Skip to main content
Log in

Hyper-chaotic image encryption system based on N + 2 ring Joseph algorithm and reversible cellular automata

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Due to the complex characteristics of chaotic system, such as initial value sensitivity, periodicity and pseudo-randomness, chaotic sequences generated by chaotic system is very suitable for image data encryption after appropriate processing. This paper focuses on chaotic image encryption based on the improved Joseph algorithm, and proposes a hyperchaotic image encryption system based on N + 2 ring Joseph algorithm and reversible cellular automata. The initial value of the chaotic system is generated by the SHA-512 hash value of the original image, which makes the proposed encryption algorithm highly sensitive to the original image. In addition, the proposed N + 2 ring Joseph algorithm is formed by N chaotic sequences rolling forward like gears when scrambling each pixel position of the image. It greatly hides the pixel information of the original text, and increases the scrambling effect and the difficulty of being cracked. Furthermore, in the diffusion stage, we add the reversible cellular automata technology. On the basis of image shuffling, each pixel is further associated with other pixels, so that small changes of in pixel values can produce an avalanche effect. Finally, we conducted simulation experiments and safety analysis. The results illustrate that the encryption algorithm proposed in this paper has good encryption performance, and can effectively resist statistical attacks, differential attacks, known plaintext attacks, ciphertext only attacks, select plaintext attacks and select ciphertext attacks. In conclusion, it is a practical and secure image encryption algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability

My manuscript has data included as electronic supplementary material.

References

  1. Álvarez G, Montoya F, Romera M, Pastor G (2003) Cryptanalysis of a discrete chaotic cryptosystem using external key[J]. Phys Lett A 319(3):334–339

    MathSciNet  MATH  Google Scholar 

  2. Banu SA, Amirtharajan R (2020) A robust medical image encryption in dual domain: chaos-DNA-IWT combined approach. Med Biol Eng Comput 58(7):1445–1458

    Google Scholar 

  3. Chai X, Gan Z, Yang K et al (2017) An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process Image Commun 52:6–19

    Google Scholar 

  4. Chai X, Fu X, Gan Z, Zhang Y, Lu Y, Chen Y (2020) An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata. Neural Comput & Applic 32(9):4961–4988

    Google Scholar 

  5. Chen RJ, Horng SJ (2010) Novel SCAN-CA-based image security system using SCAN and 2-D von Neumann cellular automata. Signal Process Image Commun 25(6):413–426

    Google Scholar 

  6. Cheng G, Wang C, Xu C (2020) A novel hyper-chaotic image encryption scheme based on quantum genetic algorithm and compressive sensing[J]. Multimed Tools Appl 79(9)

  7. Dalhoum ALA, Madain A, Hiary H (2016) Digital image scrambling based on elementary cellular automata. Multimed Tools Appl 75(24):17019–17034

    Google Scholar 

  8. Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence, Optics and Lasers in Engineering. 56: 83–93

  9. Guesmi R, Farah MAB, Kachouri A (2016) A novel chaos-based image encryption using DNA sequence operatio and secure hash algorithm SHA-2. Nonlinear Dynamics 83:1123–1136

    MathSciNet  MATH  Google Scholar 

  10. Habutsu T, Nishio Y, Sasase I et al (1991) A secret key cryptosystem by iterating a chaotic map[J]. Springer Verlag

    MATH  Google Scholar 

  11. Hosny KM, Kamal ST, Darwish MM, Papakostas GA (2021) New image encryption algorithm using hyperchaotic system and Fibonacci Q-matrix. Electronics. 10(9):1066

    Google Scholar 

  12. Hossam D (2018) An efficient chaotic image cryptosystem based on simultaneous permutation and diffusion operations[J]. IEEE Access 6:42227–42244

    Google Scholar 

  13. Kai F (2022) Research on image encryption algorithm based on evolution and cellular automata [D]. University of Electronic Science and technology

    Google Scholar 

  14. Li C (2018) Research on key technologies of image encryption based on chaos [D]. University of Electronic Science and technology

    Google Scholar 

  15. Lin H, Wang C, Hong Q et al (2020) A multi-stable memristor and its application in a neural network[J]. Circ Syst II: Expr Briefs, IEEE Trans PP(99):1–1

    Google Scholar 

  16. Lin H, Wang C, Yu F, Xu C, Hong Q, Yao W, Sun Y (2021) An extremely simple multiwing chaotic system: dynamics analysis, encryption application, and hardware implementation. IEEE Trans Ind Electron 68(12):12708–12719

    Google Scholar 

  17. Lin H, Wang C, Chen C, Sun Y, Zhou C, Xu C, Hong Q (2021) Neural bursting and synchronization emulated by neural networks and circuits. IEEE Transac Circuits Syst I: Reg Papers 68(8):3397–3410

    Google Scholar 

  18. Ling Z, Wang C, Lili Z (2016) Generating hyperchaotic multi-wing attractor in a 4D memristive circuit. Nonlinear Dynamics 85(4):2653–2663

    Google Scholar 

  19. Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16–17):3895–3903

    Google Scholar 

  20. Liu H, Wang X, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps[J]. Appl Soft Comput J 12(5):1457–1466

    Google Scholar 

  21. Minjun Z, Chunhua W (2020) A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks. Signal Processing, 171, Article ID:107484

