Skip to main content
Log in

Chaos based efficient selective image encryption

  • Published:
Multidimensional Systems and Signal Processing Aims and scope Submit manuscript

Abstract

Due to social networks, demand for sharing multimedia data is significantly increased in last decade. However, lower complexity and frequent security breaches on public network such as Internet make it easy for eavesdroppers to approach the actual contents without any hurdle. Many encryption algorithms has been developed by researchers to increase the security of such traffic and make it difficult for eavesdroppers to access actual data. However, these traditional algorithms increase the communication overhead, computational cost and also do not provide security against new attacks. These issues in recent algorithms motivate the researchers to further explore this area and proposed such algorithms which have lower overhead, more efficiency than the existing techniques and equip with requirements of next generations multimedia networks. To address all these issues and keeping in mind the future of next generation multimedia networks, we proposed a secure and light-weight encryption scheme for digital images. The proposed technique initially divide plaintext image in a number of blocks and correlation coefficients of each block are then calculated. The block with the maximum correlation coefficient values are pixel-wise XORed with the random numbers generated from a skew tent map based on a pre-defined threshold value. At last, the whole image is permuted via two random sequences generated from TD-ERCS chaotic map. Experimental results shows higher security via checking correlation, entropy, histogram, diffusion characteristic and key sensitivity of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  • Ahmad, J., & Hwang, S. O. (2015). Chaos-based diffusion for highly autocorrelated data in encryption algorithms. Nonlinear Dynamics, 82(4), 1839–1850.

    Article  MathSciNet  Google Scholar 

  • Ahmad, J., Khan, M.A., Hwang, S. O., & Khan, J. S. (2016). A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices. In Neural computing and applications (pp. 1–15).

  • Alvarez, G., & Li, S. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos, 16(8), 2129–2151.

    Article  MathSciNet  MATH  Google Scholar 

  • Anees, A., Siddiqui, A. M., & Ahmed, F. (2014). Chaotic substitution for highly autocorrelated data in encryption algorithm. Communications in Nonlinear Science and Numerical Simulation, 19(9), 3106–3118.

    Article  MathSciNet  Google Scholar 

  • Ayoup, A. M., Hussein, A. H., & Attia, M. A. (2015). Efficient selective image encryption. In Multimedia tools and applications (pp. 1–16).

  • Cheng, H., & Li, X. (2000). Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing, 48(8), 2439–2451.

    Article  Google Scholar 

  • Chen, G., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos, Solitons & Fractals, 21(3), 749–761.

    Article  MathSciNet  MATH  Google Scholar 

  • Daemen, J., & Rijmen, V. (2013). The design of Rijndael: AES-the advanced encryption standard. Berlin: Springer.

    MATH  Google Scholar 

  • Gao, T., & Chen, Z. (2008). A new image encryption algorithm based on hyper-chaos. Physics Letters A, 372(4), 394–400.

    Article  MATH  Google Scholar 

  • Hasler, M., & Maistrenko, Y. L. (1997). An introduction to the synchronization of chaotic systems: Coupled skew tent maps. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 44(10), 856–866.

    Article  MathSciNet  Google Scholar 

  • Khan, J., Ahmad, J., & Hwang, S. O. (2015). An efficient image encryption scheme based on: Henon map, skew tent map and s-box. In 6th International conference on modeling, simulation, and applied optimization (ICMSAO), 2015 (pp. 1–6). IEEE.

  • Khan, J. S., Ahmad, J., & Khan, M. A. (2017). Td-ercs map-based confusion and diffusion of autocorrelated data. Nonlinear Dynamics, 87(1), 93–107.

    Article  MathSciNet  Google Scholar 

  • Khan, J.S., ur Rehman, A., Ahmad, J., & Habib, Z. (2015). A new chaos-based secure image encryption scheme using multiple substitution boxes. In 2015 Conference on information assurance and cyber security (CIACS) (pp. 16–21). IEEE.

  • Kocarev, L. (2001). Chaos-based cryptography: A brief overview. IEEE Circuits and Systems Magazine, 1(3), 6–21.

    Article  Google Scholar 

  • Liu, H., Kadir, A., & Gong, P. (2015). A fast color image encryption scheme using one-time s-boxes based on complex chaotic system and random noise. Optics Communications, 338, 340–347.

