-015-2973-y

    Article  Google Scholar 

  3. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcat Chaos 16(08):2129–2151. https://doi.org/10.1142/S0218127406015970

    Article  MathSciNet  Google Scholar 

  4. Benssalah M, Rhaskali Y, Drouiche K (2021) An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography. Multimed Tools Appl 80(2):2081–2107. https://doi.org/10.1007/s11042-020-09775-9

    Article  Google Scholar 

  5. Cheng G, Wang C, Chen H (2019) A novel color image encryption algorithm based on hyperchaotic system and permutation-diffusion architecture. Int J Bifurcat Chaos 29(09):1950115. https://doi.org/10.1142/S0218127419501153

    Article  MathSciNet  Google Scholar 

  6. Das AK, Hajra S, Mandal MK (2021) RGB image encryption using microcontroller ATMEGA 32. Microsyst Technol 27(2):409–417. https://doi.org/10.1007/s00542-018-3980-5

    Article  Google Scholar 

  7. Demir N, Doğan S, Tokaç F (2018) The knapsack cryptography with bell number using python programming. Avrupa Bilim ve Teknoloji Dergisi 14:334–336. https://doi.org/10.31590/ejosat.487931

    Article  Google Scholar 

  8. Dong CE (2014) Color image encryption using one-time keys and coupled chaotic systems. Signal Process Image Commun 29(5):628–640. https://doi.org/10.1016/j.image.2013.09.006

    Article  Google Scholar 

  9. Hua Z, Zhang Y, Zhou Y (2020) Two-dimensional modular chaotification system for improving chaos complexity. IEEE Trans Signal Process 68:1937–1949. https://doi.org/10.1109/TSP.2020.2979596

    Article  MathSciNet  Google Scholar 

  10. Hua Z, Zhang K, Li Y, Zhou Y (2021) Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing. Signal Process 183:107998. https://doi.org/10.1016/j.sigpro.2021.107998

    Article  Google Scholar 

  11. Hua Z, Li J, Chen Y, Yi S (2021) Design and application of an S-box using complete Latin square. Nonlinear Dyn 104(1):807–825. https://doi.org/10.1007/s11071-021-06308-3

    Article  Google Scholar 

  12. Hua Z, Zhu Z, Chen Y, Li Y (2021) Color image encryption using orthogonal Latin squares and a new 2D chaotic system. Nonlinear Dyn 104:4505–4522. https://doi.org/10.1007/s11071-021-06472-6

    Article  Google Scholar 

  13. Huang L, Cai S, Xiong X, Xiao M (2019) On symmetric color image encryption system with permutation-diffusion simultaneous operation. Opt Lasers Eng 115:7–20. https://doi.org/10.1016/j.optlaseng.2018.11.015

    Article  Google Scholar 

  14. Hussain I, Shah T, Gondal MA (2012) Image encryption algorithm based on PGL (2, GF (2 8)) S-boxes and TD-ERCS chaotic sequence. Nonlinear Dynamics 70(1):181–187. https://doi.org/10.1007/s11071-012-0440-0

    Article  MathSciNet  Google Scholar 

  15. IEEE Computer Society. (1985) Standards Committee. Working group of the Microprocessor Standards Subcommittee, & American National Standards Institute. IEEE standard for binary floating-point arithmetic. IEEE. (Vol. 754)

  16. Iqbal N, Hanif M, Abbas S, Khan MA, Almotiri SH, Al Ghamdi MA (2020) DNA strands level scrambling based color image encryption scheme. IEEE Access 8:178167–178182. https://doi.org/10.1109/ACCESS.2020.3025241

    Article  Google Scholar 

  17. Jithin KC, Sankar S (2020) Colour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot set. J Inf Secur Appl 50:102428. https://doi.org/10.1016/j.jisa.2019.102428

    Article  Google Scholar 

  18. Kadir A, Hamdulla A, Guo WQ (2014) Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN. Optik 125(5):1671–1675. https://doi.org/10.1016/j.ijleo.2013.09.040

    Article  Google Scholar 

  19. Khalil N, Sarhan A, Alshewimy MA (2021) An efficient color/grayscale image encryption scheme based on hybrid chaotic maps. Opt Laser Technol 143:107326. https://doi.org/10.1016/j.optlastec.2021.107326

