Skip to main content
Log in

A new Grayscale image encryption algorithm composed of logistic mapping, Arnold cat, and image blocking

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper proposes a new chaotic-based encryption algorithm to encrypt images securely and effectively. A combination of Arnold cat, logistic mapping and image blocking has been used to design this algorithm. The proposed algorithm is a special algorithm that not only does it use image blocking once to relocate the pixels in four areas of the image separately but also uses an Arnold cat mapping to relocate the pixels across the whole image once again. This results in a higher number of pixel relocations which makes it impossible to decode without the key. The other interesting and new point is the particular use of chaotic logistic mapping to develop three image keys and to combine them with the input image, and to develop four other image keys to encrypt the image. Relocation of the input image blocks and the images generated by the logistic mapping are conducted through sorting the numbers generated by the mapping and how they have been relocated. Then, Arnold cat is used to relocate the pixels across the whole image (which is a combination of the input image and three images generated by logistic mapping). Eventually, the encryption operation is conducted on the obtained image using the encryption key (the image generated through the combination of the four keys). Numerous statistical tests and security analyses indicate the excellent security of our proposed algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig.9
Fig. 10
Fig. 11
Fig. 12
Fig.13

Similar content being viewed by others

References

  1. Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. Dissertation, University of Buckingham. https://doi.org/10.1007/s11071-018-4159-4

    Article  Google Scholar 

  2. Abdullah HN, Abdullah HA (2017) Image encryption using hybrid chaotic map. In: 2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT). IEEE, pp 121–125

  3. Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU Int J Electron Commun 66(10):806–816. https://doi.org/10.1016/j.aeue.2012.01.015

    Article  Google Scholar 

  4. Ahmad M, Alam MZ, Umayya Z, Khan S, Ahmad F (2018) An image encryption approach using particle swarm optimization and chaotic map. Int J Inf Technol 10(3):247–255. https://doi.org/10.1007/s41870-018-0099-y

    Article  Google Scholar 

  5. Asgari-Chenaghlu M, Balafar M-A, Feizi-Derakhshi M-R (2019) A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation. Signal Process 157:1–13. https://doi.org/10.1016/j.sigpro.2018.11.010

    Article  Google Scholar 

  6. Batool SI, Waseem HM (2019) A novel image encryption scheme based on Arnold scrambling and Lucas series. Multimed Tools Appl 78(19):27611–27637. https://doi.org/10.1007/s11042-019-07881-x

    Article  Google Scholar 

  7. Çavuşoğlu Ü, Kaçar S, Zengin A, Pehlivan I (2018) A novel hybrid encryption algorithm based on chaos and S-AES algorithm. Nonlinear Dyn 92(4):1745–1759. https://doi.org/10.1007/s11071-018-4159-4

    Article  MATH  Google Scholar 

  8. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749–761. https://doi.org/10.1016/j.chaos.2003.12.022

    Article  MathSciNet  MATH  Google Scholar 

  9. Daemen J, Rijmen V (1999) AES proposal: Rijndael. Katholieke Universiteit Leuven, ESAT-COSIC, Gaithersburg, MD, USA. https://doi.org/10.1016/j.aeue.2012.01.015

  10. Feng W, He Y-G, Li H-M, Li C-L (2019) Cryptanalysis of the integrated chaotic systems based image encryption algorithm. Optik 186:449–457. https://doi.org/10.1016/j.ijleo.2018.12.103

    Article  Google Scholar 

  11. Fu-Yan S, Shu-Tang L, Zong-Wang L (2007) Image encryption using high-dimension chaotic system. Chin Phys 16(12):3616–3623. https://doi.org/10.1088/1009-1963/16/12/011

    Article  Google Scholar 

  12. Gao W, Sun J, Qiao W, Zhang X (2019) Digital image encryption scheme based on generalized Mandelbrot-Julia set. Optik 185:917–929. https://doi.org/10.1016/j.ijleo.2019.02.007

