Skip to main content
Log in

An image encryption scheme based on particle swarm optimization algorithm and hyperchaotic system

  • Application of soft computing
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Protecting digital images is crucial, and image encryption schemes based on chaotic systems have been extensively studied where image permutation is a critical process. The updating processes of particle swarm optimization algorithm have the ability to change the rules of particles motion, and it can be employed to permutate image. In this work, an image encryption scheme based on the updating processes of particle swarm optimization algorithm and hyperchaotic system is proposed. Specifically, a key generation mechanism combined with secure hash algorithm 256 hash is first introduced to generate the initial values of hyperchaotic complex Lü system. Then, the plain image is confused by the position and velocity updating processes of particle swarm optimization algorithm. In addition, an adaptive diffusion mechanism is designed and applied to the confused image to obtain the final cipher image. Simulation results and security analysis show that the proposed scheme exhibits good performance of sophisticated dynamic behavior, high sensitivity to key, and effectively resisting the typical cryptanalysis attacks, and provides an alternative to real-time image encryption application.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

Download references

Funding

This research was supported by the National Natural Science Foundation of China under Grants 61801131, the funding of Overseas 100 Talents Program of Guangxi Higher Education, 2018 Guangxi One Thousand Young and Middle-Aged College and University Backbone Teachers Cultivation Program.

Author information

Authors and Affiliations

Authors

Contributions

YL contributed to conceptualization, methodology, writing—review & editing. XO contributed to methodology, validation, writing—original draft, writing—review & editing. JL contributed to methodology, writing—review & editing. LC contributed to validation, writing—review & editing. YZ contributed to validation, writing—review & editing.

Corresponding author

Correspondence to Junxiu Liu.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This research does not contain any studies with human participants performed by any of the authors.

Data availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Luo, Y., Ouyang, X., Liu, J. et al. An image encryption scheme based on particle swarm optimization algorithm and hyperchaotic system. Soft Comput 26, 5409–5435 (2022). https://doi.org/10.1007/s00500-021-06554-y

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-021-06554-y

Keywords

Navigation