A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation


Content protection is considered as an important issue in today’s world. Therefore, encryption of such contents is a challenging task for researchers. They are focusing on protection of valuable data such as image, video, and audio against different attacks from eavesdroppers. In this paper, we proposed an enhanced version of Fawad et al.’s scheme to fulfill essential needs of a secure image encryption algorithm. The proposed cryptosystem is resistant against many attacks like brute force, differential and statistical. To quantify the quality of the proposed scheme, instead of visual inspection, the proposed scheme is analyzed through various tests, such as correlation coefficient, information entropy, Number of Pixel Change Rate (NPCR) and Unified Average Change Intensity (UACI). Simulation results of the presented scheme shows good diffusion characteristics when compared to other traditional schemes.

This is a preview of subscription content, log in to check access.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8


  1. 1.

    Jakimoski G, Subbalakshmi K (2008) Cryptanalysis of some multimedia encryption schemes. IEEE Trans Multimed 10(3):330–338

    Article  Google Scholar 

  2. 2.

    Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf Sci 273:329–351

    Article  Google Scholar 

  3. 3.

    Elashry IE (2010) Digital image encryption. MS thesis, Department of computer science and engineering, Faculty of electronic engineering, Menofia University

  4. 4.

    Ahmed J, Hwang SO A fast encryption/decryption scheme for biometric images using multiple chaotic maps. In: IMTIC’15–international multi-topic conference. p 104

  5. 5.

    Zhang YQ, Wang XY (2014) Spatiotemporal chaos in mixed linear–nonlinear coupled logistic map lattice. Physica A: Statistical Mechanics and Its Applications 402:104–118

    MathSciNet  Article  Google Scholar 

  6. 6.

    Zeng W, Yu H, Lin C (2006) Multimedia security technologies for digital rights management. Academic Press

  7. 7.

    Zhang YQ, Wang XY (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn 77(3):687–698

    Article  Google Scholar 

  8. 8.

    Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62(3):615–621

    MathSciNet  Article  Google Scholar 

  9. 9.

    Zhang YQ, Wang XY (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10–20

    Article  Google Scholar 

  10. 10.

    Zhang YQ, Wang XY, Liu J, Chi ZL (2016) An image encryption scheme based on the mlncml system using dna sequences. Opt Lasers Eng 82:95–103

    Article  Google Scholar 

  11. 11.

    Schneier B (1996) Applied Cryptography. Wiley, USA

    Google Scholar 

  12. 12.

    Ahmad J (2010) Efficiency analysis and security evaluation of image encryption schemes. computing 23:25

    Google Scholar 

  13. 13.

    Rehman AU, Khan JS, Ahmad J, Hwang SO (2016) A new image encryption scheme based on dynamic s-boxes and chaotic maps. 3D Research 7(1):1–8

    Article  Google Scholar 

  14. 14.

    Chen Y, Chang L (2001) A secure and robust digital watermarking technique by the block cipher rc6 and secure hash algorithm. In: Proceedings of the 2001 international conference on image processing, 2001. IEEE, vol 2, pp 518–521

  15. 15.

    Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Computers & Mathematics with Applications 59(10):3320–3327

    MathSciNet  Article  Google Scholar 

  16. 16.

    Liu H, Wang X, et al. (2012) Image encryption using dna complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466

    Article  Google Scholar 

  17. 17.

    Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16):3895–3903

    Article  Google Scholar 

  18. 18.

    Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18

    Article  Google Scholar 

  19. 19.

    Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108

    MathSciNet  Article  Google Scholar 

  20. 20.

    Wang XY, Yu Q (2009) A block encryption algorithm based on dynamic sequences of multiple chaotic systems. Commun Nonlinear Sci Numer Simul 14(2):574–581

    MathSciNet  Article  Google Scholar 

  21. 21.

    Wang X, Luan D (2013) A novel image encryption algorithm using chaos and reversible cellular automata. Commun Nonlinear Sci Numer Simul 18(11):3075–3085

    MathSciNet  Article  Google Scholar 

  22. 22.

    Wang XY, Chen F, Wang T (2010) A new compound mode of confusion and diffusion for block encryption of image based on chaos. Commun Nonlinear Sci Numer Simul 15(9):2479–2485

    MathSciNet  Article  Google Scholar 

  23. 23.

    Spanos G, Maples T (1995) Performance study of a selective encryption scheme for the security of networked, real-time video. In: icccn, p. 0002, Published by the IEEE computer society.

  24. 24.

    Shannon C (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715

    MathSciNet  Article  Google Scholar 

  25. 25.

    Lookabaugh T, Sicker D (2004) Selective encryption for consumer applications. IEEE Commun Mag 42 (5):124–129

    Article  Google Scholar 

  26. 26.

    Ahmad J, Hwang SO, Ali A (2015) An experimental comparison of chaotic and non-chaotic image encryption schemes. Wirel Pers Commun 84(2):901–918

    Article  Google Scholar 

  27. 27.

    Ahmad J, Hwang SO (2015) Chaos-based diffusion for highly autocorrelated data in encryption algorithms. Nonlinear Dyn 82(4):1839–1850

    MathSciNet  Article  Google Scholar 

  28. 28.