    Article  Google Scholar 

  • Liu, H., & Wang, X. (2010). Color image encryption based on one-time keys and robust chaotic maps. Computers & Mathematics with Applications, 59(10), 3320–3327.

    Article  MathSciNet  MATH  Google Scholar 

  • Liu, H., & Wang, X. (2011). Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Optics Communications, 284(16–17), 3895–3903.

    Article  Google Scholar 

  • Liu, H., Wang, X., et al. (2012). Image encryption using DNA complementary rule and chaotic maps. Applied Soft Computing, 12(5), 1457–1466.

    Article  Google Scholar 

  • Mahmood, A., Dony, R., & Areibi, S. (2013). An adaptive encryption based genetic algorithms for medical images. In 2013 IEEE international workshop on machine learning for signal processing (MLSP) (pp. 1–6). IEEE.

  • Mao, Y., Chen, G., & Lian, S. (2004). A novel fast image encryption scheme based on 3d chaotic baker maps. International Journal of Bifurcation and Chaos, 14(10), 3613–3624.

    Article  MathSciNet  MATH  Google Scholar 

  • Matthews, R. (1989). On the derivation of a chaotic? Encryption algorithm. Cryptologia, 13(1), 29–42.

    Article  MathSciNet  Google Scholar 

  • Ou, Y., Sur, C., & Rhee, K. H. (2007). Region-based selective encryption for medical imaging. In International workshop on frontiers in algorithmics (pp. 62–73). Springer.

  • Podesser, M., Schmidt, H. -P., & Uhl, A. (2002). Selective bitplane encryption for secure transmission of image data in mobile environments. In Proceedings of the 5th IEEE Nordic signal processing symposium (NORSIG?2) (pp. 4–6).

  • Rao, Y. S., Mitra, A., & Prasanna, S. M. (2006). A partial image encryption method with pseudo random sequences. In International conference on information systems security (pp. 315–325). Springer.

  • Ravishankar, K., & Venkateshmurthy, M. (2006). Region based selective image encryption. In 2006 International conference on computing & informatics (pp. 1–6). IEEE.

  • Rehman, A. U., Khan, J. S., Ahmad, J., & Hwang, S. O. (2016). A new image encryption scheme based on dynamic s-boxes and chaotic maps. 3D Research, 7(1), 1–8.

    Article  Google Scholar 

  • Rhouma, R., & Belghith, S. (2008). Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Physics Letters A, 372(38), 5973–5978.

    Article  MATH  Google Scholar 

  • Rodrigues, J. M., Puech, W., & Bors, A. G. (2006). Selective encryption of human skin in jpeg images. In 2006 International conference on image processing (pp. 1981–1984). IEEE.

  • Schneier, B. (2007). Applied cryptography: Protocols, algorithms, and source code in C. New York: Wiley.

    MATH  Google Scholar 

  • Ullah, I., Iqbal, W., & Masood, A. (2013). Selective region based images encryption. In 2013 2nd National conference on information assurance (NCIA) (pp. 125–128). IEEE.

  • Wang, X.-Y., & Bao, X.-M. (2013). A novel block cryptosystem based on the coupled chaotic map lattice. Nonlinear Dynamics, 72(4), 707–715.

    Article  MathSciNet  Google Scholar 

  • Wang, X.-Y., Gu, S.-X., & Zhang, Y.-Q. (2015). Novel image encryption algorithm based on cycle shift and chaotic system. Optics and Lasers in Engineering, 68, 126–134.

    Article  Google Scholar 

  • Wang, X., Liu, L., & Zhang, Y. (2015). A novel chaotic block image encryption algorithm based on dynamic random growth technique. Optics and Lasers in Engineering, 66, 10–18.

    Article  Google Scholar 

  • Wang, X., Teng, L., & Qin, X. (2012). A novel colour image encryption algorithm based on chaos. Signal Processing, 92(4), 1101–1108.

    Article  MathSciNet  Google Scholar 

  • Wang, X., & Wang, M. (2008). A hyperchaos generated from lorenz system. Physica A: Statistical Mechanics and its Applications, 387(14), 3751–3758.

    Article  MathSciNet  Google Scholar 

  • Wang, X., Wang, X., Zhao, J., & Zhang, Z. (2011). Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dynamics, 63(4), 587–597.

