Multimedia Tools and Applications

, Volume 77, Issue 7, pp 8911–8938 | Cite as

A novel image encryption scheme based on logistic map and dynatomic modular curve

  • Bo Li
  • Xiaofeng Liao
  • Yan Jiang


A new image encryption and decryption algorithm based on chaotic map and dynatomic modular curve is proposed in this paper. Firstly, the definition of dynatomic modular curve and its periodic points are introduced, and a property of the dynatomic modular curve is proved. Secondly, the relationship between the Logistic map and the dynatomic modular curve is discussed. Finally, the encryption algorithm which is composed of permutation of pixels and substitution is given. In order to eliminate sufficiently the relation between adjacent pixels in the image, pixel values of the original image are sorted as index function, which derives from Logistic map and dynatomic modular curve. And XOR operation is performed between the scrambled pixel sequence and projective transformation sequence. Simulation experiments and nonparametric hypothesis test demonstrate that the proposed algorithm is secure to resist different types of attacks and it can be applied to real-time encryption.


Logistic map Dynatomic modular curve Projective transformation Chi-Square test K-S test 



This work was supported by the National Key Research and Development Program of China 2016YFB0800601.


  1. 1.
    Chen G, Mao YB, Chui CK (2004) A sysmmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solution & Fractals 12:749–761CrossRefzbMATHGoogle Scholar
  2. 2.
    Chen WH, Luo S, Zheng WX (2016) Impulsive synchronization of reaction-diffusion neural networks with mixed delays and its application to image encryption. IEEE Transactions on Neural Networks and Learning Systems 33(1):300–303Google Scholar
  3. 3.
    Chhotaray A, Biswas S, Chhotaray SK, Rath GS (2015) An image encryption technique using orthonormal matrices and chaotic maps. Proceeding of 3rd International conference on advanced computing. Networking and Informatics 9(44):355–362Google Scholar
  4. 4.
    Cong-Xu Z, Ke-Hui S (2012) Cryptanalysis and improvement of a class of hyper-chaos based image encryption algorithms. Acta Phys Sin 61(12):1–12Google Scholar
  5. 5.
    Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud Search services: multi-keyword ranked Search over encrypted cloud data supporting Parallel computing. IEICE Trans Commun E98-B(1):190–200CrossRefGoogle Scholar
  6. 6.
    R. Hartshorne (1977) Algebraic geometry. Springer-Verlag, New York. GraduateTexts in Mathematics, 52Google Scholar
  7. 7.
    Hua T, Chen J, Pei D, Zhang W, Zhou N (2015) Quantum image encryption algorithm based on image correlation decomposition. Int J Theor Phys 54:526–537CrossRefzbMATHGoogle Scholar
  8. 8.
    Huang X (2012) Image encryption algorithm using chaotic chebyshev generator. Nonlinear Dyn 67:2411–2417MathSciNetCrossRefGoogle Scholar
  9. 9.
    Huang CK, Liao CW, Hsu SL, Jeng YC (2013) Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommun Systems 52(2):563–571Google Scholar
  10. 10.
    Kamara S, Lauter K (2010) Cryptographic cloud storage. In: Financial cryptography and data security. Springer. pp. 136–149Google Scholar
  11. 11.
    Kwok HS, Tang WKS (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solution & Fractals 32:1518–1529MathSciNetCrossRefzbMATHGoogle Scholar
  12. 12.
    Li S, Zheng X (2002) Cryptanalysis of a chaotic image encryption method. Proceedings of the IEEE International Conference on Circuits and Systems 2:708–711Google Scholar
  13. 13.
    Lin T, Xingyuan W (2012) A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive. Opt Commun 2012:940276Google Scholar
  14. 14.
    Liu L, Miao S (2016) A new image encryption algorithm based on logistic chaotic map with varying parameter. Spring 5(1):1–12CrossRefGoogle Scholar
  15. 15.
    Liu H, Wang X (2010) Color image encryption based on onetime keys and robust chaotic maps. Comput Math Appl 59(10):3320–3327MathSciNetCrossRefzbMATHGoogle Scholar
  16. 16.
    Manjunath Prasad, K.L. Sudha (2011) Chaos image encryption using pixel shuffling. Computer Science & Information Technology 1(12):169–179Google Scholar
  17. 17.
    Parvin Z, Seyedarabi H, Shamsi M (2016) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimedia Tools and Applications 75(17):10631–10648Google Scholar
  18. 18.
    Qin C, Zhang X (2015) Reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164CrossRefGoogle Scholar
  19. 19.
    Qin C, Chang C-C, Chiu Y-P (2014) A novel joint data-hiding and compression scheme based on SMVQ and image Inpainting. IEEE Trans Image Process 23(3):969–978MathSciNetCrossRefzbMATHGoogle Scholar
  20. 20.
    Rajput AS, Sharma M (2015) A novel image encryption and authentication scheme using chaotic maps. Advances in intelligent informatics. Springer International Publishing Switzerland 26:277–286Google Scholar
  21. 21.
    Sharath Kumar HS, Panduranga HT, Naveen Kumar SK (2013) A two stage combinational approach for image encryption. Advances in Computing & Information Technology.Conference paper (AISC,volume 177):843–849Google Scholar
  22. 22.
    Joseph H. Silverman (2007) The arithmetic of dynamical systems. Springer Science + Business Media, LLC.148–158Google Scholar
  23. 23.
    Sivakumar T, Venkatesan R (2016) A new image encryption method based on Knight’s travel path and true random number. Journal of Information Science and Engineering, Jan 32(1):133–152Google Scholar
  24. 24.
    Wang X-Y, Feng C, Tian W (2009) A new compound mode of confusion and diffusion for block encryption of image based on chaos. Commun Nonlinear Sci Numer Simul 15(9):2479–2485MathSciNetCrossRefzbMATHGoogle Scholar
  25. 25.
    Wang H, Xu J-P, Sheng X-S, Zan P (2014) Discrete chaotic synchronization and It’s application in image encryption. LSMS/ICSEE2014, part 2. CCIS 462:264–272Google Scholar
  26. 26.
    Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked Search scheme over encrypted cloud data. IEEE Transactions On Parallel And Distributed Systems 27(2):340–352CrossRefGoogle Scholar
  27. 27.
    Ye G, Wong K-W (2012) An efficient chaotic image encryption algorithm based on a generalized Arnold map. Nonlinear Dyn 69:2079–2087MathSciNetCrossRefGoogle Scholar
  28. 28.
    Yuan H-M, Liu Y, Gong L-H, Wang J (2017) A new image cryptosystem based on 2D hyper-chaotic system. Multimedia Tools and Applications 76(6):8087–8108Google Scholar
  29. 29.
    Zhang S, Gao T (2016) An image encryption scheme based on DNA coding and permutation of hyper-image. Multimedia Tools and Applications 75(24):17157–17170Google Scholar
  30. 30.
    Zhang Q, Xue X, Wei X (2012) A novel image encryption algorithm based on DNA subsequence operation. Sci World J 2012:286741Google Scholar

Copyright information

© Springer Science+Business Media New York 2017

Authors and Affiliations

  1. 1.College of Electronic and Information EngineeringSouthwest UniversityChongqingChina
  2. 2.Department of MathematicsLogistical Engineering UniversityChongqingChina
  3. 3.Department of MathematicsChong Qing Energy CollegeChongqingChina

Personalised recommendations