Based on hyper-chaotic systems, a novel image encryption algorithm is introduced in this paper. The advantages of our proposed approach are that it can be realized easily in one round diffusion process and is computationally very simple while attaining high security level, high key sensitivity, high plaintext sensitivity and other properties simultaneously. The key stream generated by hyper-chaotic system is related to the original image. Moreover, to encrypt each pixel, we use the sum of pixels which are located after that pixel. The algorithm uses different summations when encrypting different input images (even with the same sequence based on hyper-chaotic system). This, in turn, will considerably enhance the cryptosystem resistance against known/chosen-plaintext and differential attacks. The change rate of the number of pixels in the cipher-image when only one pixel of the original image is modified (NPCR) and the Unified Average Changing Intensity (UACI) are already very high (NPCR > 99.80233 % and UACI > 33.55484 %). Also, experimental results such as key space analysis, histograms, correlation coefficients, information entropy, peak signal-to-noise ratio, key sensitivity analysis, differential analysis and decryption quality, show that the proposed image encryption algorithm is secure and reliable, with high potential to be adopted for the secure image communication applications.
Image encryption Diffusion process Security Sensitivity NPCR UACI
This is a preview of subscription content, log in to check access.
The authors would like to thank the Editor and the anonymous Referees for their valuable comments and suggestions to improve this paper.
Akhshani A, Behnia S, Akhavan A, Hassan HA, Hassan Z (2010) A novel scheme for image encryption based on 2D piecewise chaotic maps. J Opt Commun 283:3259–3266CrossRefGoogle Scholar
Alvarez E, Fernandez A, García P, Jimenez J, Marcano A (1999) New approach to chaotic encryption. J Phys Lett A 263:373–375CrossRefGoogle Scholar
Mazloom S, Eftekhari-Moghadam AM (2009) Color image encryption based on coupled nonlinear chaotic map. J Chaos Solitons Fractals 42:1745–1754CrossRefzbMATHGoogle Scholar
Mirzaei O, Yaghoobi M, Irani H (2012) A New image encryption method: parallel Sub-image encryption with hyper chaos. J Nonlinear Dyn 67(1):557–566CrossRefMathSciNetGoogle Scholar
Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic Map. J Image Vis Comput 24:926–934CrossRefGoogle Scholar
Patidar V, Pareek NK, Purohit G, Sud KK (2010) Modified substitution–diffusion image cipher using chaotic standard and logistic maps. J Commun Nonlinear Sci Numer Simul 15(10):2755–2765CrossRefzbMATHMathSciNetGoogle Scholar
Patidar V, Pareek NK, Purohit G, Sud KK (2011) A robust and secure chaotic standard Map based pseudorandom permutation-substitution scheme for image encryption. J Opt Commun 284:4331–4339CrossRefGoogle Scholar
Patidar V, Pareek NK, Sud KK (2009) A New substitution–diffusion based image cipher using chaotic standard and logistic maps. J Commun Nonlinear Sci Numer Simulat 14:3056–3075CrossRefGoogle Scholar
Prasanna SRM, Rao YVS, Mitra A (2006) An image encryption method with magnitude and phase manipulation using carrier images. Int J Electr Comput Eng 1:132–137Google Scholar
Rhouma R, Belghith S (2008) Cryptanalysis of a new image encryption algorithm based on hyper-chaos. J Phys Lett A 372:5973–5978CrossRefzbMATHGoogle Scholar
Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. J Opt Commun 284:2775–2780CrossRefGoogle Scholar
Zhao L, Adhikari A, Xiao D, Sakurai K (2012) On the security analysis of an image scrambling encryption of pixel Bit and its improved scheme based on self-correlation encryption. J Commun Nonlinear Sci Numer Simulat 17:3303–3327CrossRefMathSciNetGoogle Scholar
Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. J Opt Commun 285:29–37CrossRefGoogle Scholar
Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a Bit-level permutation. J Inform Sci 181:1171–1186CrossRefGoogle Scholar