Skip to main content
Log in

Scale invariant digital image encryption using 3D modular chaotic map

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Cryptography techniques are used to preserve the privacy and integrity of image media. Most proposed cryptographic images methods based on chaotic maps are dependent upon image sizes and most of them worked on square images. Tackling this problem, a scale invariant gray level image encryption method is proposed by means of 3D modular chaotic map. Initially, a 2D image with desirable size M × N is converted into a 3D image with m sub-images by size n × n. Optimizing the calculation, the parameters m and n should be appropriately selected. Having diffusion and confusion properties, two steps of 3D substitution and a 3D permutation step are used. In the 3D substitution steps, the pixels value of sub-images will be changed using the XOR operators and the circular shift. In the permutation step the pixels position of sub-images will be changed using 3D modular chaotic map, In this case, the m sub-images are divided into \( k=\left\lceil \frac{m}{n}\right\rceil \) equal size windows which each window has n sub-images with size n × n, and the 3D modular chaotic map is performed on any window with independent parameters. Depending upon the value of m, the number of windows is greater than or equal to 1; for k > 1, the last two windows may overlap to perform 3D chaotic map operation. Accelerating the proposed encryption method, the 3D chaotic map operations on windows can be implemented in parallel. The proposed method, in comparison with other methods of image encryption, improves the statistical parameters of cryptographic analysis, key space, and speed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Kumari M, Gupta S, Sardana P (2017) A survey of image encryption algorithms. 3D Res 8(4):37

    Article  Google Scholar 

  2. Hua Z, Jin F, Xu B, Huang H (2018) 2D logistic-sine-coupling map for image encryption. Signal Process 149:148–161

    Article  Google Scholar 

  3. Gong L, Qiu K, Deng C, Zhou N (2019) An optical image compression and encryption scheme based on compressive sensing and RSA algorithm. Opt Lasers Eng 121:169–180

    Article  Google Scholar 

  4. Zhang Y, Xiao D (2014) An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simul 19(1):74–82

    Article  Google Scholar 

  5. Zhang Y, Xiao D, Shu Y, Li J (2013) A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations. Signal Process Image Commun 28(3):292–300

    Article  Google Scholar 

  6. Fu C, Chen J, Zou H, Meng W, Zhan Y, Yu Y (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Express 20(3):2363

    Article  Google Scholar 

  7. Ye G, Huang X (May 2018) Spatial image encryption algorithm based on chaotic map and pixel frequency. Sci China Inf Sci 61(5):058104

    Article  MathSciNet  Google Scholar 

  8. Zhang Y-Q, Wang X-Y (2014) A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf Sci (NY) 273:329–351

    Article  Google Scholar 

  9. Zhang Y-Q, Wang X-Y (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10–20

    Article  Google Scholar 

  10. Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934

    Article  Google Scholar 

  11. Tong X, Cui M (2008) Image encryption with compound chaotic sequence cipher shifting dynamically. Image Vis Comput 26(6):843–850

    Article  Google Scholar 

  12. Enayatifar R, Sadaei HJ, Abdullah AH, Lee M, Isnin IF (2015) A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata. Opt Lasers Eng 71:33–41

    Article  Google Scholar 

  13. Chen J, Zhu Z, Zhang L, Zhang Y, Yang B (2018) Exploiting self-adaptive permutation–diffusion and DNA random encoding for secure and efficient image encryption. Signal Process 142:340–353

    Article  Google Scholar 

  14. Jiang D, Chen Y, Gu X, Xie L, Chen L (Jan. 2017) Efficient and universal quantum key distribution based on chaos and middleware. Int J Mod Phys B 31(02):1650264

    Article  Google Scholar 

  15. Zhou N, Hu Y, Gong L, Li G (2017) Quantum image encryption scheme with iterative generalized Arnold transforms and quantum image cycle shift operations. Quantum Inf Process 16(6):164

    Article  MathSciNet  Google Scholar 

  16. Zhou N, Yan X, Liang H, Tao X, Li G (2018) Multi-image encryption scheme based on quantum 3D Arnold transform and scaled Zhongtang chaotic system. Quantum Inf Process 17(12):338

    Article  Google Scholar 

  17. Zhou NR, Hua TX, Gong LH, Pei DJ, Liao QH (2015) Quantum image encryption based on generalized Arnold transform and double random-phase encoding. Quantum Inf Process 14(4):1193–1213

    Article  MathSciNet  Google Scholar 

  18. Zhou Y, Panetta K, Agaian S, Chen CLP (2012) Image encryption using P-Fibonacci transform and decomposition. Opt Commun 285(5):594–608

    Article  Google Scholar 

  19. Hua Z, Zhou Y (2017) Design of image cipher using block-based scrambling and image filtering. Inf Sci (NY) 396:97–113

