Skip to main content
Log in

An efficient block-level image encryption scheme based on multi-chaotic maps with DNA encoding

  • Original paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

This paper presents an efficient image encryption scheme based on permutation followed by diffusion, where both of these phases use 2-d Sine logistic modulation map (SLMM) with different initial values. In addition, diffusion uses another map as 1-d Logistic chaotic map (LCM). The initial values of these chaotic maps are obtained from an external key of 64 bytes along with 32-byte hash value from the corresponding plain-image to incorporate plain-text sensitivity. Initially, confusion of the plain-image is implemented by applying row-level and column-level permutations. Then, this permuted image is used for subsequent diffusion, applied on block-level considering block size of 64 bytes. This diffusion process is accomplished by overlaying with chaotic matrix derived from LCM, followed by substitution of those overlaid bytes by DNA encoding along with SLMM to attain an encrypted image with an entropy nearly 8. Furthermore, all the chaotic values generated from the aforementioned maps are highly sensitive on the key as well as on the plain-image. This scheme is thoroughly verified on different sized plain-images with modern statistical analyses to prove the robustness of this scheme. Eventually, comparison with other schemes reinforces its competence and suitability to implement it in real-time system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Yang, Y.G., Xu, P., Yang, R., Zhou, Y.H., Shi, W.M.: Quantum hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption. Sci. Rep. 6(19788), 1–14 (2016)

    Google Scholar 

  2. Hua, Z., Zhou, Y.: Design of image cipher using block-based scrambling and image filtering. Inf. Sci. 396, 97–113 (2017)

    MATH  Google Scholar 

  3. PUB 46-3: FIPS. Data encryption standard (DES). Natl. Inst. Std. Technol. 25(10), 1–22 (1999)

  4. Fips-Pub, N.I.S.T.: Advanced encryption standard (AES). Federal Inf. Process. Std. Publ. 197(441), 0311 (2001)

    Google Scholar 

  5. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    MathSciNet  MATH  Google Scholar 

  6. Zhang, Y., Xiao, D., Wen, W., Nan, H.: Cryptanalysis of image scrambling based on chaotic sequences and Vigenère cipher. Nonlinear Dyn. 78(1), 235–240 (2014)

    Google Scholar 

  7. Zhou, K., Xu, M., Luo, J., Fan, H., Li, M.: Cryptanalyzing an image encryption based on a modified Hènon map using hybrid chaotic shift transform. Digit. Signal Process. 93, 115–127 (2019)

    Google Scholar 

  8. Talhaoui, M.Z., Wang, X., Midoun, M.A.: Fast image encryption algorithm with high security level using the Bülban chaotic map. J. Real-Time Image Process. (2020). https://doi.org/10.1007/s11554-020-00948-1

    Article  Google Scholar 

  9. Matthews, R.: On the derivation of a chaotic encryption algorithm. Cryptologia 13, 29–42 (1989)

    MathSciNet  Google Scholar 

  10. Seyedzadeh, S.M., Norouzi, B., Mosavi, M.R., Mirzakuchaki, S.: A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dyn. 81, 511–529 (2015)

    MathSciNet  MATH  Google Scholar 

  11. Wu, Y., Hua, Z.Y., Zhou, Y.C.: \(n\)-dimensional discrete cat map generation using Laplace expansions. IEEE Trans. Cybern. 46(11), 2622–2633 (2016)

    Google Scholar 

  12. Pareschi, F., Setti, G., Rovatti, R.: Implementation and testing of high-speed CMOS true random number generators based on chaotic systems. IEEE Trans. Circuits-I 57(12), 3124–3137 (2010)

    MathSciNet  Google Scholar 

  13. Wang, X.Y., Yang, L., Liu, R., Kadir, A.: Chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62, 615–621 (2010)

    MATH  Google Scholar 

  14. Zhang, Y.S., Xiao, D., Shu, Y.L., Li, J.: A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations. Signal Process. Image Commun. 28(3), 292–300 (2013)

    Google Scholar 

  15. Hua, Z., Zhou, Y.: Image encryption using 2D logistic-adjusted-sine map. Inf. Sci. 339, 237–253 (2016)

    Google Scholar 

  16. Azzaz, M.S., Tanougast, C., Sadoudi, S., Dandache, A.: Robust chaotic key stream generator for real-time images encryption. J. Real-Time Image Proc. 8, 297–306 (2013)

    MATH  Google Scholar 

  17. Murillo-Escobara, M.A., Cruz-Hernándezb, C., Abundiz-Péreza, F., López-Gutiérreza, R.M., Acosta Del Campo, O.R.: A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Process. 109, 119–131 (2015)

    Google Scholar 

  18. Huang, X.L., Ye, G.D.: An efficient self-adaptive model for chaotic image encryption algorithm. Commun. Nonlinear SCI. 19, 4094–4104 (2014)

