Abstract
This paper proposes a robust chaotic encryption algorithm based on substitution and permutation. We offer hyperchaotic maps with high ergodicity and large keyspace with a maximum value of \(10^{14}\). Also, we propose an optimization S-box with a high nonlinearity value and without fixed and reverse fixed points. The critical sensitivity test of the proposed algorithm shows that the sensitivity of the keys dynamic scheme is \(10^{-14}\). Comparative analysis of our proposed encryption scheme with other existing image encryption methods shows that the proposed method also has better correlation values between two-pixel adjacents, better UACI and NPCR values, and acceptable speed. The proposed encryption algorithm can resist several attacks and has high security. We can apply our robust scheme in applications requiring increased protection and ensuring secure communication by images.
Similar content being viewed by others
Data Availability
The authors confirm that the data supporting the findings of this study are available within the article [and/or] its supplementary materials.
References
Srnvasu PN, Norwawi N, Amiripalli SS, Deepalakshmi P (2021) Secured compression for 2D medical images through the manifold and fuzzy trapezoidal correlation function. Gazi Univ J Sci 35(4):1372–1391
Lalitha RVSS, Srinivasu PN (2017) An efficient data encryption through image via prime order symmetric key and bit shuffle technique. In: Computer Communication, Networking and Internet Security: Proceedings of IC3T 2016 pp 261-270. Springer Singapore
Kumar K, Ramkumar KR, Kaur A (2022) A lightweight AES algorithm implementation for encrypting voice messages using field programmable gate arrays. J King Saud Univ, Comp Info 34(6):3878–3885
Rahul B, Kuppusamy K, Senthilrajan A (2023) Dynamic DNA cryptography-based Image Encryption Scheme using Multiple Chaotic Maps and SHA-256 hash function. Optik, 171253
Zhang B, Rahmatullah B, Wang SL, Almutairi HM, Xiao Y, Liu X, Liu Z (2023). A variable dimensional chaotic map-based medical image encryption algorithm with multi-mode. Med Biol Eng Comput, 1-32
Tong H, Li T, Xu Y, Su X, Qiao G (2023) Chaotic coyote optimization algorithm for image encryption and steganography. Multimed Tools Appl, 1–27
Rakheja P, Khurana M (2023) Multiple iris image encryption using phase retrieval mask, QZ algorithm and umbrella map in hybrid transform domain. Opt Quantum Electron 55(10):878
Khan H, Hazzazi MM, Jamal SS, Hussain I, Khan M (2023) New color image encryption technique based on three-dimensional logistic map and Grey wolf optimization based generated substitution boxes. Multimed Tools Appl 82(5):6943–6964
Wang J, Geng YC, Han L et al (2019) Quantum Image Encryption Algorithm Based on Quantum Key Image. Int J Theor Phys 58:308–322
Wang J, Chen J, Wang F, Ni R (2022) Optical image encryption scheme based on quantum s-box and meaningful ciphertext generation algorithm. Opt Commun 525:128834
Wang J, Chen J, Wang F, Ni R (2022) Optical image encryption scheme based on quantum s-box and meaningful ciphertext generation algorithm. Opt Commun 525:128834
Wang B, Xu J, Song H (2017) Research on the improved algorithm for image quantum encryption in multimedia networks. Comput Electr Eng 62:414–428
Xiao X, He X, Zhang Y, Dong X, Yang LX, Xiang Y (2023) Blockchain-based reliable image copyright protection. IET Blockchain
Keshta I, Aoudni Y, Sandhu M, Singh A, Xalikovich PA, Rizwan A, Lalar S (2023) Blockchain aware proxy re-encryption algorithm-based data sharing scheme. Phys Commun 58:102048
Qamar S (2023) Federated convolutional model with cyber blockchain in medical image encryption using Multiple Rossler lightweight Logistic sine mapping. Comput Electr Eng 110:108883
Vengadapurvaja AM, Nisha G, Aarthy R, Sasikaladevi N (2017) An efficient homomorphic medical image encryption algorithm for cloud storage security. Procedia Comput Sci 115:643–650
Xie D, Chen F, Luo Y, Li L (2019) One-to-many image encryption with privacy-preserving homomorphic outsourced decryption based on compressed sensing. Digit Signal Process 95:102587
Xiong L, Dong D (2019) Reversible data hiding in encrypted images with somewhat homomorphic encryption based on sorting block-level prediction-error expansion. J Inf Secur Appl 47:78–85
Zhang X, Li C, Tian L (2023) Advanced audio coding steganography algorithm with distortion minimization model based on audio beat. Comput Electr Eng 106:108580
