Skip to main content
Log in

A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

Authenticated image encryption is crucial in handling top-secret images. To ensure confidentiality, authenticated encryption supplies legal validity for the image data. We propose a novel modified logistic map with an expanded key space, an integer-based key generation algorithm and an authenticated image encryption algorithm for block ciphers using a modified logistic map and a butterfly-like structure. The key that is used to encrypt images also aids in detecting content tampering of the images. The performance evaluations demonstrate that the proposed encryption method is fast and invulnerable to attacks and has a large key space. Additionally, the designed algorithm can assess the credibility of the data. Moreover, eight keys are used in decryption compared to four in encryption, which strengthens the security. Therefore, this algorithm can be used in real-time scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Tao, R., Meng, X.Y., Wang, Y.: Image encryption with multiorders of fractional Fourier transforms. IEEE Trans. Inf. Forensics Secur. 5(4), 734–738 (2010)

    Article  Google Scholar 

  2. Xu, L., Gou, X., Li, Z., Li, J.: A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt. Lasers Eng. 91, 41–52 (2017)

    Article  Google Scholar 

  3. Abanda, Y., Tiedeu, A.: Image encryption by chaos mixing. IET Image Process. 10, 742–750 (2016)

    Article  Google Scholar 

  4. Wu, X., Zhu, B., Hu, Y., Ran, Y.: A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access. 5, 6429–6436 (2017)

    Google Scholar 

  5. Zhang, W., Wong, K., Yu, H., Zhu, Z.L.: An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun. Nonlinear Sci. 18, 2066–2080 (2013)

    Article  MathSciNet  Google Scholar 

  6. Zhou, G., Zhang, D., Liu, Y., Yuan, Y., Liu, Q.: A novel image encryption algorithm based on chaos and Line map. Neurocomputing 169, 150–157 (2015)

    Article  Google Scholar 

  7. Cao, W., Zhou, Y., Chen, C.L.P., Xia, L.: Medical image encryption using edge maps. Signal Process. 132, 96–109 (2017)

    Article  Google Scholar 

  8. Faragallah, O.S.: Efficient confusion–diffusion chaotic image cryptosystem using enhanced standard map. Signal Image Video Process. 9(8), 1917–1926 (2015)

    Article  Google Scholar 

  9. Liu, W., Sun, K., Zhu, C.: A fast image encryption algorithm based on chaotic map. Opt. Lasers Eng. 84, 26–36 (2016)

    Article  Google Scholar 

  10. Hua, Z., Zhou, Y.: Image encryption using 2D logistic-adjusted-sine map. Inf. Sci. 339, 237–253 (2016)

    Article  Google Scholar 

  11. Belazi, A., Abd El-Latif, A.A.: A simple yet efficient S-box method based on chaotic sine map. Optik-Int. J. Light Electron Opt. 130, 1438–1444 (2017)

    Article  Google Scholar 

  12. Fouda, J.S.A.E., Effa, J.Y., Ali, M.: Highly secured chaotic block cipher for fast image encryption. Appl. Soft Comput. 25, 435–444 (2014)

    Article  Google Scholar 

  13. Zhang, M., Tong, X.: A new chaotic map based image encryption schemes for several image formats. J. Syst. Software. 98, 140–154 (2014)

    Article  Google Scholar 

  14. Belazi, A., Abd El-Latif, A.A., Rhouma, R., Belghith, S.: Selective image encryption scheme based on DWT, AES S-box and chaotic permutation. In: Proceedings of the IEEE International Conference on Wireless Communications and Mobile Computing, pp. 606–610 (2015)

  15. Lan, R., He, J., Wang, S., Gu, T., Luo, X.: Integrated chaotic systems for image encryption. Signal Process. 147, 133–145 (2018)

    Article  Google Scholar 

  16. Chan, C.S.: An image authentication method by applying Hamming code on rearranged bits. Pattern Recogn. Lett. 32, 1679–1690 (2011)

    Article  Google Scholar 

  17. Yuan, L., Ran, Q., Zhao, T.: Image authentication based on double-image encryption and partial phase decryption in nonseparable fractional Fourier domain. Opt. Lasers Eng. 88, 111–120 (2017)