    MATH  Google Scholar 

  19. Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24(9), 926–934 (2006)

    Google Scholar 

  20. Li, F., Wu, H., Zhou, G., Wei, W.: Robust real-time image encryption with aperiodic chaotic map and random-cycling bit shift. J. Real-Time Image Process. 16, 775–790 (2018)

    Google Scholar 

  21. Sui, L., Duan, K., Liang, J., Hei, X.: Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps. Opt. Express 22(9), 10605–10621 (2014)

    Google Scholar 

  22. Naskar, P.K., Chaudhuri, A.: A robust image encryption technique using dual chaotic map. Int. J. Electron. Secur. Digit. Forensics 7(4), 358–380 (2015)

    Google Scholar 

  23. Shah, A.A., Parah, S.A., Rashid, M., Elhoseny, M.: Efficient image encryption scheme based on generalized logistic map for real time image processing. J. Real-Time Image Process. 17, 2139–2151 (2020)

    Google Scholar 

  24. Hua, Z., Zhou, Y., Pun, C.-M., Chen, C.L.P.: 2\(d\) Sine logistic modulation map for image encryption. Inf. Sci. 297, 80–94 (2015)

    Google Scholar 

  25. Natiq, H., Al-Saidi, N.M.G., Said, M.R.M., Kilicman, A.: A new hyperchaotic map and its application for image encryption. Eur. Phys. J. Plus 133(6), 1–14 (2018)

    Google Scholar 

  26. Wu, J., Liao, X., Yang, B.: Image encryption using 2d Hènon-sine map and DNA approach. Signal Process. 153, 11–23 (2018)

    Google Scholar 

  27. Li, C., Luo, G., Qin, K., Li, C.: An image encryption scheme based on chaotic tent map. Nonlinear Dyn. 87(1), 127–133 (2017)

    Google Scholar 

  28. Luo, Y., Cao, L., Qiu, S., Lin, H., Harkin, J., Liu, J.: A chaotic map-control-based and the plain image-related cryptosystem. Nonlinear Dyn. 83(4), 1–18 (2015)

    MathSciNet  MATH  Google Scholar 

  29. Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos Solitons Fractals 21(3), 749–761 (2004)

    MathSciNet  MATH  Google Scholar 

  30. Musanna, F., Kumar, S.: A novel fractional order chaos-based image encryption using Fisher Yates algorithm and 3-D cat map. Multimed. Tools Appl. 78, 14867–14895 (2019)

    Google Scholar 

  31. Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcat. Chaos 8, 1259–1284 (1998)

    MathSciNet  MATH  Google Scholar 

  32. Enayatifar, R., Abdullah, A.H., Isnin, I.F.: Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt. Lasers Eng. 56, 83–93 (2014)

    Google Scholar 

  33. Wei, X., Guo, L., Zhang, Q., Zhang, J., Lian, S.: A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J. Syst. Softw. 85(2), 290–299 (2012)

    Google Scholar 

  34. Liu, H., Wang, X., Kadir, A.: Image encryption using DNA complementary rule and chaotic maps. Appl. Soft Comput. 12(5), 1457–1466 (2012)

    Google Scholar 

  35. Wang, X.-Y., Zhang, Y.-Q., Bao, X.-M.: A novel chaotic image encryption scheme using dna sequence operations. Opt. Lasers Eng. 73, 53–61 (2015)

    Google Scholar 

  36. Huang, X., Ye, G.: An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed. Tools Appl. 72(1), 57–70 (2014)

    Google Scholar 

  37. Zhou, Y., Bao, L., Chen, C.P.: A new 1d chaotic system for image encryption. Signal Process. 97, 172–182 (2014)

    Google Scholar 

  38. Hua, Z., Zhou, Y., Huang, H.: Cosine-transform-based chaotic system for image encryption. Inf. Sci. 480, 403–419 (2019)

    Google Scholar 

  39. Xiang, T., Wong, K.-W., Liao, X.: Selective image encryption using a spatiotemporal chaotic system. Chaos 17(2), 023 (2007)

    MATH  Google Scholar 

  40. Zhang, Y.-Q., Wang, X.-Y.: A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf. Sci. 273, 329–351 (2014)

    Google Scholar 

  41. Li, Y., Wang, C., Chen, H.: A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt. Lasers Eng. 90, 238–246 (2017)

    Google Scholar 

  42. Liu, D.-D., Zhang, W., Yu, H., Zhu, Z.-L.: An image encryption scheme using self-adaptive selective permutation and inter-intra-block feedback diffusion. Signal Process. 151, 130–143 (2018)

    Google Scholar 

  43. Wang, X., Gao, S.: Image encryption algorithm for synchronously updating boolean networks based on matrix semi-tensor product theory. Inf. Sci. 507, 16–36 (2020)

