Skip to main content
Log in

Image encryption scheme using chaos and simulated annealing algorithm

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

In this paper, we proposed a novel image encryption scheme based on chaos and simulated annealing algorithm. The proposed algorithm considers the generation of random sequence as a problem seeking for optimal solution and then uses the simulated annealing algorithm to further obtain the optimal pseudorandom sequences. Chaos has been combined together with it for the confusion and diffusion. The target objects to be processed of this article are general grayscale images with no other restrictions. Many tests have been done to check the effect against a variety of attacks, and results of experiments and analysis present that the proposed algorithm has good feature of security. It is able to resist common attacks. So our scheme is secure enough for image encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Rachh, R.R., Mohan, P.V.A., Anami, B.S.: Efficient implementations for AES encryption and decryption. Circuits Syst. Signal Process. 31(5), 1765–1785 (2012)

    Article  MathSciNet  Google Scholar 

  2. Liu, L.H., Cui, J., Hu, R.D.: Improvement on short-block encryption technology based on AES. Comput. Eng. 33(14), 157–159 (2007)

    Google Scholar 

  3. Coppersmith, D.: The data encryption standard (DES) and its strength against attacks. IBM J. Res. Dev. 38(3), 243–250 (1994)

    Article  MathSciNet  MATH  Google Scholar 

  4. Alfalou, A., Brosseau, C.: Optical image compression and encryption methods. Adv. Opt. Photonics 1(3), 589–636 (2009)

    Article  Google Scholar 

  5. Zhu, H.G., Zhao, C., Zhang, X.D.: A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem. Signal Process. Image Commun. 28(6), 670–680 (2013)

    Article  Google Scholar 

  6. Liu, H.J., Wang, X.Y., Kadir, A.: Image encryption using DNA complementary rule and chaotic maps. Appl. Soft Comput. 12(5), 1457–1466 (2012)

    Article  Google Scholar 

  7. Chen, G.R., Mao, Y.B., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Comput. Eng. 21(3), 749–761 (2004)

    MathSciNet  MATH  Google Scholar 

  8. Pareek, N.K., Patidar, Vinod, Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24(9), 926–934 (2006)

    Article  Google Scholar 

  9. Lian, S.G.: Efficient image or video encryption based on spatiotemporal chaos system. Chaos Solitons Fractals 40(5), 2509–2519 (2009)

    Article  MATH  Google Scholar 

  10. Zhang, X.P., Zhao, Z.M.: Chaos-based image encryption with total shuffling and bidirectional diffusion. Nonlinear Dyn. 75(1–2), 319–330 (2014)

    Article  Google Scholar 

  11. Song, C.Y., Qiao, Y.L., Zhang, X.Z.: An image encryption scheme based on new spatiotemporal chaos. OPTIK 124(18), 3329–3334 (2013)

    Article  Google Scholar 

  12. Ye, R.S.: A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Opt. Commun. 284(22), 5290–5298 (2011)

    Article  Google Scholar 

  13. Boriga, R.E., Dăscălescu, A.C., Diaconu, A.V.: A new fast image encryption scheme based on 2D Chaotic maps. IAENG Int. J. Comput. Sci. 41(4), 249–258 (2014)

    Google Scholar 

  14. Dăscălescu, A.C., Boriga, R.E.: A novel fast chaos-based algorithm for generating random permutations with high shift factor suitable for image scrambling. Nonlinear Dyn. 74(1–2), 307–318 (2013)

    Article  MathSciNet  Google Scholar 

  15. Boriga, R., Dăscălescu, A.C., Diaconu, A.V.: A new one-dimensional chaotic map and its use in a novel real-time image encryption scheme. Adv. Multimed. (2014). doi:10.1155/2014/409586

  16. Zhao, J.F., Wang, S.Y., Chang, Y.X., Li, X.F.: A novel image encryption scheme based on an improper fractional-order chaotic system. Nonlinear Dyn. 80(4), 1721–1729 (2015)

    Article  MathSciNet  Google Scholar 

  17. Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(38), 5973–5978 (2008)

    Article  MATH  Google Scholar 

  18. Solak, E., Rhouma, R., Belghith, S.: Cryptanalysis of a multi-chaotic systems based image cryptosystem. Opt. Commun. 283(2), 232–236 (2010)