Li Z, Yang X, Shen K, Jiang F, Jiang J, Ren H, Li Y (2023) Adversarial feature hybrid framework for steganography with shifted window local loss. Neural Networks
Ma B, Li K, Xu J, Wang C, Li J, Zhang L (2023) Enhancing the security of image steganography via multiple adversarial networks and channel attention modules. Digit Signal Process, 104121
Shahna KU (2023) Novel chaos based cryptosystem using four-dimensional hyper chaotic map with efficient permutation and substitution techniques. Chaos Solit Fractals 170:113383
Cao W, Cai H, Hua Z (2022) n-Dimensional Chaotic Map with application in secure communication. Chaos Solit Fractals 163:112519
Ding D, Wang W, Yang Z, Hu Y, Wang J, Wang M, Zhu H (2023) An n-dimensional modulo chaotic system with expected Lyapunov exponents and its application in image encryption. Chaos Solit Fractals 174:113841
Sun B, Zhang C, Peng Q, Du B (2023) Color image encryption algorithm based on 5D memristive chaotic system and group scrambling. Optik 287:171132
Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44–62
Liang Q, Zhu C (2023) A new one-dimensional chaotic map for image encryption scheme based on random DNA coding. Opt Laser Technol 160:109033
Alawida M, Samsudin A, Teh JS, Alkhawaldeh RS (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45–58
Jalal AA, Amen AI, Sulaiman NA (2020) Darboux integrability of the simple chaotic flow with a line equilibria differential system. Chaos Solit Fractals 135:109712
Ostrovskii VY, Rybin VG, Karimov AI, Butusov DN (2022) Inducing multistability in discrete chaotic systems using numerical integration with variable symmetry. Chaos Solit Fractals 165:112794
Gao S, Wu R, Wang X, Wang J, Li Q, Wang C, Tang X (2023) A 3D model encryption scheme based on a cascaded chaotic system. Signal Process 202:108745
He Y, Yang S, Xu Q (2013) Short-term cascaded hydroelectric system scheduling based on chaotic particle swarm optimization using improved logistic map. Commun Nonlinear Sci Numer Simul 18(7):1746–1756
Wang X, Liu P (2022) Image encryption based on roulette cascaded chaotic system and alienated image library. Vis Comput 38(3):763–779
Yan M, Jie J (2022) Fractional-order multiwing switchable chaotic system with a wide range of parameters. Chaos Solit Fractals 160:112161
Vadivel R, Sabarathinam S, Wu Y, Chaisena K, Gunasekaran N (2022) New results on T-S fuzzy sampled-data stabilization for switched chaotic systems with its applications. Chaos Solit Fractals 164:112741
Zhang X, Xiao J (2022) Complex compound-combination multi switching anti-synchronization of fractional-order complex chaotic systems and integer-order complex chaotic systems. Int J Dyn Control 10(2):525–542
Liang Q, Zhu C (2023) A new one-dimensional chaotic map for image encryption scheme based on random DNA coding. Opt Laser Technol 160:109033
Farah MB, Farah A, Farah T (2020) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dynamics 99(4):3041–3064
Zhu D, Tong X, Wang Z, Zhang M (2022) A novel lightweight block encryption algorithm based on combined chaotic system. J Inf Secur Appl 69:103289
Belazi A, Abd El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155–170
Zhu S, Deng X, Zhang W, Zhu C (2023) Secure image encryption scheme based on a new robust chaotic map and strong S-box. Math Comput Simul 207:322–346
Liu H, Liu J, Ma C (2023) Constructing dynamic strong S-Box using 3D chaotic map and application to image encryption. Multimed Tools Appl 82(16):23899–23914
Liu H, Kadir A, Xu C (2020) Cryptanalysis and constructing S-box based on chaotic map and backtracking. Appl Math Comput 376:125153
Si Y, Liu H, Chen Y (2021) Constructing keyed strong S-Box using an enhanced quadratic map. Int J Bifurc Chaos 31(10):2150146
Zhao M, Liu H, Niu Y (2023) Batch generating keyed strong S-Boxes with high nonlinearity using 2D hyper chaotic map. Integration 92:91–98
Kaur M, Singh D, Sun K, Rawat U (2020) Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map. Future Gener Comput Sys 107:333–350
Kanso A, Ghebleh M (2012) A novel image encryption algorithm based on a 3D chaotic map. Commun Nonlinear Sci Numer Simul 17(7):2943–2959
Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers. IEEE Trans Circuits Syst I, Fundam Theory Appl 48(2):163–169
Dawson M, Tavares S (1991) An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. In: Advances in Cryptology: Proceedings of EURO-CRYPT_91. Lecture Notes in Computer Science, pp 352–367
Wang Y, Xie Q, Wu Y, Du B (2009) A software for S-box performance analysis and test. 2009 International Conference on Electronic Commerce and Business Intelligence. Beijing, China, pp 125–128