    MathSciNet  MATH  Google Scholar 

  44. Tong, X., Cui, M., Wang, Z.: A new feedback image encryption scheme based on perturbation with dynamical compound chaotic sequence cipher generator. J. Opt. Commun. 282(14), 2722–2728 (2009)

    Google Scholar 

  45. Zhang, Q., Guo, L., Wei, X.: Image encryption using DNA addition combining with chaotic maps. J. Math. Comput. Model. 52(11), 2028–2035 (2010)

    MathSciNet  MATH  Google Scholar 

  46. Wang, X., Li, Y.: Chaotic image encryption algorithm based on hybrid multi-objective particle swarm optimization and DNA sequence. Opt. Lasers Eng. (2021). https://doi.org/10.1016/j.optlaseng.2020.106393

    Article  Google Scholar 

  47. Chai, X.L., Gan, Z.H., Yang, K., Chen, Y.R., Liu, X.X.: An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process-Image 52, 6–19 (2017)

    Google Scholar 

  48. Jin, J.: An image encryption based on elementary cellular automata. Opt. Lasers Eng. 50(12), 1836–1843 (2012)

    Google Scholar 

  49. Naskar, P.K., Bhattacharyya, S., Nandy, D., Chaudhuri, A.: A robust image encryption scheme using chaotic tent map and cellular automata. Nonlinear Dyn. 100(3), 2877–2898 (2020)

    Google Scholar 

  50. Naskar, P.K., Bhattacharyya, S., Chaudhuri, A.: An audio encryption based on distinct key blocks along with PWLCM and ECA. Nonlinear Dyn. 103, 2019–2042 (2021)

    Google Scholar 

  51. Huang, C.K., Liao, C.W., Hsu, S.L., Jeng, Y.C.: Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. J. Telecommun. Syst. 52(2), 563–571 (2011)

    Google Scholar 

  52. Chua, L.O., Lin, G.N.: Canonical realization of Chua’s circuit family. IEEE Trans. Circuits Syst. 37, 885–902 (1990)

    MathSciNet  MATH  Google Scholar 

  53. Zhang, G., Liu, Q.: A novel image encryption method based on total shuffling scheme. J. Opt. Commun. 284, 2775–2780 (2011)

    Google Scholar 

  54. Naskar, P.K., Chaudhuri, A., Basu, D., Chaudhuri, A.: A novel image secret sharing scheme. Int. Conf. EAIT. 177–180,(2011)

  55. Naskar, P.K., Khan, H.N., Roy, U., Chaudhuri, A., Chaudhuri, A.: Secret image sharing with embedded session key. Int. Conf. CISIM. 245, 289–294 (2011)

    Google Scholar 

  56. Naskar, P.K., Chaudhuri, A.: Secured secret sharing technique based on chaotic map and DNA encoding with application on secret image. Imaging Sci. J. 94(8), 460–470 (2016)

    Google Scholar 

  57. Wan, S., Lu, Y., Yan, X., Wang, Y., Chang, C.: Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions. J. Real-Time Image Proc. 14, 25–40 (2018)

    Google Scholar 

  58. Enayatifar, R., Guimarães, F.G., Siarry, P.: Index-based permutation-diffusion in multiple-image encryption using DNA sequence. Opt. Lasers Eng. 115, 131–40 (2019)

    Google Scholar 

  59. Zhang, L., Zhang, X.: Multiple-image encryption algorithm based on bit planes and chaos. Multimed. Tools Appl. 79, 20753–20771 (2020)

    Google Scholar 

  60. Zhou, N., Yan, X., Liang, H., Tao, X., Li, G.: Multi-image encryption scheme based on quantum 3D Arnold transform and scaled Zhongtang chaotic system. Quantum Inf. Process. 17, 338 (2018). https://doi.org/10.1007/s11128-018-2104-6

    Article  MATH  Google Scholar 

  61. Yang, X., Wu, H., Yin, Y., Meng, X., Peng, X.: Multiple-image encryption base on compressed coded aperture imaging. Opt. Lasers Eng. (2020). https://doi.org/10.1016/j.optlaseng.2019.105976

    Article  Google Scholar 

  62. Parvin, Z., Seyedarabi, H., Shamsi, M.: A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimed. Tools Appl. 75, 10631–10648 (2016)

    Google Scholar 

  63. Norouzi, B., Mirzakuchaki, S.: Breaking an image encryption algorithm based on the new substitution stage with chaotic functions. Optik 127, 5695–5701 (2016)

    Google Scholar 

  64. Wang, X.Y., Xu, D.H.: A novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn. 75, 345–353 (2014)

    Google Scholar 

  65. Zhu, C.X., Xu, S.Y., Hu, Y.P., Sun, K.H.: Breaking a novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn. 79, 1511–1518 (2015)