    Article  Google Scholar 

  13. He J, Lan R, Wang S, Luo X (2017) An Integrated Chaotic System with Application to Image Encryption. In: International Conference on Neural Information Processing. Springer, pp 837–847. https://doi.org/10.1016/j.chaos.2004.11.096

  14. Huang X (2012) Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn 67(4):2411–2417. https://doi.org/10.1007/s11071-011-0155-7

    Article  MathSciNet  Google Scholar 

  15. Jiang N, Dong X, Hu H, Ji Z, Zhang W (2019) Quantum image encryption based on Henon mapping. Int J Theor Phys 58(3):979–991. https://doi.org/10.1007/s10773-018-3989-7

    Article  MathSciNet  MATH  Google Scholar 

  16. Kalra M, Katyal S, Singh R (2019) A tent map and logistic map based approach for Chaos-based image encryption and decryption. In: Innovations in Computer Science and Engineering. Springer, pp 159–165. https://doi.org/10.1007/s11554-019-00940-4

  17. Kanso A, Ghebleh M (2012) A novel image encryption algorithm based on a 3D chaotic map. Commun Nonlinear Sci Numer Simul 17(7):2943–2959. https://doi.org/10.1016/j.cnsns.2011.11.030

    Article  MathSciNet  MATH  Google Scholar 

  18. Khade PN, MJIJoCSI N (2012) 3D chaotic functions for image encryption. IJCSI Int J Comput Sci Issues 9(3):323

    Google Scholar 

  19. Khan JS, Ahmad J (2019) Chaos based efficient selective image encryption. Multidim Syst Sign Process 30(2):943–961. https://doi.org/10.1007/s11045-018-0589-x

    Article  MathSciNet  MATH  Google Scholar 

  20. Lan R, He J, Wang S, Gu T, Luo X (2018) Integrated chaotic systems for image encryption. Signal Process 147:133–145. https://doi.org/10.1016/j.sigpro.2018.01.026

    Article  Google Scholar 

  21. Li F, Wu H, Zhou G, Wei W (2019) Robust real-time image encryption with aperiodic chaotic map and random-cycling bit shift. J Real-Time Image Proc 16(3):775–790. https://doi.org/10.1007/s11554-018-0801-0

    Article  Google Scholar 

  22. Li M, Xu M, Luo J, Fan HJIA (2019) Cryptanalysis of an image encryption using 2D henon-sine map and DNA approach. IEEE Access 7:63336–63345. https://doi.org/10.1007/s11042-018-5807-x

    Article  Google Scholar 

  23. Lian S, Sun J, Wang Z (2005) A block cipher based on a suitable use of the chaotic standard map. Chaos, Solitons Fractals 26(1):117–129. https://doi.org/10.1016/j.chaos.2004.11.096

    Article  MATH  Google Scholar 

  24. Liu Y, Qin Z, Liao X, Wu J (2020) Cryptanalysis and enhancement of an image encryption scheme based on a 1-D coupled sine map. Nonlinear Dyn 100(3):2917–2931. https://doi.org/10.1007/s11071-020-05654-y

    Article  Google Scholar 

  25. Liu S, Sun J, Xu ZJJ (2009) An improved image encryption algorithm based on chaotic system. J Comput 4(11):1091–1100

    Google Scholar 

  26. Liu X, Xiao D, Liu C (2020) Quantum image encryption algorithm based on bit-plane permutation and sine logistic map. Quantum Inf Process 19(8):239. https://doi.org/10.1007/s11128-020-02739-w

    Article  MathSciNet  Google Scholar 

  27. Luo Y, Yu J, Lai W, Liu L (2019) A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimed Tools Appl 78(15):22023–22043. https://doi.org/10.1007/s11042-019-7453-3

    Article  Google Scholar 

  28. Mishra M, Routray AR, Japa KS (2014) High security image steganography with modified Arnold cat map. Int J Comput Appl 5. https://doi.org/10.1016/j.asoc.2009.12.011

  29. Mondal B, Behera PK, Gangopadhyay S (2020) A secure image encryption scheme based on a novel 2D sine–cosine cross-chaotic (SC3) map. J Real-Time Image Proc. https://doi.org/10.1007/s11554-019-00940-4