    Article  Google Scholar 

  18. Chuang, J.C., Hu, Y.C.: An adaptive authentication scheme for vector quantization compressed image. J. Vis. Commun. Image Represent. 22, 440–449 (2011)

    Article  Google Scholar 

  19. Lo, C.C., Hu, Y.C.: A novel reversible image authentication scheme for digital images. Signal Process. 98, 174–185 (2014)

    Article  Google Scholar 

  20. Wu, W.C., Lin, Z.W.: SVD-based self-embedding image authentication scheme using quick response code features. J. Vis. Commun. Image Represent. 38, 18–28 (2016)

    Article  Google Scholar 

  21. Maimut, D., Reyhanitabar, R.: Authenticated encryption: toward next-generation algorithms. IEEE Secur. Priv. 12(2), 70–72 (2014)

    Article  Google Scholar 

  22. Belazi, A., Rhouma, R., Belghith, S.: A novel approach to construct S-box based on Rossler system. In: IEEE International Conference on Wireless Communications and Mobile Computing, pp. 611–615 (2015)

  23. Yang, H., Wong, K., Liao, X., Zhang, W., Wei, P.: A fast image encryption and authentication scheme based on chaotic maps. Commun. Nonlinear Sci. 15, 3507–3517 (2010)

    Article  Google Scholar 

  24. Rajput, A.S., Sharma, M.: A novel encryption and authentication scheme using chaotic maps. In: El-Alfy, E.-S.M. (ed.) Advances in Intelligent Systems and Computing, pp. 277–286. Springer, Switzerland (2015)

    Google Scholar 

  25. Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of a chaotic encryption system. Phys. Lett. A. 276, 191–196 (2000)

    Article  MathSciNet  Google Scholar 

  26. Arroyo, D., Li, C., Li, S., Alvarez, G.: Cryptanalysis of a computer cryptography scheme based on a filter bank. Chaos Soliton Fract. 41, 410–413 (2009)

    Article  Google Scholar 

  27. Wang, B., Wei, X., Zhang, Q.: Cryptanalysis of an image cryptosystem based on logistic map. Optik-Int. J. Light Electron Opt. 124(14), 1773–1776 (2013)

    Article  Google Scholar 

  28. Hacibekiroglu, G., Caglar, M., Polatoglu, Y.: The higher order Schwarzian derivative: its applications for chaotic behavior and new invariant sufficient condition for chaos. Nonlinear Anal. Real world Appl. 10, 1270–1275 (2009)

    Article  MathSciNet  Google Scholar 

  29. Picus, S.: Approximate entropy (ApEn) as a complexity measure. Chaos 5, 110–117 (1995)

    Article  Google Scholar 

  30. Li, C., Luo, G., Qin, K., Li, C.: An image encryption scheme based on chaotic tent map. Nonlinear Dyn. 87, 127–133 (2017)

    Article  Google Scholar 

  31. Dang, P.P., Chau, P.M.: Image encryption for secure internet multimedia applications. IEEE Trans. Consum. Electron. 46, 395–403 (2000)

    Article  Google Scholar 

  32. Yue, W., Yicong, Z., George, S., Sos, A., Joseph, P.N., Premkumar, N.: Local Shannon entropy measure with statistical tests for image randomness. Inf. Sci. 222, 323–342 (2013)

    Article  MathSciNet  Google Scholar 

  33. Silva-Garcia, V.M., Flore-Carapia, R., Renteria-Marquez, C., Luna-Benoso, B., Aldape-Perez, M.: Substitution box generation using chaos: an image encryption application. Appl. Math. Comput. 332, 123–135 (2018)

    MathSciNet  Google Scholar 

  34. Cao, C., Sun, K., Liu, W.: A novel bit-level image encryption algorithm based on 2D-LICM hyper chaotic map. Signal Process. 143, 122–133 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stanley Hanis.

Ethics declarations

Conflict of interest

The authors declare that they have no conflicts of interest to disclose.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hanis, S., Amutha, R. A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure. Nonlinear Dyn 95, 421–432 (2019). https://doi.org/10.1007/s11071-018-4573-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-018-4573-7

Keywords

Navigation