Skip to main content
Log in

A novel image encryption scheme based on a new hyperchaotic map

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper proposes a robust chaotic encryption algorithm based on substitution and permutation. We offer hyperchaotic maps with high ergodicity and large keyspace with a maximum value of \(10^{14}\). Also, we propose an optimization S-box with a high nonlinearity value and without fixed and reverse fixed points. The critical sensitivity test of the proposed algorithm shows that the sensitivity of the keys dynamic scheme is \(10^{-14}\). Comparative analysis of our proposed encryption scheme with other existing image encryption methods shows that the proposed method also has better correlation values between two-pixel adjacents, better UACI and NPCR values, and acceptable speed. The proposed encryption algorithm can resist several attacks and has high security. We can apply our robust scheme in applications requiring increased protection and ensuring secure communication by images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data Availability

The authors confirm that the data supporting the findings of this study are available within the article [and/or] its supplementary materials.

References

  1. Srnvasu PN, Norwawi N, Amiripalli SS, Deepalakshmi P (2021) Secured compression for 2D medical images through the manifold and fuzzy trapezoidal correlation function. Gazi Univ J Sci 35(4):1372–1391

    Google Scholar 

  2. Lalitha RVSS, Srinivasu PN (2017) An efficient data encryption through image via prime order symmetric key and bit shuffle technique. In: Computer Communication, Networking and Internet Security: Proceedings of IC3T 2016 pp 261-270. Springer Singapore

  3. Kumar K, Ramkumar KR, Kaur A (2022) A lightweight AES algorithm implementation for encrypting voice messages using field programmable gate arrays. J King Saud Univ, Comp Info 34(6):3878–3885

    Google Scholar 

  4. Rahul B, Kuppusamy K, Senthilrajan A (2023) Dynamic DNA cryptography-based Image Encryption Scheme using Multiple Chaotic Maps and SHA-256 hash function. Optik, 171253

  5. Zhang B, Rahmatullah B, Wang SL, Almutairi HM, Xiao Y, Liu X, Liu Z (2023). A variable dimensional chaotic map-based medical image encryption algorithm with multi-mode. Med Biol Eng Comput, 1-32

  6. Tong H, Li T, Xu Y, Su X, Qiao G (2023) Chaotic coyote optimization algorithm for image encryption and steganography. Multimed Tools Appl, 1–27

  7. Rakheja P, Khurana M (2023) Multiple iris image encryption using phase retrieval mask, QZ algorithm and umbrella map in hybrid transform domain. Opt Quantum Electron 55(10):878

    Google Scholar 

  8. Khan H, Hazzazi MM, Jamal SS, Hussain I, Khan M (2023) New color image encryption technique based on three-dimensional logistic map and Grey wolf optimization based generated substitution boxes. Multimed Tools Appl 82(5):6943–6964

    Google Scholar 

  9. Wang J, Geng YC, Han L et al (2019) Quantum Image Encryption Algorithm Based on Quantum Key Image. Int J Theor Phys 58:308–322

    Google Scholar 

  10. Wang J, Chen J, Wang F, Ni R (2022) Optical image encryption scheme based on quantum s-box and meaningful ciphertext generation algorithm. Opt Commun 525:128834

    Google Scholar 

  11. Wang J, Chen J, Wang F, Ni R (2022) Optical image encryption scheme based on quantum s-box and meaningful ciphertext generation algorithm. Opt Commun 525:128834

    Google Scholar 

  12. Wang B, Xu J, Song H (2017) Research on the improved algorithm for image quantum encryption in multimedia networks. Comput Electr Eng 62:414–428

    Google Scholar 

  13. Xiao X, He X, Zhang Y, Dong X, Yang LX, Xiang Y (2023) Blockchain-based reliable image copyright protection. IET Blockchain

  14. Keshta I, Aoudni Y, Sandhu M, Singh A, Xalikovich PA, Rizwan A, Lalar S (2023) Blockchain aware proxy re-encryption algorithm-based data sharing scheme. Phys Commun 58:102048

    Google Scholar 

  15. Qamar S (2023) Federated convolutional model with cyber blockchain in medical image encryption using Multiple Rossler lightweight Logistic sine mapping. Comput Electr Eng 110:108883