  22. Mondal B, Singh S, Kumar P (2019) A secure image encryption scheme based on cellular automata and chaotic skew tent map[J]. J Inform Sec Appl 45(APR):117–130

    Google Scholar 

  23. Pareek NK, Patidar V, Sud KK (2005) Cryptography using multiple one-dimensional chaotic maps[J]. Commun Nonlinear Sci Numer Simul 10(7):715–723

    MathSciNet  MATH  Google Scholar 

  24. Pareek V, Pareek NK, Sud KK (2009) A new substitution–diffusion based image cipher using chaotic standard and logistic maps[J]. Commun Nonlinear Sci Numer Simul 14(7):3056–3075

    Google Scholar 

  25. Souyah A, Faraoun KM (2016) An image encryption scheme combining chaos-memory cellular automata and weighted histogram. Nonlinear Dynamics 86(1):639–653

    MathSciNet  Google Scholar 

  26. Wang X, Liu P (2022) A new full Chaos coupled mapping lattice and its application in privacy image encryption[J]. IEEE Trans Circuits Syst I: Reg Papers 69(3):1291–1301. https://doi.org/10.1109/TCSI.2021.3133318

    Article  Google Scholar 

  27. Wang XY, Xu DH (2015) A novel image encryption scheme using chaos and Langton’s ant cellular automaton. Nonlinear Dynamics 79(4):2449–2456

    MathSciNet  Google Scholar 

  28. Wang X, Xu D (2015) A novel image encryption scheme using chaos and Langton’s ant cellular automaton. Nonlinear Dynamics 79(4):2449–2456

    MathSciNet  Google Scholar 

  29. Wang X, Yang J (2021) A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient[J]. Inf Sci

  30. Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61

    Google Scholar 

  31. Wang C, Zhou L, Renping W (2018) The Design and Realization of a Hyper-Chaotic Circuit Based on a Flux-Controlled Memristor with Linear Memductance. J Circuits, Syst Comput 27(3):1850038

    Google Scholar 

  32. Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system[J]. Inf Sci 486:340–358

    MATH  Google Scholar 

  33. Wang X, Liu C, Jiang D (2021) A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT[J]. Inf Sci 574(1)

  34. Wolfram S (1983) Statistical mechanics of cellular automata. Rev Mod Phys 55(3):601–644

    MathSciNet  MATH  Google Scholar 

  35. Wolfram S (1986) Random sequence generation by cellular automata. Adv Appl Math 7(2):123–169

    MathSciNet  MATH  Google Scholar 

  36. Wu J, Tu L (2013) An image encryption algorithm based on Josephus traversing and position disordering[J]. Lect Notes Electr Eng 163:1941–1946

    Google Scholar 

  37. Xian Y, Wang X (2021) Fractal sorting matrix and its application on chaotic image encryption[J]. Inf Sci 547:1154–1169

    MathSciNet  MATH  Google Scholar 

  38. Xian Y, Wang X, Teng L, Yan X, Li Q, Wang X (2022) Cryptographic system based on double parameters fractal sorting vector and new spatiotemporal chaotic system[J]. Inf Sci 596:304–320

    Google Scholar 

  39. Xie W, Wang C, Lin H (2021) A fractional-order multistable locally active memristor and its chaotic system with transient transition, state jump. Nonlinear Dynamics 104:4523–4541

    Google Scholar 

  40. Xu Q, Sun K (2019) A fast image encryption algorithm based on compressive sensing and hyperchaotic map. Opt Lasers Eng 121:203–214

    Google Scholar 

  41. Xu B, Hua Z, Huang H (2017) A novel image encryption scheme using Josephus permutation and image filtering[J]. Springer, Cham

    Google Scholar 

  42. Xwa B , Mz A (2021) An image encryption algorithm based on new Chaos and diffusion values of a truth table[J]. Inf Sci

  43. Yang G, Jin H, Bai N (2014) Image encryption using the chaotic Josephus matrix. Math Probl Eng 2014(1):1–13

    MathSciNet  MATH  Google Scholar 

  44. Zhang X, Wang C (2019) A novel multi-attractor period multi-scroll chaotic integrated circuit based on CMOS wide adjustable CCCII. IEEE Access 7(1):16336–16350

    Google Scholar 

  45. Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps[J]. Math Comput Model 52(11):2028–2035

    MathSciNet  MATH  Google Scholar 

  46. Zheng S, Dong G, Bi Q (2010) A new hyperchaotic system and its synchronization. Appl Math Comput 215(9):3192–3200

    MathSciNet  MATH  Google Scholar 

  47. Zhou N, Zhang A, Zheng F (2014) Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Opt Laser Technol 62:152–160

    Google Scholar 

  48. Zhou L, Wang C, Zhou L (2018) A novel no-equilibrium hyperchaotic multi-wing system via introducing memristor. Int J Circuit Theory Appl 46(1):84–98

    Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China(No.61971185) and Natural Science Foundation of Hunan Province(2020JJ4218).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chunhua Wang.

Ethics declarations

Competing interests

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ma, X., Wang, C. Hyper-chaotic image encryption system based on N + 2 ring Joseph algorithm and reversible cellular automata. Multimed Tools Appl 82, 38967–38992 (2023). https://doi.org/10.1007/s11042-023-15119-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15119-0

Keywords

Navigation