Skip to main content
Log in

An image encryption algorithm based on a novel hyperchaotic Henon sine map

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Chaotic maps are widely being researched for application in cryptography. In this paper, a new chaotic 2-Dimensional Henon Sine Map (2D-HSM) is derived from the well-known Henon and sine maps. The resulting chaotic map’s performance is demonstrated with the help of trajectory plots, bifurcation diagrams, Lyapunov exponents and Kolmogorov entropy. A novel Image Encryption Algorithm (IEA) is, then, proposed utilising the 2D-HSM to ensure the two essential characteristics of a good cryptographic system - diffusion and confusion. The IEA performs operations in two rounds for achieving a highly secure cipher-image. The simulation results and performance analysis are compared with some recently proposed cryptosystems which are also based on two dimensional chaotic maps. Simulations are carried out with the help of parameters like sensitivity to initial conditions and resistance to brute force attacks. The simulation results establish the security of the proposed 2D-HSM based IEA.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Algorithm 5
Algorithm 6
Algorithm 7
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Alawidai M, Samsudin A, Teh J (2020) Enhanced digital chaotic maps based on bit reversal with applications in random bit generators. Inf Sci 512:1155–1169

    Google Scholar 

  2. Broumandnia A (2020) Scale invariant digital image encryption using 3D modular chaotic map. Multimed Tools Appl 79:11327–11355

    Google Scholar 

  3. Chai X, Yang K, Gan Z (2017) A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimed Tools Appl 76:9907–9927

    Google Scholar 

  4. Chang CC, Hwang MS, Chen TS (2001) A new encryption algorithm for image cryptosystems. J Syst Softw 58(2):83–91

    Google Scholar 

  5. Chen X, Hu CJ (2017) Adaptive medical image encryption algorithm based on multiple chaotic mapping. Saudi J Biol Sci 24:1821–1827

    Google Scholar 

  6. Chen G, Mao Y, Chui C (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solit Fractals 21(3):749–761

    MathSciNet  MATH  Google Scholar 

  7. Chen J, Zhu Z, Zhang L, Zhang Y, Yang B (2018) Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption. Signal Process 142:340–353

    Google Scholar 

  8. Chen Y, Tang C, Ye R (2020) Cryptanalysis and improvement of medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 167:107286

    Google Scholar 

  9. Eskicioglu AM, Delp EJ (2001) An overview of multimedia content protection in consumer electronics devices. Signal Processing: Image Communication 16(7):681–699

    Google Scholar 

  10. Farsana F, Devi V, Gopakumar K (2019) An audio encryption scheme based on fast Walsh Hadamard transform and mixed chaotic keystreams. Applied Computing and Informatics. https://doi.org/10.1016/j.aci.2019.10.001

  11. Franko DL, Cousineau TM, Rodgers RF, Roehrig JP (2013) Bodimojo: effective internet-based promotion of positive body image in adolescent girls. Body Image 10(4):481–488

    Google Scholar 

  12. Fu C, Lin B, Miao Y, Liu X, Chen J (2011) A novel chaos-based bit-level permutation scheme for digital image encryption. Opt Commun 284(23):5415–5423

    Google Scholar 

  13. Fu C, Chen J, Zou H, Meng W, Zhan Y, Yu Y (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Express 20(3):2363–2378

    Google Scholar 

  14. Gong L, Qiu K, Deng C, Zhou N (2019) An optical image compression and encryption scheme based on compressive sensing and RSA algorithm. Opt Lasers Eng 121:169–180

    Google Scholar 

  15. Graf F (2002) Providing security for eLearning. Computers & Graphics 26(2):355–365

    Google Scholar 

  16. Grassberger P, Procaccia I (1983) Estimation of the Kolmogorov entropy from a chaotic signal. Phys Rev A 28(4):2591–2593

    Google Scholar 

  17. Henon M (1976) A two-dimensional mapping with a strange attractor. Commun Math Phys 50:69–77

    MathSciNet  MATH  Google Scholar 

  18. Hikal NA, Eid MM (2020) A new approach for palmprint image encryption based on hybrid chaotic maps. J King Saud Univ - Comput Inf Sci 32(7):870–882

    Google Scholar 

  19. Hua Z, Zhou Y (2016) Image encryption using 2D logistic-adjusted-sine map. Inf Sci 339:237–253

    Google Scholar 

  20. Hua Z, Zhou Y, Pun C, Chen C (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80–94

    Google Scholar 

  21. Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 144:134–144

    Google Scholar 

  22. Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403–419

    Google Scholar 

  23. Kang J, Nyang D, Lee K (2014) Two-factor face authentication using matrix permutation transformation and a user password. Inf Sci 269(10):1–20

