Abstract
The security of the data becomes the main concern due to the quick rise in the exchange of data over the open networks and the Internet. The cryptographic techniques based on chaos theory reveal some novel and effectual orders to develop secure image encryption approaches. Images are the most attractive kinds of data in the encryption domain. In current years, the chaos-based cryptographic techniques have provided an efficient way to expand secure image encryption frameworks. This proposal temps to develop an optimized HCM for promoting novel image encryption. The proposed image encryption model involves 4 steps, such as image pre-processing, key generation, image encryption using optimized HCM, and image decryption. In the pre-processing, the RGB image is converted into a grayscale image, and the key is generated by the SHA-256 cryptographic hash algorithm. Further, the encryption of the image is performed by HCM with the integration of 2DLCM, and PWLCM. While hybridizing the two chaotic maps for image encryption, parameter tuning or optimization is performed for improving its performance. Moreover, Information entropy is considered as the objective model that has to be maximized while tuning the parameters, and the maximum value of information entropy will mean the best performance. An improvement in the well-known optimization algorithms termed as CI-WOA is adopted for performing the parameter optimization of HCM. Hence, the optimized HCM-based image encryption can be confirmed as an efficient and secure way for all types of image transmissions.
Similar content being viewed by others
Abbreviations
- AES:
-
Advanced encryption standard
- PSNR:
-
Peak signal-to-noise ratio
- 3DES:
-
Triple DES
- DES:
-
Data encryption standard
- NPCR:
-
Number of pixel change rate
- 1D:
-
One-dimensional
- UACI:
-
Unified average changing intensity
- HD:
-
High-dimensional
- 2D-SCL:
-
Two-dimensional chaotic map sine map Chebyshev map and the linear function
- DNA:
-
Deoxyribonucleic acid
- BST:
-
Binary search tree
- DWT:
-
Discrete wavelet transformation
- LSMCL:
-
Logistics-modulated-sine-coupling-logistic chaotic map
- KPA:
-
Known plain text attacks
- GWO:
-
Grey wolf optimization
- 3D:
-
Three-dimensional
- SHA-3:
-
Stable Hash algorithm 3
- MSE:
-
Mean square error
- CPA:
-
Cipher plain text attacks
- SAGWO:
-
Self-adaptive grey wolf optimization
- Deep CNN:
-
Deep convolutional neural network
- DNN:
-
Deep neural network
- SSIM:
-
Structural similarity index measure
- FSIM:
-
Feature similarity index measure
- DSSIM:
-
Dissimilarity structural similarity index measure
- CSSIM:
-
Complex wavelet structural similarity index measure
- HCM:
-
Hybrid chaotic map
- 2DLCM:
-
2D-logistic chaotic map
- PWLCM:
-
Piecewise linear chaotic map
- CI-WOA:
-
Coefficient improved whale optimization algorithm
References
Abhishek S, George N, Deepthi PP (2013) PWLCM based image encryption through compressive sensing. In: IEEE recent advances in intelligent computational systems (RAICS), Trivandrum, pp 48–52
Algredo-Badillo I, Feregrino-Uribe C, Cumplido R, Morales-Sandoval M (2013) FPGA-based implementation alternatives for the inner loop of the Secure Hash Algorithm SHA-256. Microprocess Microsyst 37(6–7):750–757
Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos 16(8):21292151
Ben Farah MA, Guesmi R, Kachouri A, Samet M (2020) A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Opt Laser Technol 121:1
Cao W, Mao Y, Zhou Y (2020) Designing a 2D infinite collapse map for image encryption. Sig Process 171:1
Chen LF, Chang GJ, He BY (2017) Optical image conversion and encryption by diffraction, phase retrieval algorithm and incoherent superposition. Opt Lasers Eng 88:221–232
Chen C, Sun K, He S (2019) An improved image encryption algorithm with finite computing precision. Signal Processing
Chen J, Li XW, Wang Q-H (2019b) Deep learning for improving the robustness of image encryption. IEEE Access 7:181083–181091
Darwish SM, Noori ZH (2019) Secure image compression approach based on fusion of 3D chaotic maps and arithmetic coding. IET Signal Proc 13(3):286–295
Etem T, Kaya T (2019) A novel true random bit generator design for image encryption. Phys A: Stat Mech Appl
Frauel Y, Castro A, Naughton T, Javidi B (2007) Resistance of the double random phase encryption against various attacks. Opt Express 15:10253–10265
Gupta A, Singh D, Kaur M (2020) An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps. J Ambient Intell Hum Comput 11:1309–1324
Hu Y, Zhu C, Wang Z (2014) An improved piecewise linear chaotic map based image encryption algorithm. Sci World J