    Google Scholar 

  16. Vengadapurvaja AM, Nisha G, Aarthy R, Sasikaladevi N (2017) An efficient homomorphic medical image encryption algorithm for cloud storage security. Procedia Comput Sci 115:643–650

    Google Scholar 

  17. Xie D, Chen F, Luo Y, Li L (2019) One-to-many image encryption with privacy-preserving homomorphic outsourced decryption based on compressed sensing. Digit Signal Process 95:102587

    Google Scholar 

  18. Xiong L, Dong D (2019) Reversible data hiding in encrypted images with somewhat homomorphic encryption based on sorting block-level prediction-error expansion. J Inf Secur Appl 47:78–85

    Google Scholar 

  19. Zhang X, Li C, Tian L (2023) Advanced audio coding steganography algorithm with distortion minimization model based on audio beat. Comput Electr Eng 106:108580

    Google Scholar 

  20. Li Z, Yang X, Shen K, Jiang F, Jiang J, Ren H, Li Y (2023) Adversarial feature hybrid framework for steganography with shifted window local loss. Neural Networks

  21. Ma B, Li K, Xu J, Wang C, Li J, Zhang L (2023) Enhancing the security of image steganography via multiple adversarial networks and channel attention modules. Digit Signal Process, 104121

  22. Shahna KU (2023) Novel chaos based cryptosystem using four-dimensional hyper chaotic map with efficient permutation and substitution techniques. Chaos Solit Fractals 170:113383

    MathSciNet  Google Scholar 

  23. Cao W, Cai H, Hua Z (2022) n-Dimensional Chaotic Map with application in secure communication. Chaos Solit Fractals 163:112519

    MathSciNet  Google Scholar 

  24. Ding D, Wang W, Yang Z, Hu Y, Wang J, Wang M, Zhu H (2023) An n-dimensional modulo chaotic system with expected Lyapunov exponents and its application in image encryption. Chaos Solit Fractals 174:113841

    MathSciNet  Google Scholar 

  25. Sun B, Zhang C, Peng Q, Du B (2023) Color image encryption algorithm based on 5D memristive chaotic system and group scrambling. Optik 287:171132

    Google Scholar 

  26. Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44–62

    Google Scholar 

  27. Liang Q, Zhu C (2023) A new one-dimensional chaotic map for image encryption scheme based on random DNA coding. Opt Laser Technol 160:109033

    Google Scholar 

  28. Alawida M, Samsudin A, Teh JS, Alkhawaldeh RS (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45–58

    Google Scholar 

  29. Jalal AA, Amen AI, Sulaiman NA (2020) Darboux integrability of the simple chaotic flow with a line equilibria differential system. Chaos Solit Fractals 135:109712

    MathSciNet  Google Scholar 

  30. Ostrovskii VY, Rybin VG, Karimov AI, Butusov DN (2022) Inducing multistability in discrete chaotic systems using numerical integration with variable symmetry. Chaos Solit Fractals 165:112794

    MathSciNet  Google Scholar 

  31. Gao S, Wu R, Wang X, Wang J, Li Q, Wang C, Tang X (2023) A 3D model encryption scheme based on a cascaded chaotic system. Signal Process 202:108745

    Google Scholar 

  32. He Y, Yang S, Xu Q (2013) Short-term cascaded hydroelectric system scheduling based on chaotic particle swarm optimization using improved logistic map. Commun Nonlinear Sci Numer Simul 18(7):1746–1756

    MathSciNet  Google Scholar 

  33. Wang X, Liu P (2022) Image encryption based on roulette cascaded chaotic system and alienated image library. Vis Comput 38(3):763–779

    Google Scholar 

  34. Yan M, Jie J (2022) Fractional-order multiwing switchable chaotic system with a wide range of parameters. Chaos Solit Fractals 160:112161

    MathSciNet  Google Scholar 

  35. Vadivel R, Sabarathinam S, Wu Y, Chaisena K, Gunasekaran N (2022) New results on T-S fuzzy sampled-data stabilization for switched chaotic systems with its applications. Chaos Solit Fractals 164:112741