    Article  Google Scholar 

  20. Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25

    Article  Google Scholar 

  21. Zhou Y, Bao L, Chen CLP (2013) Image encryption using a new parametric switching chaotic system. Signal Process 93(11):3039–3052

    Article  Google Scholar 

  22. Ping P, Fan J, Mao Y, Xu F, Gao J (2018) A Chaos based image encryption scheme using digit-level permutation and block diffusion. IEEE Access 6:67581–67593

    Article  Google Scholar 

  23. Lan R, He J, Wang S, Gu T, Luo X (2018) Integrated chaotic systems for image encryption. Signal Process 147:133–145

    Article  Google Scholar 

  24. Li C, Liu Y, Xie T, Chen MZQ (2013) Breaking a novel image encryption scheme based on improved hyperchaotic sequences. Nonlinear Dyn 73(3):2083–2089

    Article  MathSciNet  Google Scholar 

  25. Li C (2016) Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process 118:203–210

    Article  Google Scholar 

  26. Xie EY, Li C, Yu S, Lü J (2017) On the cryptanalysis of Fridrich’s chaotic image encryption scheme. Signal Process 132:150–154

    Article  Google Scholar 

  27. Liu M, Zhang S, Fan Z, Qiu M (2012) ${\text H}_{\infty}$ state estimation for discrete-time chaotic systems based on a unified model. IEEE Trans Syst Man Cybern Part B 42(4):1053–1063

    Article  Google Scholar 

  28. Radwan AG, Abd-El-Hafiz SK, Barakat ML, Abdel Haleem SH (2014) A fractal-based image encryption system. IET Image Process 8(12):742–752

    Article  Google Scholar 

  29. Zhang X, Wang X (2018) Digital image encryption algorithm based on elliptic curve public cryptosystem. IEEE Access 6:70025–70034

    Article  Google Scholar 

  30. Wang W, Tan H, Sun P, Pang Y, Ren B (2016) A novel digital image encryption algorithm based on wavelet transform and multi-chaos. In: Wireless communication and sensor network. World Scientific Publishing, Singapore, pp 711–719

    Chapter  Google Scholar 

  31. Wang W et al (2018) An encryption algorithm based on combined chaos in body area networks. Comput Electr Eng 65:282–291

    Article  Google Scholar 

  32. Agarwal S (2018) A review of image scrambling technique using chaotic maps. Int J Eng Technol Innov 8(2):77–98

    Google Scholar 

  33. Sankpal PR, Vijaya PA (2014) Image encryption using Chaotic maps: a survey. In: 2014 fifth international conference on signal and image processing, pp 102–107

    Chapter  Google Scholar 

  34. Alireza Jolfaei AM (2011) An image encryption approach using Chaos and stream cipher. J Theor Appl Inf Technol 4(1):117–123

    Google Scholar 

  35. Wang X-Y, Li P, Zhang Y-Q, Liu L-Y, Zhang H, Wang X (2018) A novel color image encryption scheme using DNA permutation based on the Lorenz system. Multimed Tools Appl 77(5):6243–6265

    Article  Google Scholar 

  36. Zhang Y, Hou W (2016) A fast image encryption algorithm using plaintext-related confusion. In: 2016 IEEE information technology, networking, electronic and automation control conference, pp 293–297

    Chapter  Google Scholar 

  37. Wang X, Zhu X, Zhang Y (2018) An image encryption algorithm based on Josephus traversing and mixed chaotic map. IEEE Access 6:23733–23746

    Article  Google Scholar 

  38. M. Kumar, S. Kumar, R. Budhiraja, M. K. Das, and S. Singh, “Intertwining logistic map and cellular automata based color image encryption model,” in 2016 international conference on computational techniques in information and communication technologies (ICCTICT), 2016, pp. 618–623.

  39. Das S, Mondal SN, Sanyal MK (2018) Image encryption based on Arnold cat map and GA operator. Springer, Singapore

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ali Broumandnia.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendices

Appendix A

The reverse SI3DMCM is shown in Fig. 14.

Fig. 14
figure 14

Reverse scale invariant 3D modular chaotic map (RSI3DMCM) algorithm for digital image decryption with size M × N

Appendix B

The reverse scale invariant image decryption is shown in Fig. 15.

Fig. 15
figure 15

The proposed scale invariant digital image decryption algorithm

Appendix C

The reverse scale invariant image decryption is shown in block diagram Fig. 16.

Fig. 16
figure 16

The reverse scale invariant image decryption block diagram

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Broumandnia, A. Scale invariant digital image encryption using 3D modular chaotic map. Multimed Tools Appl 79, 11327–11355 (2020). https://doi.org/10.1007/s11042-019-08337-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08337-y

Keywords

Navigation