Multimedia Tools and Applications

, Volume 76, Issue 22, pp 24251–24280 | Cite as

An efficient image encryption algorithm based on a novel chaotic map

  • Chengqi Wang
  • Xiao ZhangEmail author
  • Zhiming Zheng


In this paper, we propose a novel low dimensional chaotic map, namely, compounded piecewise linear map (CPLM) in order to balance between security and computational complexity. Then we prove the chaotic properties of CPLM theoretically and numerically. Based on the CPLM, an efficient chaotic image encryption algorithm is presented, in which the self-adaptive model and feedback mechanism are initially mingled to enhance the security. Besides, initial values of iteration are generated in a new way to ensure the sensitivity for the changes of plain-image. Simulation results show that our scheme possesses the high key sensitivity, large key space, fast encryption speed and resists the common attacks, especially differential attack. In addition, our algorithm satisfies the applicabilities of all-zero image and binary image which are seldom considered in the existing algorithms. The proposed algorithm justifies the superior security and good efficiency, which can be regarded as an excellent candidate for practical applications of image encryption.


Image encryption Chaotic map Compounded piecewise linear map Initial value distribution 



Authors thank the editor and reviewers a lot for their valuable suggestions. This research is supported by the Major Program of National Natural Science Foundation of China (No.: 11290141), the National Natural Science Foundation of China (No.: 61402030), and the Fundamental Research of Civil Aircraft (No.: MJ-F-2012-04).