    MathSciNet  Google Scholar 

  36. Zhang X, Xiao J (2022) Complex compound-combination multi switching anti-synchronization of fractional-order complex chaotic systems and integer-order complex chaotic systems. Int J Dyn Control 10(2):525–542

    MathSciNet  Google Scholar 

  37. Liang Q, Zhu C (2023) A new one-dimensional chaotic map for image encryption scheme based on random DNA coding. Opt Laser Technol 160:109033

    Google Scholar 

  38. Farah MB, Farah A, Farah T (2020) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dynamics 99(4):3041–3064

    Google Scholar 

  39. Zhu D, Tong X, Wang Z, Zhang M (2022) A novel lightweight block encryption algorithm based on combined chaotic system. J Inf Secur Appl 69:103289

    Google Scholar 

  40. Belazi A, Abd El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155–170

    Google Scholar 

  41. Zhu S, Deng X, Zhang W, Zhu C (2023) Secure image encryption scheme based on a new robust chaotic map and strong S-box. Math Comput Simul 207:322–346

    MathSciNet  Google Scholar 

  42. Liu H, Liu J, Ma C (2023) Constructing dynamic strong S-Box using 3D chaotic map and application to image encryption. Multimed Tools Appl 82(16):23899–23914

    Google Scholar 

  43. Liu H, Kadir A, Xu C (2020) Cryptanalysis and constructing S-box based on chaotic map and backtracking. Appl Math Comput 376:125153

    MathSciNet  Google Scholar 

  44. Si Y, Liu H, Chen Y (2021) Constructing keyed strong S-Box using an enhanced quadratic map. Int J Bifurc Chaos 31(10):2150146

    MathSciNet  Google Scholar 

  45. Zhao M, Liu H, Niu Y (2023) Batch generating keyed strong S-Boxes with high nonlinearity using 2D hyper chaotic map. Integration 92:91–98

    Google Scholar 

  46. Kaur M, Singh D, Sun K, Rawat U (2020) Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map. Future Gener Comput Sys 107:333–350

    Google Scholar 

  47. Kanso A, Ghebleh M (2012) A novel image encryption algorithm based on a 3D chaotic map. Commun Nonlinear Sci Numer Simul 17(7):2943–2959

    MathSciNet  Google Scholar 

  48. Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers. IEEE Trans Circuits Syst I, Fundam Theory Appl 48(2):163–169

    Google Scholar 

  49. Dawson M, Tavares S (1991) An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. In: Advances in Cryptology: Proceedings of EURO-CRYPT_91. Lecture Notes in Computer Science, pp 352–367

  50. Wang Y, Xie Q, Wu Y, Du B (2009) A software for S-box performance analysis and test. 2009 International Conference on Electronic Commerce and Business Intelligence. Beijing, China, pp 125–128

    Google Scholar 

  51. Li C, Luo G, Qin K, Li C (2017) An image encryption scheme based on chaotic tent map[J]. Nonlinear Dyn 87(1):127–133

    Google Scholar 

  52. Dawson M, Tavares S (1991) An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. In: Advances in Cryptology: Proceedings of EURO-CRYPT_91. Lecture Notes in Computer Science, pp. 352–367

  53. Wang Y, Xie Q, Wu Y, Du B (2009) A software for S-box performance analysis and test. 2009 International Conference on Electronic Commerce and Business Intelligence. Beijing, China, pp 125–128

    Google Scholar 

  54. Adams C, Tavares S (1989) Chapter-4.In: Advances in Cryptology: Proccedings of CRYPTO_89. Lecture Notes in Computer Science, pp 612-615

  55. Webster A, Tavares S (1986) On the design of S-boxes. In: Advances in Cryptology: Proc. of Crypto’85, Santa Barbara, USA. Lecture Notes in Computer Science vol. 218, pp 523–534

  56. Pieprzyk J, Finkelsten G (1988) Towards effective nonlinear cryptosystem design. In: IEE Proc Part E Computers Digital Techn 135:325–35

    Google Scholar 

  57. Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4(1):3–72

    MathSciNet  Google Scholar 

  58. Matsui M (1994) Linear cryptanalysis method of DES cipher. Advances in Cryptology, Proc. Eurocrypt’93. LNCS. Springer, Berlin, pp 386–397