    Google Scholar 

  66. Luo, Y., Zhou, R., Liu, J., Cao, Y., Ding, X.: A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map. Nonlinear Dyn. 93(3), 1165–1181 (2018)

    Google Scholar 

  67. Raza, S.F., Satpute, V.: A novel bit permutation-based image encryption algorithm. Nonlinear Dyn. 95(2), 859–873 (2018)

    Google Scholar 

  68. Wang, X., Feng, L., Li, R., Zhang, F.: A fast image encryption algorithm based on non-adjacent dynamically coupled map lattice model. Nonlinear Dyn. 95(4), 2797–2824 (2019)

    MATH  Google Scholar 

  69. Ye, G., Pan, C., Huang, X., Mei, Q.: An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dyn. 94(1), 745–756 (2018)

    Google Scholar 

  70. Alpar, O.: Analysis of a new simple one dimensional chaotic map. Nonlinear Dyn. 78(2), 771–778 (2014)

    MathSciNet  Google Scholar 

  71. Mondal, B., Behera, P.K., Gangopadhyay, S.: A secure image encryption scheme based on a novel 2D sine-cosine cross-chaotic (SC3) map. J. Real-Time Image Process. (2020). https://doi.org/10.1007/s11554-019-00940-4

    Article  Google Scholar 

  72. Mansouri. A, Wang. X. (2020): Image encryption using shuffled Arnold map and multiple values manipulations. Vis. Comput. https://doi.org/10.1007/s00371-020-01791-y

  73. Zefreh, E.Z.: An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions. Multimed. Tools Appl. 79, 24993–25022 (2020)

    Google Scholar 

  74. Norouzi, B., Seyedzadeh, S.M., Mirzakuchaki, S., Mosavi, M.R.: A novel image encryption based on hash function with only two-round diffusion process. Multimed. Syst. 20(1), 45–64 (2013)

    MATH  Google Scholar 

  75. Naskar, P.K., Paul, S., Nandy, D., Chaudhuri, A.: DNA encoding and channel shuffling for secured encryption of audio data. Multimed. Tools Appl. 78(17), 25019–25042 (2019)

    Google Scholar 

  76. Kanso, A., Smaoui, N.: Logistic chaotic maps for binary numbers generations. Chaos Solitons Fractals 40(5), 2557–68 (2009)

    MATH  Google Scholar 

  77. Li, C., Lin, D., Feng, B., Lu, J., Hao, F.: Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 6, 75834–75842 (2018)

    Google Scholar 

  78. Li, C., Feng, B., Li, S., Kurths, J., Chen, G.: Dynamic analysis of digital chaotic maps via state-mapping networks. IEEE 66(6), 2322–2335 (2019)

    MathSciNet  MATH  Google Scholar 

  79. Lin, T., Chua, L.O.: On chaos of digital filters in the real world. IEEE Trans. Circuits Syst. 38(5), 557–558 (1991)

    Google Scholar 

  80. Patro, K.A.K., Acharya, B.: An efficient colour image encryption scheme based on 1-d chaotic maps. J. Inf. Secur. Appl. 46, 23–41 (2019)

    Google Scholar 

  81. Xu, Q., Sun, K., He, S., Zhu, C.: An effective image encryption algorithm based on compressive sensing and 2D-SLIM. Opt. Lasers Eng. 134, 106 (2020)

    Google Scholar 

  82. Pareschi, F., Rovatti, R., Setti, G.: On statistical tests for randomness included in the NIST SP800-22 test suite and based on the binomial distribution. IEEE Trans. Inf. Forensics Secur. 7, 491–505 (2012)

    Google Scholar 

  83. Luo, H., Ge, B.: Image encryption based on Hènon chaotic system with nonlinear term. Multimed. Tools Appl. 78, 34323–34352 (2019)

    Google Scholar 

Download references

Acknowledgements

We are thankful to the Department of Computer Science and Engineering, Government College of Engineering and Textile Technology, Serampore, Hooghly, West Bengal, India and MCKV Institute of Engineering, Howrah, West Bengal, India for giving us the platform for planning and developing this work using all departmental facilities. We are also deeply grateful to the editors for smooth and fast handling of the manuscript. We would also like to thank the anonymous reviewers for their valuable advices and suggestions to improve the quality of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prabir Kumar Naskar.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Data Availability

The data used to support the findings of this study are included within the article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Naskar, P.K., Bhattacharyya, S., Mahatab, K.C. et al. An efficient block-level image encryption scheme based on multi-chaotic maps with DNA encoding. Nonlinear Dyn 105, 3673–3698 (2021). https://doi.org/10.1007/s11071-021-06761-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-021-06761-0

Keywords

Navigation