    Article  MathSciNet  Google Scholar 

  • Wang, Y., Wong, K.-W., Liao, X., & Chen, G. (2011). A new chaos-based fast image encryption algorithm. Applied Soft Computing, 11(1), 514–522.

    Article  Google Scholar 

  • Wang, X.-Y., Yang, L., Liu, R., & Kadir, A. (2010). A chaotic image encryption algorithm based on perceptron model. Nonlinear Dynamics, 62(3), 615–621.

    Article  MathSciNet  MATH  Google Scholar 

  • Wang, X.-Y., Zhang, Y.-Q., & Bao, X.-M. (2015). A novel chaotic image encryption scheme using DNA sequence operations. Optics and Lasers in Engineering, 73, 53–61.

    Article  Google Scholar 

  • Wang, X., Zhao, J., & Liu, H. (2012). A new image encryption algorithm based on chaos. Optics Communications, 285(5), 562–566.

    Article  Google Scholar 

  • Younis, H. A., Abdalla, T. Y., & Abdalla, A. Y. (2009). Vector quantization techniques for partial encryption of wavelet-based compressed digital images. Iraqi Journal of Electrical and Electronic Engineering, 5(1), 74–89.

    Google Scholar 

  • Zhang, Y.-Q., & Wang, X.-Y. (2014a). Spatiotemporal chaos in mixed linear-nonlinear coupled logistic map lattice. Physica A: Statistical Mechanics and Its Applications, 402, 104–118.

    Article  MathSciNet  MATH  Google Scholar 

  • Zhang, Y.-Q., & Wang, X.-Y. (2014b). A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Information Sciences, 273, 329–351.

    Article  Google Scholar 

  • Zhang, Y.-Q., & Wang, X.-Y. (2015). A new image encryption algorithm based on non-adjacent coupled map lattices. Applied Soft Computing, 26, 10–20.

    Article  Google Scholar 

  • Zhang, Y.-Q., Wang, X.-Y., Liu, J., & Chi, Z.-L. (2016). An image encryption scheme based on the mlncml system using dna sequences. Optics and Lasers in Engineering, 82, 95–103.

    Article  Google Scholar 

  • Zhang, Y., & Xiao, D. (2013a). Cryptanalysis of s-box-only chaotic image ciphers against chosen plaintext attack. Nonlinear Dynamics, 72(4), 751–756.

    Article  MathSciNet  Google Scholar 

  • Zhang, Y., & Xiao, D. (2013b). Double optical image encryption using discrete chirikov standard map and chaos-based fractional random transform. Optics and Lasers in Engineering, 51(4), 472–480.

    Article  Google Scholar 

  • Zhang, Y., Xiao, D., Shu, Y., & Li, J. (2013). A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations. Signal Processing: Image Communication, 28(3), 292–300.

    Google Scholar 

  • Zhang, X., & Zhao, Z. (2014). Chaos-based image encryption with total shuffling and bidirectional diffusion. Nonlinear Dynamics, 75(1–2), 319–330.

    Article  Google Scholar 

  • Zhen, W., Xia, H., Ning, L., & Xiao-Na, S. (2012). Image encryption based on a delayed fractional-order chaotic logistic system. Chinese Physics B, 21(5), 050506.

    Article  Google Scholar 

  • Zhou, Y., Bao, L., & Chen, C. P. (2013). Image encryption using a new parametric switching chaotic system. Signal Processing, 93(11), 3039–3052.

    Article  Google Scholar 

  • Zhou, Y., Cao, W., & Chen, C. P. (2014). Image encryption using binary bitplane. Signal Processing, 100, 197–207.

    Article  Google Scholar 

  • Zhou, Y., Panetta, K., & Agaian, S. (2009). Image encryption using discrete parametric cosine transform. In Conference record of the forty-third asilomar conference on signals, systems and computers, 2009 (pp. 395–399). IEEE.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jan Sher Khan.

Ethics declarations

Conflicts of interest

There is no conflict of interest.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khan, J.S., Ahmad, J. Chaos based efficient selective image encryption. Multidim Syst Sign Process 30, 943–961 (2019). https://doi.org/10.1007/s11045-018-0589-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11045-018-0589-x

Keywords

Navigation