Skip to main content
Log in

A novel plaintext-related image encryption scheme using hyper-chaotic system

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

A novel and secure plaintext-related image encryption scheme is given in this paper using hyper-chaotic Lorenz system and hash function. In our scheme, we used the classical encryption architecture: permutation and diffusion. The initial conditions of hyper-chaotic Lorenz system which is employed in permutation and key stream generation algorithms are generated by information of the original image and initial key. Therefore, the encryption process has a strong relationship with plain image in the proposed scheme. So, our work performs excellently on resisting the known-plaintext attack. In addition, results of many widely used security analyses and comparisons with other works show that our work has outstanding security performance for the digital image communication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Luo, Y., Cao, L., Qiu, S., Lin, H., Harkin, J., Liu, J.: A chaotic map-control-based and the plain image-related cryptosystem. Nonlinear Dyn. 83(4), 2293–2310 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  2. Matthews, R.: On the derivation of a chaotic encryption algorithm. Cryptologia 13(1), 29–42 (1989)

    Article  MathSciNet  Google Scholar 

  3. Lorenz, E.: Deterministic non-period flow. J. Atmos. Sci. 20(3), 130–141 (1963)

    Article  MATH  Google Scholar 

  4. Akhshani, A., Akhavan, A., Lim, S.-C., Hassan, Z.: An image encryption scheme based on quantum logistic map. Commun. Nonlinear Sci. Numer. Simul. 17(12), 4653–4661 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  5. Ye, R., Guo, W.: A chaos-based image encryption scheme using multimodal skew tent maps. J. Emerg. Trends Comput. Inf. Sci. 4(10), 800 (2013)

    Google Scholar 

  6. Ye, R., Zhou, W.: A chaos-based image encryption scheme using 3D skew tent map and coupled map lattice. Int. J. Comput. Netw. Inf. Secur. 4(1), 25–28 (2012)

    Google Scholar 

  7. Kanso, A.: Self-shrinking chaotic stream ciphers. Commun. Nonlinear Sci. Numer. Simul. 16(2), 822–836 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  8. Akhavan, A., Samsudin, A., Akhshani, A.: A symmetric image encryption scheme based on combination of nonlinear chaotic maps. J. Frankl. Inst. 348(8), 1797–1813 (2011)

    Article  MathSciNet  Google Scholar 

  9. Jakimoski, G., Kocarev, L., et al.: Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans. Circuits Syst. I Fundam. Theory Appl. 48(2), 163–169 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  10. Zhang, L., Liao, X., Wang, X.: An image encryption approach based on chaotic maps. Chaos Solitons Fractals 24(3), 759–765 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  11. Zhang, W., Wong, K.-W., Yu, H., Zhu, Z.-L.: An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun. Nonlinear Sci. Numer. Simul. 18(8), 2066–2080 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  12. Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 16(08), 2129–2151 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  13. El-Latif, A.A.A., Li, L., Wang, N., Han, Q., Niu, X.: A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Process. 93(11), 2986–3000 (2013)

    Article  Google Scholar 

  14. Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 8(06), 1259–1284 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  15. Lian, S., Sun, J., Wang, Z.: A block cipher based on a suitable use of the chaotic standard map. Chaos Solitons Fractals 26(1), 117–129 (2005)

    Article  MATH  Google Scholar 

  16. Masuda, N., Aihara, K.: Cryptosystems with discretized chaotic maps. IEEE Trans. Circuits Syst. I Fundam. Theory Appl. 49(1), 28–40 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  17. Kocarev, L., Jakimoski, G., Stojanovski, T., Parlitz,U.: From chaotic maps to encryption schemes. In: Proceedings of the 1998 IEEE International Symposium on Circuits and Systems. ISCAS’98, vol. 4, pp. 514–517. IEEE (1998)

  18. Wang, X.Y., Wang, M.J.: A hyperchaos generated from Lorenz system. Physica A 387(14), 3751–3758 (2008)

    Article  MathSciNet  Google Scholar 

  19. Habutsu, T., Nishio, Y.: A Secret Cryptosystem by Iterating a Chaotic Map. Springer, Berlin (1991)

    Book  MATH  Google Scholar 

  20. Guan, Z., Huang, F., Guan, W.: Chaos-based image encryption algorithm. Phys. Lett. A 346(1), 153–157 (2005)

    Article  MATH  Google Scholar 

  21. Hu, T., Liu, Y., Gong, L.-H., Ouyang, C.-J.: An image encryption scheme combining chaos with cycle operation for DNA sequences. Nonlinear Dyn. 87(1), 51–66 (2016)

    Article  Google Scholar 

  22. Wang, X., Zhang, H.-I.: A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems. Nonlinear Dyn. 83(1–2), 333–346 (2015)

    MathSciNet  Google Scholar 

  23. Wang, X., Liu, C., Zhang, H.: An effective and fast image encryption algorithm based on Chaos and interweaving of ranks. Nonlinear Dyn. 84(3), 1595–1607 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  24. Wang, X.Y., Wang, Q., Zhang, Y.Q.: A fast image algorithm based on rows and columns switch. Nonlinear Dyn. 79(2), 1141–1149 (2014)

    Article  MathSciNet  Google Scholar 

  25. Ye, G., Zhao, H., Chai, H.: Chaotic image encryption algorithm using wave-line permutation and block diffusion. Nonlinear Dyn. 83(4), 2067–2077 (2015)

    Article  MathSciNet  Google Scholar 

  26. Wang, X., Liu, C., Xu, D., Liu, C.: Image encryption scheme using chaos and simulated annealing algorithm. Nonlinear Dyn. 84(3), 1417–1429 (2016)

    Article  MathSciNet  Google Scholar 

  27. Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)

    Article  MathSciNet  MATH  Google Scholar 

  28. Schneier, B.: Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd edn. Wiley, Hoboken (1996)

    MATH  Google Scholar 

  29. Rukhin A. et al.: A statistical test suite for random and pseudorandom number generators for cryptographic application, NIST Special Publication 800-22 (2001)

  30. Hu, G., Xiao, D., Zhang, Y., Xiang, T.: An efficient chaotic image cipher with dynamic lookup table driven bit-level permutation strategy. Nonlinear Dyn. 87(2), 1359–1375 (2016)

    Article  Google Scholar 

Download references

Acknowledgements

Our research is supported by the National Natural Science Foundation of China (Grant Nos. 61662009, 61262073, 60963023, 61361012), Scientific Research Foundation of Guizhou province, China (Grant No. QKHPTRC[2017]5788) , Major Scientific and Technological Special Project of Guizhou Province (Grant No.20183001) and State Cryptography Development Foundation of Encryption Theory subject of China (Grant No. MMJJ20170129)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Changgen Peng.

Ethics declarations

Conflict of interest

The authors report no conflicts of interest. The authors alone are responsible for the content and writing of this paper.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, Z., Peng, C., Li, L. et al. A novel plaintext-related image encryption scheme using hyper-chaotic system. Nonlinear Dyn 94, 1319–1333 (2018). https://doi.org/10.1007/s11071-018-4426-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-018-4426-4

Keywords

Navigation