Advertisement

Multimedia Tools and Applications

, Volume 78, Issue 24, pp 34323–34352 | Cite as

Image encryption based on Henon chaotic system with nonlinear term

  • Haibo Luo
  • Bin GeEmail author
Article
  • 49 Downloads

Abstract

Henon chaotic system is a kind of classical chaotic system which is widely studied and applied. However, when we analyze its chaotic characteristics, we can still find some shortcomings. In this paper, a Henon chaotic system with nonlinear terms is proposed and applied to image encryption. Our scheme first modifies the linear term y(n) of the original Henon chaotic system to the nonlinear term ey(n), and then obtains the new Henon chaotic system. Then, a series of methods such as bifurcation graph, Lyapunov exponent, linear complexity, histogram, balance, run characteristics and NIST test were used to verify the performance improvement of the new Henon chaotic system. And then, the random sequences generated by the new Henon chaotic system are combined with the image encryption algorithm to complete the image encryption through three steps: global confusion, bit recombination and pixel value diffusion. Finally, the security of the encryption algorithm is verified by secret key space analysis, anti-statistical attack analysis, anti-differential attack analysis, anti-shearing and noise attack analysis. In this paper, the improvement of Henon chaotic system and the design of encryption algorithm all have achieved good results.

Keywords

Henon chaotic system Nonlinear term Randomness Image encryption Bit recombination 

Notes

Acknowledgements

This work was supported by The National Natural Science Fund project of China (NO.61402012).