    Article  Google Scholar 

  20. Khan M, Jamal SS, Hazzazi MM, Ali KM, Hussain I, Asif M (2021) An efficient image encryption scheme based on double affine substitution box and chaotic system. Integration. 81:108–122. https://doi.org/10.1016/j.vlsi.2021.05.007

    Article  Google Scholar 

  21. Liang HR, Tao XY, Zhou NR (2016) Quantum image encryption based on generalized affine transform and logistic map. Quantum Inf Process 15(7):2701–2724. https://doi.org/10.1007/s11128-016-1304-1

    Article  MathSciNet  Google Scholar 

  22. Liu L, Zhang Q, Wei X (2012) A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38(5):1240–1248. https://doi.org/10.1016/j.compeleceng.2012.02.007

    Article  Google Scholar 

  23. Liu H, Wang X, Kadir A (2013) Color image encryption using Choquet fuzzy integral and hyper chaotic system. Optik-Int J Light and Electron Optics 124(18):3527–3533. https://doi.org/10.1016/j.ijleo.2012.10.068

    Article  Google Scholar 

  24. Liu H, Kadir A, Gong P (2015) A fast color image encryption scheme using one-time S-Boxes based on complex chaotic system and random noise. Opt Commun 338:340–347. https://doi.org/10.1016/j.optcom.2014.10.021

    Article  Google Scholar 

  25. Lone PN, Singh D (2020) Application of algebra and chaos theory in security of color images. Optik 218:165155. https://doi.org/10.1016/j.ijleo.2020.165155

    Article  Google Scholar 

  26. Lone PN, Singh D, Mir UH (2021) A novel image encryption using random matrix affine cipher and the chaotic maps. J Mod Opt 68(10):507–521. https://doi.org/10.1080/09500340.2021.1924885

    Article  MathSciNet  Google Scholar 

  27. Luo Y, Yu J, Lai W, Liu L (2019) A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimed Tools Appl 78(15):22023–22043. https://doi.org/10.1007/s11042-019-7453-3

    Article  Google Scholar 

  28. Mollaeefar M, Sharif A, Nazari M (2017) A novel encryption scheme for colored image based on high level chaotic maps. Multimed Tools Appl 76(1):607–629. https://doi.org/10.1007/s11042-015-3064-9

    Article  Google Scholar 

  29. Munir R (2012, October) Security analysis of selective image encryption algorithm based on chaos and CBC-like mode. In: 2012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA), IEEE, pp. 142–146. https://doi.org/10.1109/TSSA.2012.6366039

  30. Muthukumar P, Balasubramaniam P, Ratnavelu K (2015) Fast projective synchronization of fractional order chaotic and reverse chaotic systems with its application to an affine cipher using date of birth (DOB). Nonlinear Dyn 80(4):1883–1897. https://doi.org/10.1007/s11071-014-1583-y

    Article  Google Scholar 

  31. Naveenkumar SK, Panduranga HT (2013, July) Triple image encryption based on integer transform and chaotic map. In: 2013 International Conference on Optical Imaging Sensor and Security (ICOSS). IEEE. pp. 1–6. https://doi.org/10.1109/ICOISS.2013.6678416

  32. Pak C, Kim J, An K, Kim C, Kim K, Pak C (2020) A novel color image LSB steganography using improved 1D chaotic map. Multimed Tools Appl 79(1):1409–1425. https://doi.org/10.1007/s11042-019-08103-0

    Article  Google Scholar 

  33. Palathingal AG, George A, Thomas BA, Paul AR (2018) Enhanced cloud data security using combined encryption and steganography. Int Res J Eng Technol (IRJET) 5(03)

  34. Purnama B, Rohayani AH (2015) A new modified caesar cipher cryptography method with legibleciphertext from a message to be encrypted. Procedia Comput Sci 59:195–204. https://doi.org/10.1016/j.procs.2015.07.552

    Article  Google Scholar 

  35. Ray A, Potnis A, Dwivedy P, Soofi S, Bhade U (2017, October) Comparative study of AES, RSA, genetic, affine transform with XOR operation, and watermarking for image encryption. In 2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE). IEEE. pp. 274–278. https://doi.org/10.1109/RISE.2017.8378166

  36. Sabir S, Guleria V (2021) Multi-layer color image encryption using random matrix affine cipher, RP2DFrHT and 2D Arnold map. Multimed Tools Appl 80:27829–27853. https://doi.org/10.1007/s11042-021-11003-x