  1. 1.
    Abderrahim NW, Benmansour FZ, Seddiki O (2014) A chaotic stream cipher based on symbolic dynamic description and synchronization. Nonlinear Dyn 78(1):197–207CrossRefGoogle Scholar
  2. 2.
    Alvarez G, Li SJ (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcat Chaos 16(8):2129–2151CrossRefzbMATHMathSciNetGoogle Scholar
  3. 3.
    Azzaz MS, Tanougast C, Sadoudi S, Bouridane A (2013) Synchronized hybrid chaotic generators: application to real-time wireless speech encryption. Commun Nonlinear Sci Numer Simulat 18(8):2035–3047CrossRefzbMATHMathSciNetGoogle Scholar
  4. 4.
    Chen RJ, Lai JL (2007) Image security system using recursive cellular automata substitution. Pattern Recogn 40(5):1621–1631CrossRefzbMATHGoogle Scholar
  5. 5.
    Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcat Chaos 8(6):1259–1284CrossRefzbMATHMathSciNetGoogle Scholar
  6. 6.
    Fu C, Chen JJ, Zou H, Meng WH, Zhan YF, Yu YW (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Express 20(3):2363–2378CrossRefGoogle Scholar
  7. 7.
    Fu C, Lin BB, Miao YS, Liu X, Chen JJ (2011) A novel chaos-based bit-level permutation scheme for digital image encryption. Opt Commun 284(23):5415–5423CrossRefGoogle Scholar
  8. 8.
    Fu ZJ, Sun XM, Liu Q, Zhou L, Shu JG (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE T Commun E98-B(1):190–200CrossRefGoogle Scholar
  9. 9.
    Huang R, Rhee KH, Uchida S (2014) A parallel image encryption method based on compressive sensing. Multimed Tools Appl 72(1):71–93CrossRefGoogle Scholar
  10. 10.
    Huang XL, Ye GD (2014) An efficient self-adaptive model for chaotic image encryption algorithm. Commun Nonlinear Sci Numer Simulat 19(12):4094–4104CrossRefGoogle Scholar
  11. 11.
    Jeng FG, Huang WL, Chen TH (2015) Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes. Signal Process Image Commun 34:45–51CrossRefGoogle Scholar
  12. 12.
    Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput Appl 26(5):1137–1148CrossRefGoogle Scholar
  13. 13.
    Kwok HS, Tang WKS (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons Fractals 32(4):1518–1529CrossRefzbMATHMathSciNetGoogle Scholar
  14. 14.
    Li S, Chen G, Mou X (2005) On the dynamical degradation of digital piecewise linear chaotic maps. Int J Bifurcat Chaos 15(10):3119–3151CrossRefzbMATHMathSciNetGoogle Scholar
  15. 15.
    Li SJ, Mou XQ, Yang BL, Ji Z, Zhang JH (2003) Problems with a probabilistic encryption scheme based on chaotic systems. Int J Bifurcat Chaos 13(10):3063–3077CrossRefzbMATHMathSciNetGoogle Scholar
  16. 16.
    Liu YS, Tang J, Xie T (2014) Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map. Optics Laser Technol 60:111–115CrossRefGoogle Scholar
  17. 17.
    Liu HJ, Wang XY, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466CrossRefGoogle Scholar
  18. 18.
    Luo YL, Du MH, Liu JX (2015) A symmetrical image encryption scheme in wavelet and time domain. Commun Nonlinear Sci Numer Simulat 20(2):447–460CrossRefGoogle Scholar
  19. 19.
    Norouzi BY, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion. Multimed Tools Appl 71(3):1469–1497CrossRefGoogle Scholar
  20. 20.
    Pan SM, Wen RH, Zhou ZH, Zhou NR (2016) Optical multi-image encryption scheme based on discrete cosine transform and nonlinear fractional Mellin transform. Multimed Tools Appl: 1–21Google Scholar
  21. 21.
    Pareek NK, Patidar V, Sud KK (2005) Cryptography using multiple one-dimensional chaotic maps. Commun Nonlinear Sci Numer Simulat 10(7):715–723CrossRefzbMATHMathSciNetGoogle Scholar
  22. 22.
    Parvin Z, Seyedarabi H, Shamsi M (2014) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimed Tools Appl: 1–18Google Scholar
  23. 23.
    Patidar V, Pareek NK, Purohit G, Sud KK (2011) A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Opt Commun 284(19):4331–4339CrossRefGoogle Scholar
  24. 24.
    Ping P, Xu F, Wang ZJ (2014) Image encryption based on non-affine and balanced cellular automata. Signal Process 105:419–429CrossRefGoogle Scholar
  25. 25.
    Qin C, Zhang XP (2015) Reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image R 31:154–164CrossRefGoogle Scholar
  26. 26.
    Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715CrossRefzbMATHMathSciNetGoogle Scholar
  27. 27.
    Singh PK, Singh RS, Rai KN (2015) An image encryption algorithm based on XOR operation with approximation component in wavelet transform. Fifth Natl Conf Comput Vision, Pattern Recogn, Imag Process Graph: 1–4Google Scholar
  28. 28.
