Skip to main content
Log in

A novel and secure image encryption scheme based on two-dimensional logistic and Arnold Cat map

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Digital images are information carriers in the latest era of technology. Therefore, securing digital images or keeping data, videos, or confidential documents during communication through the internet is challenging because an adversary always endeavors to acquire any related information about digital images or reserved data. Chaotic systems are immaculate for developing new cryptosystems due to their exceptional characteristics. In this paper, our primary focus is to introduce a procedure to generate unique secret key streams using a two-dimensional logistic map and create a sequence of positive integers with the Arnold Cat map. Confusion and diffusion are the two fundamental principles of any image encryption scheme. In our proposed image encryption scheme, confusion is done using a series of positive integers to devastate the correlation among the adjacent pixels of plain images in all directions, and diffusion is done with secret key streams. The consequences of the security and statistical analysis depict that the proposed image encryption scheme is safe against numerous attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Schneier, B.: Applied Cryptography Protocols Algorithms and Source Code in C. Wiley, New York (1996)

    Google Scholar 

  2. Zhang, L.Y., Liu, Y., Pareschi, F., Zhang, Y., Wong, K.W., Rovatti, R., Setti, G.: On the security of a class of diffusion mechanisms for image encryption. IEEE Trans. Cybern. 48(4), 1163–1175 (2017)

    Article  Google Scholar 

  3. Tromer, E., Osvik, D.A., Shamir, A.: Efficient cache attacks on AES, and countermeasures. J. Cryptol. 23(1), 37–71 (2010)

    Article  MathSciNet  Google Scholar 

  4. Bashir, Z., Rashid, T., Zafar, S.: Hyperchaotic dynamical system based image encryption scheme with time-varying delays. Pac. Sci. Rev. A 18(3), 254–260 (2016)

    Google Scholar 

  5. Bashir, Z., Wątróbski, J., Rashid, T., Zafar, S., Sałabun, W.: Chaotic dynamical state variables selection procedure based image encryption scheme. Symmetry 9(12), 312 (2017)

  6. Akraam, M., Rashid, T., Zafar, S.: An image encryption scheme proposed by modifying chaotic tent map using fuzzy numbers. Multimed. Tools Appl. 1–19 (2022)

  7. Moysis, L., Volos, C., Jafari, S., Munoz-Pacheco, J.M., Kengne, J., Rajagopal, K., Stouboulos, I.: Modification of the logistic map using fuzzy numbers with application to pseudorandom number generation and image encryption. Entropy 22(4), 474 (2020)

    Article  MathSciNet  Google Scholar 

  8. Huang, X., Dong, Y., Zhu, H., Ye, G.: Visually asymmetric image encryption algorithm based on SHA-3 and compressive sensing by embedding encrypted image. Alex. Eng. J. 61(10), 7637–7647 (2022)

    Article  Google Scholar 

  9. Huang, X., Dong, Y., Ye, G., Shi, Y.: Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform. Front. Comput. Sci. 17(3), 173804 (2023)

    Article  Google Scholar 

  10. Idress, B., Zafar, S., Rashid, T., Gao, W.: Image encryption algorithm using S-box and dynamic Henon bit level permutation. Multimed. Tools Appl. 79(9), 6135–6162 (2020)

    Article  Google Scholar 

  11. Gao, W., Idrees, B., Zafar, S., Rashid, T.: Construction of nonlinear component of block cipher by action of modular group PSL(2, Z) on projective line PL(GF(28)). IEEE Access 8, 136736–136749 (2020)

    Article  Google Scholar 

  12. Mohamed, A.G., Korany, N.O., El-Khamy, S.E.: New DNA coded fuzzy based (DNAFZ) S-boxes: application to robust image encryption using hyper chaotic maps. IEEE Access 9, 14284–14305 (2021)

    Article  Google Scholar 

  13. Zhu, S., Zhu, C.: Secure image encryption algorithm based on hyperchaos and dynamic DNA coding. Entropy 22(7), 772 (2020)

    Article  MathSciNet  Google Scholar 

  14. Niu, Y., Zhou, Z., Zhang, X.: An image encryption approach based on chaotic maps and genetic operations. Multimed. Tools Appl. 79(35), 25613–25633 (2020)