References

  1. 1.
    Ahmad J, Khan MA, Hwang SO et al (2016) A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices. Neural Comput & Applic 28(1):953–967Google Scholar
  2. 2.
    Amina S, Mohamed FK (2018) An efficient and secure chaotic cipher algorithm for image content preservation. Commun Nonlinear Sci Numer Simul 60:12–32CrossRefGoogle Scholar
  3. 3.
    Aqeel-ur R, Liao X, Hahsmi MA et al (2018) An Efficient Mixed Inter-Intra pixels substitution at 2bits-level for image encryption technique using DNA and Chaos. Optik (Stuttgart) 153:117–134CrossRefGoogle Scholar
  4. 4.
    Bandt C, Pompe B (2002) Permutation entropy: a natural complexity measure for time series. Phys Rev Lett 88(17):174102CrossRefGoogle Scholar
  5. 5.
    Caraballo T, Colucci R, Guerrini L (2018) Dynamics of a continuous Henon model. Mathematical Methods in the Applied Sciences 41(10):3934–3954MathSciNetCrossRefGoogle Scholar
  6. 6.
    Chen Z, Liang D, Deng X et al (2016) Performance Analysis and Improvement of Logistic Chaotic Mapping. J Electron Inf Technol 38(6):1547–1551Google Scholar
  7. 7.
    Dong C (2018) Topological classification of periodic orbits in Lorenz system. Chin Phys B 27(8):080501CrossRefGoogle Scholar
  8. 8.
    Elsadany AA, Yousef AM, Elsonbaty A (2018) Further analytical bifurcation analysis and applications of coupled logistic maps. Appl Math Comput 338:314–336MathSciNetzbMATHGoogle Scholar
  9. 9.
    Huang DM, Geng X, Wei LF et al (2016) A Secure Query Scheme on Encrypted Remote Sensing Images Based on Henon Mapping. Journal of Software 27(7):1729–1740MathSciNetGoogle Scholar
  10. 10.
    Jiang H, Li T, Zeng X et al (2014) Bifurcation analysis of the logistic map via two periodic impulsive forces. Chin Phys B 23(1):112–118CrossRefGoogle Scholar
  11. 11.
    Kandar S, Chaudhuri D, Bhattacharjee A et al (2019) Image encryption using sequence generated by cyclic group. Journal of information security and applications 44:117–129CrossRefGoogle Scholar
  12. 12.
    Kaur M, Kumar V (2018) Adaptive Differential Evolution-Based Lorenz Chaotic System for Image Encryption. Arab J Sci Eng 43(12):8127–8144CrossRefGoogle Scholar
  13. 13.
    Kulsoom A, Xiao D, Abbas SA (2016) An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimed Tools Appl 75(1):1–23CrossRefGoogle Scholar
  14. 14.
    Liao X, Guo S, Yin J et al (2018) New cubic reference table based image steganography. Multimed Tools Appl:1–18Google Scholar
  15. 15.
    Liao X, Li K, Yin J (2016) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76(20):20739–20753CrossRefGoogle Scholar
  16. 16.
    Liao X, Yu Y, Li B et al (2019) A New Payload Partition Strategy in Color Image Steganography. IEEE Transactions on Circuits and Systems for Video Technology.  https://doi.org/10.1109/TCSVT.2019.2896270
  17. 17.
    Luo Y, Zhou R, Liu J et al (2018) An efficient and self-adapting colour-image encryption algorithm based on chaos and interactions among multiple layers. Multimed Tools Appl 77(20):26191–26217CrossRefGoogle Scholar
  18. 18.
    Mezatio BA, Motchongom MT, Tekam BRW et al (2019) A novel memristive 6D hyperchaotic autonomous system with hidden extreme multistability. Chaos, Solitons Fractals 120:100–115MathSciNetCrossRefGoogle Scholar
  19. 19.
    Mondal B, Kumar P, Singh S (2018) A chaotic permutation and diffusion based image encryption algorithm for secure communications. Multimed Tools Appl 77(23):31177–31198CrossRefGoogle Scholar
  20. 20.
    Ping P, Fan J, Mao Y et al (2018) A chaos based image encryption scheme using digit-level permutation and block diffusion. IEEE Access 6:67581–67593CrossRefGoogle Scholar
  21. 21.
    Qin C, Zhou Q, Cao F et al (2018) Flexible Lossy Compression for Selective Encrypted Image with Image Inpainting. IEEE Transactions on Circuits and Systems for Video Technology:1–1Google Scholar
  22. 22.
    Ravichandran D, Praveenkumar P, Rayappan JBB et al (2016) Chaos based crossover and mutation for securing DICOM image. Comput Biol Med 72:170–184CrossRefGoogle Scholar
  23. 23.
    Scharinger J (1998) Fast encryption of image data using chaotic Kolmogorov flows. Journal of Electronic imaging 7(2):318–326CrossRefGoogle Scholar
  24. 24.
    Sprott JC, Munmuangsaen B (2018) Comment on "A hidden chaotic attractor in the classical Lorenz system". Chaos, Solitons Fractals 113:261–262MathSciNetCrossRefGoogle Scholar
  25. 25.
    Su M, Wen W, Zhang Y (2014) Security evaluation of bilateral-diffusion based image encryption algorithm. Nonlinear Dynamics 77(1–2):243–246MathSciNetCrossRefGoogle Scholar
  26. 26.
    Tang H, Sun Q, Yang X et al (2018) A network coding and DES based dynamic encryption scheme for moving target defense. IEEE ACCESS 6:26059–26068CrossRefGoogle Scholar
  27. 27.
    Tang Z, Wang F, Zhang X (2016) Image encryption based on random projection partition and chaotic system. Multimed Tools Appl 76(6):8257–8283CrossRefGoogle Scholar
  28. 28.
    Wang H, Li X (2018) HOPF BIFURCATION AND NEW SINGULAR ORBITS COINED IN A LORENZ-LIKE SYSTEM. Journal of Applied Analysis and Computation 8(5):1307–1325MathSciNetGoogle Scholar
  29. 29.
    Wang X, Luan D, Bao X (2014) Cryptanalysis of an image encryption algorithm using Chebyshev generator. Digital Signal Processing 25:244–247CrossRefGoogle Scholar
  30. 30.
    Wu Y, Zhou Y, Saveriades G et al (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci 222:323–342MathSciNetCrossRefGoogle Scholar
  31. 31.
    Ye G (2013) Chaotic Image Encryption Algorithm Using Multi-Generalized Logistic Maps. J Comput Theor Nanosci 10(11):2789–2795CrossRefGoogle Scholar
  32. 32.
    Zhang Y (2015) Cryptanalysis of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik 126(2):223–229CrossRefGoogle Scholar
  33. 33.
    Zhang Y (2016) The image encryption algorithm with plaintext-related shuffling. IETE Tech Rev 33(3):310–322CrossRefGoogle Scholar
  34. 34.
    Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic S-Box. Inf Sci 450:361–377MathSciNetCrossRefGoogle Scholar
  35. 35.
    Zhang LY, Hu X, Liu Y et al (2014) A chaotic image encryption scheme owning temp-value feedback. Commun Nonlinear Sci Numer Simul 19(10):3653–3659MathSciNetCrossRefGoogle Scholar
  36. 36.
    Zhang Y, Tang Y (2018) A plaintext-related image encryption algorithm based on chaos. Multimed Tools Appl 77(6):6647–6669CrossRefGoogle Scholar
  37. 37.
    Zhang S, Zeng Y, Li Z et al (2018) Hidden Extreme Multistability, Antimonotonicity and Offset Boosting Control in a Novel Fractional-Order Hyperchaotic System Without Equilibrium. International Journal of Bifurcation and Chaos 28(13):1850167MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.School of computer science and engineeringAnhui University of Science and TechnologyHuainanChina

Personalised recommendations