Skip to main content
Log in

An efficient image encryption algorithm based on a novel chaotic map

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, we propose a novel low dimensional chaotic map, namely, compounded piecewise linear map (CPLM) in order to balance between security and computational complexity. Then we prove the chaotic properties of CPLM theoretically and numerically. Based on the CPLM, an efficient chaotic image encryption algorithm is presented, in which the self-adaptive model and feedback mechanism are initially mingled to enhance the security. Besides, initial values of iteration are generated in a new way to ensure the sensitivity for the changes of plain-image. Simulation results show that our scheme possesses the high key sensitivity, large key space, fast encryption speed and resists the common attacks, especially differential attack. In addition, our algorithm satisfies the applicabilities of all-zero image and binary image which are seldom considered in the existing algorithms. The proposed algorithm justifies the superior security and good efficiency, which can be regarded as an excellent candidate for practical applications of image encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Abderrahim NW, Benmansour FZ, Seddiki O (2014) A chaotic stream cipher based on symbolic dynamic description and synchronization. Nonlinear Dyn 78(1):197–207

    Article  Google Scholar 

  2. Alvarez G, Li SJ (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcat Chaos 16(8):2129–2151

    Article  MATH  MathSciNet  Google Scholar 

  3. Azzaz MS, Tanougast C, Sadoudi S, Bouridane A (2013) Synchronized hybrid chaotic generators: application to real-time wireless speech encryption. Commun Nonlinear Sci Numer Simulat 18(8):2035–3047

    Article  MATH  MathSciNet  Google Scholar 

  4. Chen RJ, Lai JL (2007) Image security system using recursive cellular automata substitution. Pattern Recogn 40(5):1621–1631

    Article  MATH  Google Scholar 

  5. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcat Chaos 8(6):1259–1284

    Article  MATH  MathSciNet  Google Scholar 

  6. Fu C, Chen JJ, Zou H, Meng WH, Zhan YF, Yu YW (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Express 20(3):2363–2378

    Article  Google Scholar 

  7. Fu C, Lin BB, Miao YS, Liu X, Chen JJ (2011) A novel chaos-based bit-level permutation scheme for digital image encryption. Opt Commun 284(23):5415–5423

    Article  Google Scholar 

  8. Fu ZJ, Sun XM, Liu Q, Zhou L, Shu JG (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE T Commun E98-B(1):190–200

    Article  Google Scholar 

  9. Huang R, Rhee KH, Uchida S (2014) A parallel image encryption method based on compressive sensing. Multimed Tools Appl 72(1):71–93

    Article  Google Scholar 

  10. Huang XL, Ye GD (2014) An efficient self-adaptive model for chaotic image encryption algorithm. Commun Nonlinear Sci Numer Simulat 19(12):4094–4104

    Article  Google Scholar 

  11. Jeng FG, Huang WL, Chen TH (2015) Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes. Signal Process Image Commun 34:45–51

    Article  Google Scholar 

  12. Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput Appl 26(5):1137–1148

    Article  Google Scholar 

  13. Kwok HS, Tang WKS (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons Fractals 32(4):1518–1529

    Article  MATH  MathSciNet  Google Scholar 

  14. Li S, Chen G, Mou X (2005) On the dynamical degradation of digital piecewise linear chaotic maps. Int J Bifurcat Chaos 15(10):3119–3151

    Article  MATH  MathSciNet  Google Scholar 

  15. Li SJ, Mou XQ, Yang BL, Ji Z, Zhang JH (2003) Problems with a probabilistic encryption scheme based on chaotic systems. Int J Bifurcat Chaos 13(10):3063–3077

    Article  MATH  MathSciNet  Google Scholar 

  16. Liu YS, Tang J, Xie T (2014) Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map. Optics Laser Technol 60:111–115

    Article  Google Scholar 

  17. Liu HJ, Wang XY, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466

    Article  Google Scholar 

  18. Luo YL, Du MH, Liu JX (2015) A symmetrical image encryption scheme in wavelet and time domain. Commun Nonlinear Sci Numer Simulat 20(2):447–460

    Article  Google Scholar 

  19. Norouzi BY, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion. Multimed Tools Appl 71(3):1469–1497

    Article  Google Scholar 

  20. Pan SM, Wen RH, Zhou ZH, Zhou NR (2016) Optical multi-image encryption scheme based on discrete cosine transform and nonlinear fractional Mellin transform. Multimed Tools Appl: 1–21

  21. Pareek NK, Patidar V, Sud KK (2005) Cryptography using multiple one-dimensional chaotic maps. Commun Nonlinear Sci Numer Simulat 10(7):715–723

    Article  MATH  MathSciNet  Google Scholar 

  22. Parvin Z, Seyedarabi H, Shamsi M (2014) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimed Tools Appl: 1–18

  23. Patidar V, Pareek NK, Purohit G, Sud KK (2011) A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Opt Commun 284(19):4331–4339

    Article  Google Scholar 

  24. Ping P, Xu F, Wang ZJ (2014) Image encryption based on non-affine and balanced cellular automata. Signal Process 105:419–429

    Article  Google Scholar 

  25. Qin C, Zhang XP (2015) Reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image R 31:154–164

    Article  Google Scholar 

  26. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715

    Article  MATH  MathSciNet  Google Scholar 

  27. Singh PK, Singh RS, Rai KN (2015) An image encryption algorithm based on XOR operation with approximation component in wavelet transform. Fifth Natl Conf Comput Vision, Pattern Recogn, Imag Process Graph: 1–4