Hua Z, Zhou B, Zhou Y (2018) Sine-transform-based Chaotic system with FPGA implementation. IEEE Multimedia 65(3):1
John FB, Alejandro MA, Roberto T (2014) Experimental QR code optical encryption: noise-free data recovering. Opt Lett 39(10):3074–3077
Kang Y, Zhang LH, Zhang DW (2018) Optical encryption based on ghost imaging and public key cryptography. Opt Lasers Eng 111:58–64
Kaur M, Kumar V (2018a) Beta Chaotic map based image encryption using genetic algorithm. Int J Bifurc Chaos 28(11):1
Kaur M, Kumar V (2018b) Parallel non-dominated sorting genetic algorithm-II-based image encryption technique. Imaging Sci J 66(8):453–462
Kaur M, Kumar M (2020) A comprehensive review on image encryption techniques. Comput Methods Eng 27:15–43
Kaur M, Kumar V, Li L (2019) Color image encryption approach based on memetic differential evolution. Neural Comput Appl 31:7975–7987
Kaur M, Singh D, Sun K, Rawat U (2020) Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map. Fut Gen Comput Syst 107:333–350
Khan J, Khan M, Ahmad J, Hwang S, Ahmed W (2017) An improved image encryption scheme based on a non-linear Chaotic algorithm and substitution boxes. Informatica 28:629–649
Koppu S, Madhu Viswanatham V (2018) Medical image security enhancement using two dimensional chaotic mapping optimized by self-adaptive grey wolf algorithm. Evol Intel 11(1–2):53–71
Kumar P, Fatima A, Nishchal NK (2019) Image encryption using phase-encoded exclusive-OR operations with incoherent illumination. J Opt 21:065701
Li X, Mou Y, Cai Z Ji, Zhang J (2003) On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision. Comput Phys Commun 153(1):52–58
Lin L, Shen M, So H, Chang C (2012) Convergence analysis for initial condition estimation in coupled map lattice systems. IEEE Trans Signal Process 60(8):4426–4432
Maniyath SR, Thanikaiselvan V (2020) An efficient image encryption using deep neural network and chaotic Map. Microprocess Microsyst 77:1
Mirjalili S, Lewis A (2016) The Whale optimization algorithm. Adv Eng Softw 95:51–67
Mirjalili S, Mirjalili SM, Lewis A (2014) Grey Wolf optimizer. Adv Eng Softw 69:46–61
Muniraj I, Guo CL, Malallah R (2017) Low photon count based digital holography for quadratic phase cryptography. Opt Lett 42(14):2774–2777
Nematzadeh H, Enayatifar R, Yadollahi M, Lee M, Jeong G (2019) Binary Search Tree Image encryption with DNA. Optik
Oteko Tresor L, Sumbwanyambe M (2019) A selective image encryption scheme based on 2D DWT, Henon map and 4D Qi hyper-Chaos. IEEE Access 7:103463–103472
Patro AK, Acharya B (2019) An efficient colour image encryption scheme based on 1-D chaotic maps. J Inf Secur Appl 46:23–41
Qin W, Peng X (2010) Asymmetric cryptosystem based on phase-truncated Fourier transforms. Opt Lett 35(2):118–120
Singh N, Sinha A (2009) Gyrator transform-based optical image encryption using chaos. Opt Lett 47:539–546
Wang X-Y, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62(3):615621
Wang Y, Quan C, Tay CJ (2014) Nonlinear multiple-image encryption based on mixture retrieval algorithm in Fresnel domain. Opt Commun 330(1):9198
Wu Y, Noonan JP, Yang G, Jin H (2012) Image encryption using the two-dimensional logistic chaotic map. J Electron Imaging 21(1):1
Xiao B, Luo J, Bi X, Li W, Chen B (2020) Fractional discrete Tchebyshev moments and their applications in image encryption and watermarking. Inf Sci 516:545–559
Yao S, Chen L, Zhong Y (2019) An encryption system for color image based on compressive sensing. Opt Laser Technol 120:1
Zhang X, Wang L, Zhou Z, Niu Y (2019) A Chaos-based image encryption technique utilizing Hilbert curves and H-fractals. IEEE Access 7:74734–74746
Zhou Y, Bao L, Chen C (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182
Zhu C, Sun K (2018) Cryptanalyzing and improving a novel color image encryption algorithm using RT-enhanced Chaotic tent maps. IEEE Access 6:18759–18770
Zhu C, Liao C, Deng X (2013) Breaking and improving an image encryption scheme based on total shufing scheme. Nonlinear Dyn 71(12):2534
Zhu C, Wang G, Sun K (2018) Improved cryptanalysis and enhancements of an image encryption scheme using combined 1D Chaotic maps. Entropy 20(11):843
Zhu H, Zhao Y, Song Y (2019) 2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption. IEEE Access 7:14081–14098
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This paper does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Saravanan, S., Sivabalakrishnan, M. A hybrid chaotic map with coefficient improved whale optimization-based parameter tuning for enhanced image encryption. Soft Comput 25, 5299–5322 (2021). https://doi.org/10.1007/s00500-020-05528-w
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-020-05528-w