  30. Musanna F, Kumar S (2019) A novel fractional order chaos-based image encryption using fisher yates algorithm and 3-D cat map. Multimed Tools Appl 78(11):14867–14895. https://doi.org/10.1007/s11042-018-6827-2

    Article  Google Scholar 

  31. Norouzi B, Mirzakuchaki S (2014) A fast color image encryption algorithm based on hyper-chaotic systems. Nonlinear Dyn 78(2):995–1015. https://doi.org/10.1007/s11071-014-1492-0

    Article  Google Scholar 

  32. Noshadian S, Ebrahimzade A, Kazemitabar SJ (2018) Optimizing chaos based image encryption. Multimed Tools Appl 77(19):25569–25590. https://doi.org/10.1007/s11042-018-5807-x

    Article  Google Scholar 

  33. Parvaz R, Zarebnia M (2018) A combination chaotic system and application in color image encryption. Opt Laser Technol 101:30–41. https://doi.org/10.1016/j.optlastec.2017.10.024

    Article  Google Scholar 

  34. Peterson GJMLA (1997) Arnold’s cat map. Linear Algebra 45:1–7

    Google Scholar 

  35. Pisarchik AN, Zanin M (2008) Image encryption with chaotically coupled chaotic maps. Physica D 237(20):2638–2648. https://doi.org/10.1016/j.physd.2008.03.049

    Article  MathSciNet  MATH  Google Scholar 

  36. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x

    Article  MathSciNet  MATH  Google Scholar 

  37. Shokouh Saljoughi A, Mirvaziri H (2019) A new method for image encryption by 3D chaotic map. Pattern Anal Applic 22(1):243–257. https://doi.org/10.1007/s10044-018-0765-5

    Article  MathSciNet  Google Scholar 

  38. Srividya G, Nandakumar P (2011) A Triple-Key chaotic image encryption method. In: 2011 International Conference on Communications and Signal Processing. IEEE, pp 266–270. hhttps://doi.org/10.1016/j.ijleo.2019.02.007

  39. Talhaoui MZ, Wang X, Midoun MA (2020) Fast image encryption algorithm with high security level using the Bülban chaotic map. J Real-Time Image Proc. https://doi.org/10.1007/s11554-020-00948-1

  40. Tang Z, Xu S, Ye D, Wang J, Zhang X, Yu C (2019) Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image. J Real-Time Image Proc 16(3):709–724. https://doi.org/10.1007/s11554-018-0838-0

    Article  Google Scholar 

  41. Tang Z, Zhang X, Lan W (2015) Efficient image encryption with block shuffling and chaotic map. Multimed Tools Appl 74(15):5429–5448. https://doi.org/10.1007/s11042-014-1861-1

    Article  Google Scholar 

  42. Wang Y, Wong K-W, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514–522. https://doi.org/10.1016/j.asoc.2009.12.011

    Article  Google Scholar 

  43. Wang H, Xiao D, Chen X, Huang H (2018) Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map. Signal Process 144:444–452. https://doi.org/10.1016/j.sigpro.2017.11.005

    Article  Google Scholar 

  44. Zhang X, Chen W (2008) A new chaotic algorithm for image encryption. In: 2008 International Conference on Audio, Language and Image Processing. IEEE, pp 889–892. https://doi.org/10.1016/j.chaos.2003.12.022

  45. Zhang D, Zhang F (2014) Chaotic encryption and decryption of JPEG image. Optik 125(2):717–720. https://doi.org/10.1016/j.ijleo.2013.07.069

    Article  Google Scholar 

  46. Zhou Y, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182. https://doi.org/10.1016/j.sigpro.2013.10.034

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammadali Balafar.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zareai, D., Balafar, M. & Feizi Derakhshi, M.R. A new Grayscale image encryption algorithm composed of logistic mapping, Arnold cat, and image blocking. Multimed Tools Appl 80, 18317–18344 (2021). https://doi.org/10.1007/s11042-021-10576-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-10576-x

Keywords

Navigation