Li C, Luo G, Qin K, Li C (2017) An image encryption scheme based on chaotic tent map[J]. Nonlinear Dyn 87(1):127–133
Dawson M, Tavares S (1991) An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. In: Advances in Cryptology: Proceedings of EURO-CRYPT_91. Lecture Notes in Computer Science, pp. 352–367
Wang Y, Xie Q, Wu Y, Du B (2009) A software for S-box performance analysis and test. 2009 International Conference on Electronic Commerce and Business Intelligence. Beijing, China, pp 125–128
Adams C, Tavares S (1989) Chapter-4.In: Advances in Cryptology: Proccedings of CRYPTO_89. Lecture Notes in Computer Science, pp 612-615
Webster A, Tavares S (1986) On the design of S-boxes. In: Advances in Cryptology: Proc. of Crypto’85, Santa Barbara, USA. Lecture Notes in Computer Science vol. 218, pp 523–534
Pieprzyk J, Finkelsten G (1988) Towards effective nonlinear cryptosystem design. In: IEE Proc Part E Computers Digital Techn 135:325–35
Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4(1):3–72
Matsui M (1994) Linear cryptanalysis method of DES cipher. Advances in Cryptology, Proc. Eurocrypt’93. LNCS. Springer, Berlin, pp 386–397
Hof PR, Van Der Gucht E (2007) Structure of the cerebral cortex of the humpback whale, Megaptera novaeangliae (Cetacea, Mysticeti, Balaenopteridae). Anat Rec 290:1–31
Watkins WA, Schevill WE (1979) Aerial observation of feeding behavior in four baleen whales: Eubalaena glacialis, Balaenoptera borealis, Megaptera novaean-gliae, and Balaenoptera physalus. J Mammal 155-63
Hua Z, Zhou Y, Pun CM, Philip Chen CL (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80–94
Tang G, Liao X, Chen Y (2005) A novel method for designing S-boxes based on chaotic maps. Chaos Solit Fractals. 23:413–419
Chen G, Chen Y, Liao X (2007) An extended method for obtaining S-boxes based on 3-dimensional chaotic baker maps. Chaos Solit Fractals 31:571–579
zkaynak F, zer AB (2010) A method for designing strong S-boxes based on chaotic Lorenz system. Phys Lett A 374:3733–3738
Khan M, Shah T, Mahmood H, Gondal MA, Hussain I (2012) A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems. Nonlinear Dyn 70:2303–2311
Hussain I, Shah T, Gondal MA (2012) A novel approach for designing substitution-boxes based on nonlinear chaotic algorithm. Nonlinear Dyns 70:1791–1794
Belazi A, El-Latif AAA (2017) A simple yet efficient S-box method based on chaotic sine map. Optik-Int J Light and Elect Optics 130:1438–1444
Majid K, Tariq S, Syeda Iram B (2016) A new implementation of chaotic S-boxes in CAPTCHA. Signal Image Video Process. 10(2):293–300
Majid K, Tariq S (2014) A novel image encryption technique based on Hénon chaotic map and S8 symmetric group. Neural Comput Appl 25(7):1717–1722
Özkaynak F, Çelik V, Özer AB (2017) A new S-box construction method based on the fractional-order chaotic Chen system. Signal, Image and Video Process 11(4):659–664
Zahmoul R, Ejbali R, Zaied M (2017) Image encryption based on new Beta chaotic maps. Opt Lasers Eng 96:39–49
Belazi A, Abd El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155–70 (ISSN 0165-1684)
Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–8
Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–8
Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62(3):615–21
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715
Biham E, Shamir A (2012) Differential cryptanalysis of the data encryption standard. Springer Sci Business Media
Chen GR, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solit Fractals 21(3):749–761
Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos 16:2129–2151
Fu C, Lin B, Miao Y, Liu X, Chen J (2011) A novel chaos-based bit-level permutation scheme for digital image encryption. Opt Commun 284:5415–5423
IEEE Computer Society (2015) IEEE Standard for Binary Floating-Point Arithmetic. Available online: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp= &arnumber=30711 accessed on 14-Oct-2015
Zhang YQ, Wang XY (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10–20
Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf Sci 273:329–351
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest
The authors declare no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Farah, T., Alshammari, B.M. A novel image encryption scheme based on a new hyperchaotic map. Multimed Tools Appl 83, 34537–34579 (2024). https://doi.org/10.1007/s11042-023-16873-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-16873-x