    Article  Google Scholar 

  37. Şahin S, Güzelis C (2010) “Chaotification” of real systems by dynamic state feedback. IEEE Antennas and Propag Mag 52(6):222–233. https://doi.org/10.1109/MAP.2010.5723276

    Article  Google Scholar 

  38. Sari RN, Hayati RS (2018, August) Beaufort cipher algorithm analysis based on the power lock-Blum Blum Shub in securing data. In: 2018 6th International Conference on Cyber and IT Service Management (CITSM). IEEE, pp. 1–4. https://doi.org/10.1109/CITSM.2018.8674368

  39. Sayed WS, Radwan AG, Fahmy HA, Elsedeek A (2021) Trajectory control and image encryption using affine transformation of Lorenz system. Egypt Inform J 22(2):155–166. https://doi.org/10.1016/j.eij.2020.07.002

    Article  Google Scholar 

  40. Shah D, Shah T, Jamal SS (2020) A novel efficient image encryption algorithm based on affine transformation combine with linear fractional transformation. Multidim Syst Sign Process 31(3):885–905. https://doi.org/10.1007/s11045-019-00689-w

    Article  Google Scholar 

  41. Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379–423. https://doi.org/10.1002/j.1538-7305.1948.tb01338.x

    Article  MathSciNet  Google Scholar 

  42. Singh G (2013) A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int J Comput Appl 67(19)

  43. Taha AA, Elminaam DSA, Hosny KM (2018) An improved security schema for mobile cloud computing using hybrid cryptographic algorithms. Far East Journal of. Electron Commun 18(4):521–546. https://doi.org/10.17654/EC018040521

    Article  Google Scholar 

  44. Tong XJ (2013) Design of an image encryption scheme based on a multiple chaotic map. Commun Nonlinear Sci Numer Simul 18(7):1725–1733. https://doi.org/10.1016/j.cnsns.2012.11.002

    Article  MathSciNet  Google Scholar 

  45. Wang X, Zhao Y, Zhang H, Guo K (2016) A novel color image encryption scheme using alternate chaotic mapping structure. Opt Lasers Eng 82:79–86. https://doi.org/10.1016/j.optlaseng.2015.12.006

    Article  Google Scholar 

  46. Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290–299. https://doi.org/10.1016/j.jss.2011.08.017

    Article  Google Scholar 

  47. Wu X, Kan H, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24–39. https://doi.org/10.1016/j.asoc.2015.08.008

    Article  Google Scholar 

  48. Wu X, Wang K, Wang X, Kan H, Kurths J (2018) Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process 148:272–287. https://doi.org/10.1016/j.sigpro.2018.02.028

    Article  Google Scholar 

  49. Xiong Z, Wu Y, Ye C, Zhang X, Xu F (2019) Color image chaos encryption algorithm combining CRC and nine palace map. Multimed Tools Appl 78(22):31035–31055. https://doi.org/10.1007/s11042-018-7081-3

    Article  Google Scholar 

  50. Zaidan BB, Zaidan AA, Mwafak H (2009) New comprehensive study to assess comparatively the QKD, XKMS, KDM in the PKI encryption algorithms. Int J Comput Sci Eng 1(3):263–268

    Google Scholar 

  51. Zhou J, Zhou NR, Gong LH (2020) Fast color image encryption scheme based on 3D orthogonal Latin squares and matching matrix. Opt Laser Technol 131:106437. https://doi.org/10.1016/j.optlastec.2020.106437

    Article  Google Scholar 

  52. Zhu H, Zhao C, Zhang X, Yang L (2014) An image encryption scheme using generalized Arnold map and affine cipher. Optik 125(22):6672–6677. https://doi.org/10.1016/j.ijleo.2014.06.149

    Article  Google Scholar 

Download references

Acknowledgments

The authors would like to thank the anonymous reviewers for their valuable comments and suggestions that greatly contribute to improving the quality of the manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nurettin Doğan.

Ethics declarations

Competing interests

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Çelik, H., Doğan, N. A hybrid color image encryption method based on extended logistic map. Multimed Tools Appl 83, 12627–12650 (2024). https://doi.org/10.1007/s11042-023-16215-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-16215-x

Keywords

Navigation