    Article  Google Scholar 

  15. Fournier-Prunaret, D., Lopez-Ruiz, R.: Basin bifurcations in a two-dimensional logistic map (2003). arXiv:nlin/0304059

  16. Pradhan, C., Saxena, V., Bisoi, A. K.: Imperceptible watermarking technique using Arnold’s transform and cross chaos map in DCT Domain. Int. J. Comput. Appl. 55(15) (2012)

  17. Sala, R.D., Bellizia, D., Scotti, G.: High-throughput FPGA-compatible TRNG architecture exploiting multistimuli metastable cells. IEEE Trans. Circuits Syst. I Regul. Pap. 69(12), 4886–4897 (2022)

    Article  Google Scholar 

  18. Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. J. Select. Areas Telecommun. 1(2), 31–38 (2011)

  19. Bibi, N., Farwa, S., Muhammad, N., Jahngir, A., Usman, M.: Correction: a novel encryption scheme for high-contrast image data in the Fresnelet domain. PLoS ONE 13(4), e0196781 (2018)

    Article  Google Scholar 

  20. Farwa, S., Bibi, N., Muhammad, N.: An efficient image encryption scheme using Fresnelet transform and elliptic curve based scrambling. Multimed. Tools Appl. 79(37), 28225–28238 (2020)

    Article  Google Scholar 

  21. Ahmad, J., Hwang, S.O.: A secure image encryption scheme based on chaotic maps and affine transformation. Multimed. Tools Appl. 75(21), 13951–13976 (2016)

    Article  Google Scholar 

  22. Akraam, M., Rashid, T., Zafar, S.: A chaos-based image encryption scheme is proposed using multiple chaotic maps. Math. Prob. Eng. 2003724, 13 (2023)

    Google Scholar 

  23. Su, Y., Xue, X., Deng, R., Wang, Y., Zhao, Q., Li, T., Li, Y., Liu, S., Zhao, J.: Asymmetric double-image encryption based on chaotic random phase encoding. Appl. Opt. 61, 7608–7617 (2022)

    Article  Google Scholar 

  24. Zahid, A.H., Al-Solami, E., Ahmad, M.: A novel modular approach based substitution-box design for image encryption. IEEE Access 8, 150326–150340 (2020)

    Article  Google Scholar 

  25. ul Haq, T., Shah, T.: 4D mixed chaotic system and its application to RGB image encryption using substitution-diffusion. J. Inf. Secur. Appl. 61, 102931 (2021)

  26. Malik, M.G.A., Bashir, Z., Iqbal, N., Imtiaz, M.A.: Color image encryption algorithm based on hyper-chaos and DNA computing. IEEE Access 8, 88093–88107 (2020)

    Article  Google Scholar 

  27. Rehman, A.U., Firdous, A., Iqbal, S., Abass, Z., Shahid, M.M.A., Wang, H., Ullah, F.: A color image encryption algorithm based on one time key, chaos theory, and concept of rotor machine. IEEE Access 8, 172275–172295 (2020)

    Article  Google Scholar 

  28. Zahid, A.H., Iliyasu, A.M., Ahmad, M., Shaban, M.M.U., Arshad, M.J., Alhadawi, H.S., Abd El-Latif, A.A.: A novel construction of dynamic S-box with high nonlinearity using heuristic evolution. IEEE Access 9, 67797–67812 (2021)

  29. Zhang, Y.Q., Hao, J.L., Wang, X.Y.: An efficient image encryption scheme based on s-boxes and fractional-order differential logistic map. IEEE Access 8, 54175–54188 (2020)

    Article  Google Scholar 

  30. Malik, D.S., Shah, T.: Color multiple image encryption scheme based on 3D-chaotic maps. Math. Comput. Simul. 178, 646–666 (2020)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

The authors are grateful to the reviewers for their comments and suggestions to improve the manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tabasam Rashid.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Akraam, M., Rashid, T. & Zafar, S. A novel and secure image encryption scheme based on two-dimensional logistic and Arnold Cat map. Cluster Comput 27, 2029–2048 (2024). https://doi.org/10.1007/s10586-023-04084-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-023-04084-w

Keywords

Navigation