Abstract
Authenticated image encryption is crucial in handling top-secret images. To ensure confidentiality, authenticated encryption supplies legal validity for the image data. We propose a novel modified logistic map with an expanded key space, an integer-based key generation algorithm and an authenticated image encryption algorithm for block ciphers using a modified logistic map and a butterfly-like structure. The key that is used to encrypt images also aids in detecting content tampering of the images. The performance evaluations demonstrate that the proposed encryption method is fast and invulnerable to attacks and has a large key space. Additionally, the designed algorithm can assess the credibility of the data. Moreover, eight keys are used in decryption compared to four in encryption, which strengthens the security. Therefore, this algorithm can be used in real-time scenarios.
Similar content being viewed by others
References
Tao, R., Meng, X.Y., Wang, Y.: Image encryption with multiorders of fractional Fourier transforms. IEEE Trans. Inf. Forensics Secur. 5(4), 734–738 (2010)
Xu, L., Gou, X., Li, Z., Li, J.: A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt. Lasers Eng. 91, 41–52 (2017)
Abanda, Y., Tiedeu, A.: Image encryption by chaos mixing. IET Image Process. 10, 742–750 (2016)
Wu, X., Zhu, B., Hu, Y., Ran, Y.: A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access. 5, 6429–6436 (2017)
Zhang, W., Wong, K., Yu, H., Zhu, Z.L.: An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun. Nonlinear Sci. 18, 2066–2080 (2013)
Zhou, G., Zhang, D., Liu, Y., Yuan, Y., Liu, Q.: A novel image encryption algorithm based on chaos and Line map. Neurocomputing 169, 150–157 (2015)
Cao, W., Zhou, Y., Chen, C.L.P., Xia, L.: Medical image encryption using edge maps. Signal Process. 132, 96–109 (2017)
Faragallah, O.S.: Efficient confusion–diffusion chaotic image cryptosystem using enhanced standard map. Signal Image Video Process. 9(8), 1917–1926 (2015)
Liu, W., Sun, K., Zhu, C.: A fast image encryption algorithm based on chaotic map. Opt. Lasers Eng. 84, 26–36 (2016)
Hua, Z., Zhou, Y.: Image encryption using 2D logistic-adjusted-sine map. Inf. Sci. 339, 237–253 (2016)
Belazi, A., Abd El-Latif, A.A.: A simple yet efficient S-box method based on chaotic sine map. Optik-Int. J. Light Electron Opt. 130, 1438–1444 (2017)
Fouda, J.S.A.E., Effa, J.Y., Ali, M.: Highly secured chaotic block cipher for fast image encryption. Appl. Soft Comput. 25, 435–444 (2014)
Zhang, M., Tong, X.: A new chaotic map based image encryption schemes for several image formats. J. Syst. Software. 98, 140–154 (2014)
Belazi, A., Abd El-Latif, A.A., Rhouma, R., Belghith, S.: Selective image encryption scheme based on DWT, AES S-box and chaotic permutation. In: Proceedings of the IEEE International Conference on Wireless Communications and Mobile Computing, pp. 606–610 (2015)
Lan, R., He, J., Wang, S., Gu, T., Luo, X.: Integrated chaotic systems for image encryption. Signal Process. 147, 133–145 (2018)
Chan, C.S.: An image authentication method by applying Hamming code on rearranged bits. Pattern Recogn. Lett. 32, 1679–1690 (2011)
Yuan, L., Ran, Q., Zhao, T.: Image authentication based on double-image encryption and partial phase decryption in nonseparable fractional Fourier domain. Opt. Lasers Eng. 88, 111–120 (2017)
Chuang, J.C., Hu, Y.C.: An adaptive authentication scheme for vector quantization compressed image. J. Vis. Commun. Image Represent. 22, 440–449 (2011)
Lo, C.C., Hu, Y.C.: A novel reversible image authentication scheme for digital images. Signal Process. 98, 174–185 (2014)
Wu, W.C., Lin, Z.W.: SVD-based self-embedding image authentication scheme using quick response code features. J. Vis. Commun. Image Represent. 38, 18–28 (2016)
Maimut, D., Reyhanitabar, R.: Authenticated encryption: toward next-generation algorithms. IEEE Secur. Priv. 12(2), 70–72 (2014)
Belazi, A., Rhouma, R., Belghith, S.: A novel approach to construct S-box based on Rossler system. In: IEEE International Conference on Wireless Communications and Mobile Computing, pp. 611–615 (2015)
Yang, H., Wong, K., Liao, X., Zhang, W., Wei, P.: A fast image encryption and authentication scheme based on chaotic maps. Commun. Nonlinear Sci. 15, 3507–3517 (2010)
Rajput, A.S., Sharma, M.: A novel encryption and authentication scheme using chaotic maps. In: El-Alfy, E.-S.M. (ed.) Advances in Intelligent Systems and Computing, pp. 277–286. Springer, Switzerland (2015)
Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of a chaotic encryption system. Phys. Lett. A. 276, 191–196 (2000)
Arroyo, D., Li, C., Li, S., Alvarez, G.: Cryptanalysis of a computer cryptography scheme based on a filter bank. Chaos Soliton Fract. 41, 410–413 (2009)
Wang, B., Wei, X., Zhang, Q.: Cryptanalysis of an image cryptosystem based on logistic map. Optik-Int. J. Light Electron Opt. 124(14), 1773–1776 (2013)
Hacibekiroglu, G., Caglar, M., Polatoglu, Y.: The higher order Schwarzian derivative: its applications for chaotic behavior and new invariant sufficient condition for chaos. Nonlinear Anal. Real world Appl. 10, 1270–1275 (2009)
Picus, S.: Approximate entropy (ApEn) as a complexity measure. Chaos 5, 110–117 (1995)
Li, C., Luo, G., Qin, K., Li, C.: An image encryption scheme based on chaotic tent map. Nonlinear Dyn. 87, 127–133 (2017)
Dang, P.P., Chau, P.M.: Image encryption for secure internet multimedia applications. IEEE Trans. Consum. Electron. 46, 395–403 (2000)
Yue, W., Yicong, Z., George, S., Sos, A., Joseph, P.N., Premkumar, N.: Local Shannon entropy measure with statistical tests for image randomness. Inf. Sci. 222, 323–342 (2013)
Silva-Garcia, V.M., Flore-Carapia, R., Renteria-Marquez, C., Luna-Benoso, B., Aldape-Perez, M.: Substitution box generation using chaos: an image encryption application. Appl. Math. Comput. 332, 123–135 (2018)
Cao, C., Sun, K., Liu, W.: A novel bit-level image encryption algorithm based on 2D-LICM hyper chaotic map. Signal Process. 143, 122–133 (2018)
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflicts of interest to disclose.
Rights and permissions
About this article
Cite this article
Hanis, S., Amutha, R. A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure. Nonlinear Dyn 95, 421–432 (2019). https://doi.org/10.1007/s11071-018-4573-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-018-4573-7