    Ahmad J, Hwang SO (2015) A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools and Applications:1–26

  29. 29.

    Khan J, Ahmad J, Hwang SO (2015) An efficient image encryption scheme based on: Henon map, skew tent map and s-box 2015 6th international conference on modeling, simulation, and applied optimization (ICMSAO). IEEE, pp 1–6

  30. 30.

    Bin Younas M, Ahmad J (2014) Comparative analysis of chaotic and non-chaotic image encryption schemes 2014 international conference on emerging technologies (ICET). IEEE, pp 81–86

  31. 31.

    Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput & Applic 26 (5):1137–1148

    Article  Google Scholar 

  32. 32.

    Elashry I, Allah O, Abbas A, El-Rabaie S, El-Samie F (2009) Homomorphic image encryption. J Electron Imaging 18:033002

    Article  Google Scholar 

  33. 33.

    Hussain I, Shah T, Gondal MA (2012) Image encryption algorithm based on pgl (2, gf (28)) s-boxes and td-ercs chaotic sequence. Nonlinear Dyn 70(1):181–187

    Article  Google Scholar 

  34. 34.

    Elkamchouchi H, Makar M (2005) Measuring encryption quality for bitmap images encrypted with rijndael and kamkar block ciphers NRSC 2005 Proceedings of the 22nd national radio science conference, 2005. IEEE, pp 277–284

  35. 35.

    Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn 67(1):557–566

    MathSciNet  Article  Google Scholar 

  36. 36.

    Wang X, Teng L (2012) An image blocks encryption algorithm based on spatiotemporal chaos. Nonlinear Dyn 67(1):365–371

    MathSciNet  Article  Google Scholar 

  37. 37.

    Gray R (2010) Entropy and information theory, Springer Verlag

  38. 38.

    Ahmed H, Kalash H, Allah O (2017) Implementation of RC5 block cipher algorithm for image cryptosystems. Int J Inf Technol 3(4):245–250

    Google Scholar 

  39. 39.

    Ahmed F, Siyal M, Abbas V (2010) A perceptually scalable and jpeg compression tolerant image encryption scheme 2010 4th pacific-rim symposium on image and video technology (PSIVT). IEEE, pp 232–238

  40. 40.

    Ahmed F, Anees A, Abbas VU, Siyal MY (2014) A noisy channel tolerant image encryption scheme. Wirel Pers Commun 77(4):2771–2791

    Article  Google Scholar 

  41. 41.

    Anees A, Siddiqui AM, Ahmed F (2014) Chaotic substitution for highly autocorrelated data in encryption algorithm. Commun Nonlinear Sci Numer Simul 19(9):3106–3118

    MathSciNet  Article  Google Scholar 

  42. 42.

    Ahmad J, Khan MA, Hwang SO, Khan JS (2016) A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices. Neural Comput & Applic:1–15

  43. 43.

    Khan JS, ur Rehman A, Ahmad J, Habib Z (2015) A new chaos-based secure image encryption scheme using multiple substitution boxes 2015 conference on information assurance and cyber security (CIACS). IEEE, pp 16–21

  44. 44.

    Jolfaei A, Mirghadri A (2010) Survey: image encryption using salsa20. Int J Comput Sci Issues 7(5)

  45. 45.

    Khan MA, Ahmad J, Javaid Q, Saqib NA (2016) An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box. J Mod Opt:1–10

  46. 46.

    Khan JS, Ahmad J, Khan MA (2017) Td-ercs map-based confusion and diffusion of autocorrelated data. Nonlinear Dyn 87(1):93–107

    Article  Google Scholar 

  47. 47.

    Mohamed A, Zaibi G, Kachouri A (2011) Implementation of rc5 and rc6 block ciphers on digital images 2011 8th international multi-conference on systems, signals and devices (SSD). IEEE, pp 1–6

  48. 48.

    Liehuang Z, Wenzhuo L, Lejian L, Hong L (2006) A novel image scrambling algorithm for digital watermarking based on chaotic sequences. Int J Comput Sci Netw Secur 6(8B):125– 130

    Google Scholar 

  49. 49.

    Wang X, Wang Q (2014) A novel image encryption algorithm based on dynamic s-boxes constructed by chaos. Nonlinear Dyn 75(3):567–576

    Article  Google Scholar 

  50. 50.

    Ye G, Wong KW (2012) An efficient chaotic image encryption algorithm based on a generalized arnold map. Nonlinear dyn 69(4):2079–2087

    MathSciNet  Article  Google Scholar 

  51. 51.

    Mao Y, Chen G (2005) Chaos-based image encryption. Handbook of Geometric Computing:231–265

Download references

Author information



Corresponding author

Correspondence to Jawad Ahmad.

Ethics declarations

Conflict of interests

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Ahmad, J., Khan, M.A., Ahmed, F. et al. A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation. Neural Comput & Applic 30, 3847–3857 (2018). https://doi.org/10.1007/s00521-017-2970-3

Download citation


  • Image encryption
  • Security efficiency
  • Entropy
  • DCT
  • NPCR
  • UACI