    Article  MATH  Google Scholar 

  19. Wang, X.Y., Liu, L.T.: Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos. Nonlinear Dyn. 73(1–2), 795–800 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  20. Li, S.J., Li, C.Q., Chen, G.R., Bourbakis, N.G., Lo, K.T.: A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process. Image Commun. 23(3), 212–223 (2008)

    Article  Google Scholar 

  21. Li, C.Q., Liu, Y.S., Xie, T., Chen, M.Z.: Breaking a novel image encryption scheme based on improved hyperchaotic sequences. Nonlinear Dyn. 73(3), 2083–2089 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  22. Tu, G.Y., Liao, X.F., Xiang, T.: Cryptanalysis of a color image encryption algorithm based on chaos. Optik Int. J. Light Electron Opt. 124(22), 5411–5415 (2013)

    Article  Google Scholar 

  23. Sharma, P.K., Ahmad, M., Khan, P.M.: Cryptanalysis of image encryption algorithm based on pixel shuffling and chaotic S-box transformation. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, D. (eds.) Security in Computing and Communications, pp. 173–181. Springer, Berlin (2014)

  24. Kirkpatrick, S., Gelatt Jr, C.D., Vecchi, M.P.: Optimization by simulated annealing. Science 220(4598), 671–680 (1983)

    Article  MathSciNet  MATH  Google Scholar 

  25. Metropolis, N., Rosenbluth, A.W., Rosenbluth, M.N.: Equation of state calculations by fast computing machines. J. Chem. Phys. 21(6), 1087 (1953)

    Article  Google Scholar 

  26. Wikipedia, https://en.wikipedia.org/wiki/Simulated_annealing

  27. Shatheesh, S.I., Devaraj, P., Bhuvaneswaran, R.S.: An intertwining chaotic maps based image encryption scheme. Nonlinear Dyn. 69(4), 1995–2007 (2012)

    Article  MathSciNet  Google Scholar 

  28. Wang, X.Y., Jin, C.Q.: Image encryption using game of life permutation and PWLCM chaotic system. Opt. Commun. 285(4), 412–417 (2012)

    Article  MathSciNet  Google Scholar 

  29. Boriga, R., Dăscălescu, A.C., Priescu, I.: A new hyperchaotic map and its application in an image encryption scheme. Signal Process. Image Commun. 29(8), 887–901 (2014)

    Article  Google Scholar 

  30. Wu, Y., Zhou, Y.C., Saveriades, G., Agaian, S., Noonan, J.P., Natarajan, P.: Local Shannon entropy measure with statistical tests for image randomness. Inf. Sci. 222, 323–342 (2013)

  31. Saraswathi, P.V., Venkatesulu, M.: A block cipher algorithm for multimedia content protection with random substitution using binary tree traversal. J. Comput. Sci. 8(9), 1541–1546 (2012)

    Article  Google Scholar 

  32. Sivakumar, T., Venkatesan, R.: A novel approach for image encryption using dynamic SCAN pattern. IAENG Int. J. Comput. Sci. 41(2), 91–101 (2014)

    Google Scholar 

  33. Ghebleh, M., Kanso, A., Noura, H.: An image encryption scheme based on irregularly decimated chaotic maps. Signal Process. Image Commun. 29(5), 618–627 (2014)

    Article  Google Scholar 

  34. Ye, G.D., Wong, K.W.: An image encryption scheme based on time-delay and hyperchaotic system. Nonlinear Dyn. 71(1–2), 259–267 (2013)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

This research is supported by the National Natural Science Foundation of China (Nos. 61370145, 61173183 and 60973152), the Doctoral Program Foundation of Institution of Higher Education of China (No. 20070141014), Program for Liaoning Excellent Talents in University (No. LR2012003), the National Natural Science Foundation of Liaoning province (No. 20082165) and the Fundamental Research Funds for the Central Universities (No. DUT12JB06).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xingyuan Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, X., Liu, C., Xu, D. et al. Image encryption scheme using chaos and simulated annealing algorithm. Nonlinear Dyn 84, 1417–1429 (2016). https://doi.org/10.1007/s11071-015-2579-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-015-2579-y

Keywords

Navigation