    Google Scholar 

  59. Hof PR, Van Der Gucht E (2007) Structure of the cerebral cortex of the humpback whale, Megaptera novaeangliae (Cetacea, Mysticeti, Balaenopteridae). Anat Rec 290:1–31

    Google Scholar 

  60. Watkins WA, Schevill WE (1979) Aerial observation of feeding behavior in four baleen whales: Eubalaena glacialis, Balaenoptera borealis, Megaptera novaean-gliae, and Balaenoptera physalus. J Mammal 155-63

  61. Hua Z, Zhou Y, Pun CM, Philip Chen CL (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80–94

    Google Scholar 

  62. Tang G, Liao X, Chen Y (2005) A novel method for designing S-boxes based on chaotic maps. Chaos Solit Fractals. 23:413–419

    Google Scholar 

  63. Chen G, Chen Y, Liao X (2007) An extended method for obtaining S-boxes based on 3-dimensional chaotic baker maps. Chaos Solit Fractals 31:571–579

    MathSciNet  Google Scholar 

  64. zkaynak F, zer AB (2010) A method for designing strong S-boxes based on chaotic Lorenz system. Phys Lett A 374:3733–3738

    Google Scholar 

  65. Khan M, Shah T, Mahmood H, Gondal MA, Hussain I (2012) A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems. Nonlinear Dyn 70:2303–2311

    MathSciNet  Google Scholar 

  66. Hussain I, Shah T, Gondal MA (2012) A novel approach for designing substitution-boxes based on nonlinear chaotic algorithm. Nonlinear Dyns 70:1791–1794

    MathSciNet  Google Scholar 

  67. Belazi A, El-Latif AAA (2017) A simple yet efficient S-box method based on chaotic sine map. Optik-Int J Light and Elect Optics 130:1438–1444

    Google Scholar 

  68. Majid K, Tariq S, Syeda Iram B (2016) A new implementation of chaotic S-boxes in CAPTCHA. Signal Image Video Process. 10(2):293–300

    Google Scholar 

  69. Majid K, Tariq S (2014) A novel image encryption technique based on Hénon chaotic map and S8 symmetric group. Neural Comput Appl 25(7):1717–1722

    Google Scholar 

  70. Özkaynak F, Çelik V, Özer AB (2017) A new S-box construction method based on the fractional-order chaotic Chen system. Signal, Image and Video Process 11(4):659–664

    Google Scholar 

  71. Zahmoul R, Ejbali R, Zaied M (2017) Image encryption based on new Beta chaotic maps. Opt Lasers Eng 96:39–49

    Google Scholar 

  72. Belazi A, Abd El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155–70 (ISSN 0165-1684)

    Google Scholar 

  73. Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–8

    MathSciNet  Google Scholar 

  74. Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–8

    Google Scholar 

  75. Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62(3):615–21

    MathSciNet  Google Scholar 

  76. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715

    MathSciNet  Google Scholar 

  77. Biham E, Shamir A (2012) Differential cryptanalysis of the data encryption standard. Springer Sci Business Media

    Google Scholar 

  78. Chen GR, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solit Fractals 21(3):749–761

    MathSciNet  Google Scholar 

  79. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos 16:2129–2151

    MathSciNet  Google Scholar 

  80. Fu C, Lin B, Miao Y, Liu X, Chen J (2011) A novel chaos-based bit-level permutation scheme for digital image encryption. Opt Commun 284:5415–5423

    Google Scholar 

  81. IEEE Computer Society (2015) IEEE Standard for Binary Floating-Point Arithmetic. Available online: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp= &arnumber=30711 accessed on 14-Oct-2015

  82. Zhang YQ, Wang XY (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10–20

    Google Scholar 

  83. Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf Sci 273:329–351

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tarek Farah.

Ethics declarations

Conflicts of interest

The authors declare no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Farah, T., Alshammari, B.M. A novel image encryption scheme based on a new hyperchaotic map. Multimed Tools Appl 83, 34537–34579 (2024). https://doi.org/10.1007/s11042-023-16873-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-16873-x

Keywords

Navigation