    MathSciNet  Google Scholar 

  24. Kopacsi S, Kovacs GL, Nacsa J (2013) Some aspects of dynamic 3D representation and control of industrial processes via the Internet. Comput Ind 64(9):1282–1289

    Google Scholar 

  25. Lai YL, Hwang JY, Jina Z, Cho KS, Teohc ABJ (2019) Symmetric keyring encryption scheme for biometric cryptosystem. Inf Sci 502:492–509

    MathSciNet  Google Scholar 

  26. “lena512.bmp”. https://www.ece.rice.edu/wakin/images/lena512.bmp. Accessed 4 Feb 2021

  27. Li P, Yang X, Cao K, Tao X, Wang R, Tian J (2010) An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. J Netw Comput Appl 33(3):207–220

    Google Scholar 

  28. Li C, Luo G, Qin K, Li C (2016) An image encryption scheme based on chaotic tent map. Nonlinear Dyn 87(1):127–133

    MathSciNet  Google Scholar 

  29. Ming Li M, Xu M, Luo J, Fan H (2019) Cryptanalysis of an image encryption using 2D Henon-Sine map and DNA approach. IEEE Access 7:63336–63345

    Google Scholar 

  30. Maniccam SS, Bourbakis NG (2001) Lossless image compression and encryption using SCAN. Pattern Recogn 34(6):1229–1245

    MATH  Google Scholar 

  31. Natiq H, Al-Saidi NMG, Kilicman A (2018) A new hyperchaotic map and its application for image encryption. Eur Phys J Plus 133(6)

  32. Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129–137

    Google Scholar 

  33. Qin X (2020) Business English visualization system based on video surveillance and the internet of things. Microprocess Microsyst 80:103639

    Google Scholar 

  34. Sharma M (2019) Image encryption based on a new 2D logistic adjusted logistic map. Multimed Tools Appl 79:355–374

    Google Scholar 

  35. Sheela SJ, Suresh KV, Tandur D (2019) Image encryption based on modified Henon map using hybrid chaotic shift transform. Multimed Tools Appl 11042-018-5782-2

  36. Strogatz SH (2015) Nonlinear dynamics and chaos - with applications to physics, biology, chemistry and engineering. CRC Press, Boca Raton

    MATH  Google Scholar 

  37. Talhaoui Z, Wang X, Midoun A (2020) Fast image encryption algorithm with high security level using the Bülban chaotic map. Journal of Real-Time Image Processing. Accessed 4 Feb 2021. https://doi.org/10.1007/s11554-020-00948-1

  38. USC-SIPI Image Database Website. http://sipi.usc.edu/database/database.php?volume=misc. Accessed 30 Sept 2020

  39. Wang H, Xiao D, Chen X, Huang H (2018) Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map. Signal Process 144:444–452

    Google Scholar 

  40. Wilde SJ, Kelly SJ, Scott D (2004) An exploratory investigation into e-tail image attributes important to repeat, internet savvy customers. J Retail Consum Serv 11(3):131–139

    Google Scholar 

  41. Wu Y, Yang G, Jin H, Noonan JP (2012) Image encryption using the two-dimensional logistic chaotic map. Electron Imaging 21(1), Art ID 013014

  42. Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci 222(10):323–342

    MathSciNet  MATH  Google Scholar 

  43. Wu Y, Zhou Y, Noonan JP, Agaian S (2014) Design of image cipher using latin squares. Inf Sci 264(0):317–339

    MathSciNet  MATH  Google Scholar 

  44. Wu JH, Liao XF, Yang B (2018) ‘Image encryption using 2D Hénon-Sine map and DNA approach. Signal Process 153:11–23

    Google Scholar 

  45. Yang W, Hu J, Wang S Stojmenovic M (2014) An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures. Pattern Recogn 47(3):1309–1320

    Google Scholar 

  46. Yu YH, Chang CC, Hu YC (2005) Hiding secret data in images via predictive coding. Pattern Recogn 38(5):691–705

    Google Scholar 

  47. Zhang Q, Samani A, Peters TM (2021) MR and ultrasound cardiac image dynamic visualization and synchronization over Internet for distributed heart function diagnosis. Comput Med Imaging Graph 88:101850

    Google Scholar 

  48. Zhou Y, Bao L, Chen CLP (2013) Image encryption using a new parametric switching chaotic system. Signal Process 93(11):3039–3052

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Madhu Sharma.

Ethics declarations

Competing interests

The authors declare that they have no conflict of interests/competing interests.

Additional information

Availability of Data and Materials

All data generated or analysed during this study are included in this published article.

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sharma, M., Ranjan, R.K. & Bharti, V. An image encryption algorithm based on a novel hyperchaotic Henon sine map. Multimed Tools Appl 82, 11949–11972 (2023). https://doi.org/10.1007/s11042-022-13733-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13733-y

Keywords

Navigation