  28. Sui LS, Duan KK, Liang JL (2015) Double-image encryption based on discrete multiple-parameter fractional angular transform and two-coupled logistic maps. Opt Commun 343:140–149

    Article  Google Scholar 

  29. Tang ZJ, Song J, Zhang XQ, Sun RH (2016) Multiple-image encryption with bit-plane decomposition and chaotic maps. Opt Laser Eng 80:1–11

    Article  Google Scholar 

  30. Tang ZJ, Wang F, Zhang XQ (2016) Image encryption based on random projection partition and chaotic system. Multimed Tools Appl: 1-27

  31. Tang ZJ, Zhang XQ (2011) Secure image encryption without size limitation using Arnold transform and random strategies. J Multimed 6(2):202–206

    Article  MathSciNet  Google Scholar 

  32. Tang ZJ, Zhang XQ, Lan WW (2015) Efficient image encryption with block shuffling and chaotic map. Multimed Tools Appl 74(15):5429–5448

    Article  Google Scholar 

  33. Wang XY, Guo K (2014) A new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn 76(4):1943–1950

    Article  MATH  Google Scholar 

  34. Wang XY, Jin CQ (2012) Image encryption using Game of Life permutation and PWLCM chaotic system. Opt Commun 285(4):412–417

    Article  Google Scholar 

  35. Wang XY, Liu CM (2016) A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed Tools Appl: 1–17

  36. Wang SH, Liu WR, Lu HP, Kuang JY, Gang H (2004) Periodicity of chaotic trajectories of single and coupled maps in realizations of finite computer precisions. Int J Mod Phys B 18(17-19):2617–2622

    Article  Google Scholar 

  37. Wang XY, Wei N, Zhang DD (2015) A novel image encryption algorithm based on chaotic system and improved Gravity Model. Opt Commun 338:209–217

    Article  Google Scholar 

  38. Wang XY, Xu DH (2014) Image encryption using genetic operators and intertwining logistic map. Nonlinear Dyn 78(4):2975–2984

    Article  MathSciNet  Google Scholar 

  39. Wang XY, Zhang HL (2015) A color image encryption with heterogeneous bit-permutation and correlated chaos. Opt Commun 342:51–60

    Article  Google Scholar 

  40. Wen WY, Zhang YS, Fang ZJ, Chen JX (2015) Infrared target-based selective encryption by chaotic maps. Opt Commun 341:131–139

    Article  Google Scholar 

  41. Xia ZH, Wang XH, Sun XM, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE T Parall Distr 27(2):340–352

    Article  Google Scholar 

  42. Yao W, Zhang X, Zheng ZM, Qiu WJ (2014) A colour image encryption algorithm using 4-pixel Feistel structure and multiple chaotic systems. Nonlinear Dyn 81:151–168

    Article  MathSciNet  Google Scholar 

  43. Yap WS, Phan RCW, Yau WC, Heng SH (2015) Cryptanalysis of a new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn 80(3):1483–1491

    Article  MATH  MathSciNet  Google Scholar 

  44. Yuan HM, Liu Y, Gong LH, Wang J (2016) A new image cryptosystem based on 2D hyper-chaotic system. Multimed Tools Appl: 1–22

  45. Zhang LY, Hu XB, Liu YS, Wong KW, Gan J (2014) A chaotic image encryption scheme owning temp-value feedback. Commun Nonlinear Sci Numer Simulat 19(10):3653–3659

    Article  MathSciNet  Google Scholar 

  46. Zhang LY, Li CQ, Wong KW, Shu S, Chen GR (2012) Cryptanalyzing a chaos-based image encryption algorithm using alternate structure. J Syst Software 85(9):2077–2085

    Article  Google Scholar 

  47. Zhang X, Li W, Zheng ZM, Guo BH (2012) Optimized statistical analysis of software trustworthiness attributes. Sci Chin Inform Sci 55(11):2508–2520

    Article  MATH  MathSciNet  Google Scholar 

  48. Zhang YQ, Wang XY (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn 77(3):687–698

    Article  Google Scholar 

  49. Zhang XP, Zhao ZM, Wang JY (2014) Chaotic image encryption based on circular substitution box and key stream buffer. Signal Process Image Commun 29(8):902–913

    Article  Google Scholar 

  50. Zhu CX (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(1):29–37

    Article  Google Scholar 

  51. Zhu CX, Liao CL, Deng XH (2013) Breaking and improving an image encryption scheme based on total shuffling scheme. Nonlinear Dyn 71(1-2):25–34

    Article  MathSciNet  Google Scholar 

  52. Zhu CX, Xu SY, Hu YP, Sun KH (2015) Breaking a novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn 79(2):1511–1518

    Article  Google Scholar 

  53. Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inform Sci 181(6):1171–1186

    Article  Google Scholar 

Download references

Acknowledgments

Authors thank the editor and reviewers a lot for their valuable suggestions. This research is supported by the Major Program of National Natural Science Foundation of China (No.: 11290141), the National Natural Science Foundation of China (No.: 61402030), and the Fundamental Research of Civil Aircraft (No.: MJ-F-2012-04).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiao Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, C., Zhang, X. & Zheng, Z. An efficient image encryption algorithm based on a novel chaotic map. Multimed Tools Appl 76, 24251–24280 (2017). https://doi.org/10.1007/s11042-016-4102-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-4102-y

Keywords

Navigation