    Sui LS, Duan KK, Liang JL (2015) Double-image encryption based on discrete multiple-parameter fractional angular transform and two-coupled logistic maps. Opt Commun 343:140–149CrossRefGoogle Scholar
  29. 29.
    Tang ZJ, Song J, Zhang XQ, Sun RH (2016) Multiple-image encryption with bit-plane decomposition and chaotic maps. Opt Laser Eng 80:1–11CrossRefGoogle Scholar
  30. 30.
    Tang ZJ, Wang F, Zhang XQ (2016) Image encryption based on random projection partition and chaotic system. Multimed Tools Appl: 1-27Google Scholar
  31. 31.
    Tang ZJ, Zhang XQ (2011) Secure image encryption without size limitation using Arnold transform and random strategies. J Multimed 6(2):202–206MathSciNetCrossRefGoogle Scholar
  32. 32.
    Tang ZJ, Zhang XQ, Lan WW (2015) Efficient image encryption with block shuffling and chaotic map. Multimed Tools Appl 74(15):5429–5448CrossRefGoogle Scholar
  33. 33.
    Wang XY, Guo K (2014) A new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn 76(4):1943–1950CrossRefzbMATHGoogle Scholar
  34. 34.
    Wang XY, Jin CQ (2012) Image encryption using Game of Life permutation and PWLCM chaotic system. Opt Commun 285(4):412–417CrossRefGoogle Scholar
  35. 35.
    Wang XY, Liu CM (2016) A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed Tools Appl: 1–17Google Scholar
  36. 36.
    Wang SH, Liu WR, Lu HP, Kuang JY, Gang H (2004) Periodicity of chaotic trajectories of single and coupled maps in realizations of finite computer precisions. Int J Mod Phys B 18(17-19):2617–2622CrossRefGoogle Scholar
  37. 37.
    Wang XY, Wei N, Zhang DD (2015) A novel image encryption algorithm based on chaotic system and improved Gravity Model. Opt Commun 338:209–217CrossRefGoogle Scholar
  38. 38.
    Wang XY, Xu DH (2014) Image encryption using genetic operators and intertwining logistic map. Nonlinear Dyn 78(4):2975–2984CrossRefMathSciNetGoogle Scholar
  39. 39.
    Wang XY, Zhang HL (2015) A color image encryption with heterogeneous bit-permutation and correlated chaos. Opt Commun 342:51–60CrossRefGoogle Scholar
  40. 40.
    Wen WY, Zhang YS, Fang ZJ, Chen JX (2015) Infrared target-based selective encryption by chaotic maps. Opt Commun 341:131–139CrossRefGoogle Scholar
  41. 41.
    Xia ZH, Wang XH, Sun XM, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE T Parall Distr 27(2):340–352CrossRefGoogle Scholar
  42. 42.
    Yao W, Zhang X, Zheng ZM, Qiu WJ (2014) A colour image encryption algorithm using 4-pixel Feistel structure and multiple chaotic systems. Nonlinear Dyn 81:151–168CrossRefMathSciNetGoogle Scholar
  43. 43.
    Yap WS, Phan RCW, Yau WC, Heng SH (2015) Cryptanalysis of a new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn 80(3):1483–1491CrossRefzbMATHMathSciNetGoogle Scholar
  44. 44.
    Yuan HM, Liu Y, Gong LH, Wang J (2016) A new image cryptosystem based on 2D hyper-chaotic system. Multimed Tools Appl: 1–22Google Scholar
  45. 45.
    Zhang LY, Hu XB, Liu YS, Wong KW, Gan J (2014) A chaotic image encryption scheme owning temp-value feedback. Commun Nonlinear Sci Numer Simulat 19(10):3653–3659CrossRefMathSciNetGoogle Scholar
  46. 46.
    Zhang LY, Li CQ, Wong KW, Shu S, Chen GR (2012) Cryptanalyzing a chaos-based image encryption algorithm using alternate structure. J Syst Software 85(9):2077–2085CrossRefGoogle Scholar
  47. 47.
    Zhang X, Li W, Zheng ZM, Guo BH (2012) Optimized statistical analysis of software trustworthiness attributes. Sci Chin Inform Sci 55(11):2508–2520CrossRefzbMATHMathSciNetGoogle Scholar
  48. 48.
    Zhang YQ, Wang XY (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn 77(3):687–698CrossRefGoogle Scholar
  49. 49.
    Zhang XP, Zhao ZM, Wang JY (2014) Chaotic image encryption based on circular substitution box and key stream buffer. Signal Process Image Commun 29(8):902–913CrossRefGoogle Scholar
  50. 50.
    Zhu CX (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(1):29–37CrossRefGoogle Scholar
  51. 51.
    Zhu CX, Liao CL, Deng XH (2013) Breaking and improving an image encryption scheme based on total shuffling scheme. Nonlinear Dyn 71(1-2):25–34CrossRefMathSciNetGoogle Scholar
  52. 52.
    Zhu CX, Xu SY, Hu YP, Sun KH (2015) Breaking a novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn 79(2):1511–1518CrossRefGoogle Scholar
  53. 53.
    Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inform Sci 181(6):1171–1186CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.Key Laboratory of Mathematics, Informatics and Behavioral Semantics, Ministry of Education, and School of Mathematics and Systems ScienceBeihang UniversityBeijingChina

Personalised recommendations