Skip to main content

Color image encryption in non-RGB color spaces


To protect the contents of images in the mobile internet era during image storage and transmission, image encryption has achieved a tremendous success during the last decades. Traditional color image encryption method often use the RGB color space. We have the observation that in non-RGB color spaces, the luminance channels often contain more information for content recognition than the chroma channels do. Thus, in this paper we propose to use high level encryption schemes in more informative channels and low level encryption schemes in less informative channels. The 2D Arnold’s cat map followed by the 3D Lu chaotic map are conducted in the luminance channel. The less complicated DNA coding and 1D logistic map based encryption scheme is leveraged in the chroma channels. We use this strategies in 4 typical non-RGB color spaces, i.e., YCbCr, YIQ, HSV, L*a*b*. We evaluate and compare the performances and the time consumptions of the methods in the 4 Non-RGB color spaces. The experimental results reveal that the encryption methods in Non-RGB color spaces can achieve similar results as the method that conducts the same encryption level in each channel of the RBG color space, including the resistance to several attacks such as brute-force attack, statistic attack, correlation attack, while consuming less time. The method in YCbCr color space performances the best in the time consumption.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12


  1. Arnold’s cat map,

  2. Fei-Fei L, Fergus R, Perona P (2004) Learning generative visual models from few training examples: an incremental Bayesian approach tested on 101 object categories. CVPR 2004, Workshop on generative-model based vision. IEEE

  3. Guellier A, Bidan C, Nicolas P (2014) Homomorphic cryptography-based privacy-preserving network communications. In: Proceedings of 5th international conference on applications and techniques in information security (ATIS). Melbourne, pp 159–170

  4. Hermassi H, Belazi A, Rhouma R, Belghith SM (2014) Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps. Multi Tools Appl 72(3):2211–2224

    Article  MATH  Google Scholar 

  5. HSL and HSV color space,

  6. Jin X, Tian Y, Song C et al (2015) An invertible and anti-chosen plaintext attack image encryption method based on DNA encoding and chaotic mapping. In: Chinese automation congress (CAC). Wuhan, pp 1159–1164

  7. Jin X, Chen Y, Ge S et al (2015) Color image encryption in CIE L*a*b* Space. In: The proceeding of the 6th international conference on applications and techniques for information security (ATIS). Beijing, pp 74–84

  8. Jin X, Liu Y, Li XD, Zhao G, Chen YY, Guo K (2015) Privacy preserving face identification through sparse representation. In: The proceedings of the 10th Chinese conference on biometric recognition (CCBR). Tianjin, pp 160–167

  9. Jin X, Yin S, Li X, Zhao G et al (2016) Color image encryption in YCbCr space. In: The proceeding of the 8th international conference on wireless communications & signal processing (WCSP). Yangzhou, pp 1–5

  10. Jin X, Guo K, Song C et al (2016) Private video foreground extraction through chaotic mapping based encryption in the cloud. In: The 22nd international conference on multimedia modelling (MMM). Miami, pp 562–573

  11. Jin X, Wu Z, Song C et al (2016) 3D point cloud encryption through chaotic mapping. In: The pacific-rim conference on multimedia (PCM). Xi’an, pp 119–129

  12. Lab color space,

  13. Ling B, Liu LC (2010) Image encryption algorithm based on chaotic map and S-DES. Inter Conf Advanced Comput Control 5:41–44

    Google Scholar 

  14. Mahdi A, Alzubaiti N (2014) Selective image encryption with 3D chaotic map. Eur Acad Research 2(4):4757–4773

    Google Scholar 

  15. Wang YZ, Ren GY, Jiang JL, Zhang J, Sun LJ (2007) Image encryption method based on chaotic map. In: 2nd IEEE conference on industrial electronics and applications (ICIEA), pp 2558–2560

  16. Xie X, Carol L (2016) A pivot-hinged, multilayer SU-8 micro motion amplifier assembled by a self-aligned approach. In: 2016 IEEE 29th international conference on micro electro mechanical systems (MEMS)

  17. Xie X, Zaitsev Y, Velásquez-García L F, Teller SJ, Livermore C (2014) Scalable, MEMS-enabled, vibrational tactile actuators for high resolution tactile displays. J Micromech Microeng 24(12):125014

    Article  Google Scholar 

  18. YCbCr color space,

  19. YIQ color space,

  20. Zhang Q, Guo L, Wei XP (2010) Image encryption using DNA addition combing with chaotic maps. Math Comput Model 52(11-12):2028–2035

    Article  MATH  Google Scholar 

  21. Zhang Y, He L, Fu B (2012) Research on DNA cryptography. Appl Cryptogr Netw Secur 357:6303–6319

    Google Scholar 

  22. Zhen P, Zhao G, Min LQ, Jin X (2015) Chaos-based image encryption scheme combining DNA coding and entropy. Multimedia Tools and Applications (MTA) 75(11):6303–6319

    Article  Google Scholar 

Download references


We thank all the reviewers and editors. This work is partially supported by the National Natural Science Foundation of China (Grant NO. 61402021, 61401228, 61640216), the Science and Technology Project of the State Archives Administrator (Grant NO. 2015-B-10), the open funding project of State Key Laboratory of Virtual Reality Technology and Systems, Beihang University (Grant NO. BUAA-VR-16KF-09), the Fundamental Research Funds for the Central Universities (Grant NO. 2016LG03, 2016LG04), the China Postdoctoral Science Foundation (Grant NO. 2015M581841), and the Postdoctoral Science Foundation of Jiangsu Province (Grant NO. 1501019A).

Author information

Authors and Affiliations


Corresponding author

Correspondence to Shiming Ge.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Jin, X., Yin, S., Liu, N. et al. Color image encryption in non-RGB color spaces. Multimed Tools Appl 77, 15851–15873 (2018).

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI:


  • Color image encryption
  • Non-RGB
  • Color space
  • Security attack