Skip to main content
Log in

A chaotic image encryption algorithm based on sliding window and pseudo-random stack shuffling

  • Research
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

This paper introduces a new one-dimensional chaotic system, which can be considered as an improvement upon the Bernoulli map. The Quadratic Bernoulli Chaotic System (QBCS) is introduced by replacing the linear segment of the Bernoulli map's two segments with quadratic nonlinearity. Subsequently, an image encryption algorithm is proposed, utilizing a sliding window mechanism and dynamic stack sequences. Initially, the position of the initial window is determined, and to ensure the traversal of the window, the initial window position is set to the top-left corner of the original image. Subsequently, the step size for window movement is determined, and chaotic sequences generated by QBCS are used to scramble the contents selected by each window. Moreover, on the basis of the standard index scrambling concept, a dynamic stack traversal method is employed, wherein the behavior of elements entering and exiting the stack is determined according to the chaotic sequences generated by QBCS, effectively expanding the value space of the chaotic index sequence. Furthermore, combined with the chaotic sequences generated by QBCS, a diffusion process using distribution dilution is applied to the contents within each window. Experimental simulations and performance analysis demonstrate the algorithm's robust security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Algorithm 5
Algorithm 6
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig.20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25

Similar content being viewed by others

Data availability

Data will be made available on reasonable request.

References

  1. Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24(9), 926–934 (2006)

    Article  Google Scholar 

  2. Dong, C., et al.: Improvement of an image encryption algorithm based on combined multidimensional chaotic systems. In: 11th International Conference on Knowledge-Based Intelligent Informational and Engineering Systems/17th Italian Workshop on Neural Networks. Vietri sul Mare, Italy (2007)

  3. Sun, F.-Y., Liu, S.-T., Lue, Z.-W.: Image encryption using high-dimension chaotic system. Chin. Phys. 16(12), 3616–3623 (2007)

    Article  Google Scholar 

  4. Jian, J., et al.: Encryption of digital image based on chaos system. In: 2nd IFIP International Conference on Computer and Computing Technologies in Agriculture. Beijing, People's Republic of China (2008)

  5. Lorenz, E.N.: Deterministic Nonperiodic Flow, In: The Theory of Chaotic Attractors, B.R. Hunt, et al. (eds.) pp. 25–36, Springer New York: New York, NY. (2004)

  6. Zhao, S., Li, H., Yan, X.: A secure and efficient fingerprint images encryption scheme. In: 9th International Conference for Young Computer Scientists. Zhangjiajie, People's Republic of China (2008)

  7. Zhang, Y.-P., et al.: Digital image encryption algorithm based on chaos and improved DES. In: IEEE International Conference on Systems, Man and Cybernetics. San Antonio, TX (2009)

  8. Zhang, H., Wang, R.: Image encryption technology based on composite chaotic system and symmetric encryption algorithm. In: International Conference on Advanced Materials in Microwaves and Optics (AMMO 2011). Bangkok, Thailand (2011)

  9. Zhang, H.-Y.: Image encryption algorithm based on self-adaptive and chaos theory. In: International Conference on Materials, Mechatronics and Automation (ICMMA 2011). Melbourne, Australia (2011)

  10. Chen, H., et al.: Comparison of the image encryption effects based on different unary polynomial transformation chaos. In: International Conference on Mechatronics and Semiconductor Materials (ICMSCM 2013). Xian, People's Republic of China (2013)

  11. Pak, C., et al.: A novel bit-level color image encryption using improved 1D chaotic map. Multimedia Tools Appl 78(9), 12027–12042 (2019)

    Article  Google Scholar 

  12. Raza, S.F., Satpute, V.: A novel bit permutation-based image encryption algorithm. Nonlinear Dyn. 95(2), 859–873 (2019)

    Article  Google Scholar 

  13. Yu, W., et al.: Double-image encryption based on spatiotemporal chaos and DNA operations. Multimedia Tools Appl 78(14), 20037–20064 (2019)

    Article  Google Scholar 

  14. You, S., Wu, L., Cai, B.: Image double encryption based on iteration Fourier and chaos system. Optik 124(20), 4197–4200 (2013)

    Article  Google Scholar 

  15. Avasare, M.G., Kelkar, V.V., IEEE: Image encryption using chaos theory. In: International Conference on Communication, Information & Computing Technology (ICCICT). Inst Technol Mumbai, Mumbai, India (2015)

  16. Song, C., Qiao, Y.: A novel image encryption algorithm based on DNA encoding and spatiotemporal chaos. Entropy 17(10), 6954–6968 (2015)

    Article  MathSciNet  Google Scholar 

  17. Gao, H., Gao, T., Cheng, R.: Random selective image encryption algorithm based on chaos search. In: 11th Chinese Conference on Image and Graphics Technologies and Applications (IGTA). Peking Univ, Beijing, People's Republic of China (2016)

  18. Huetter, T., et al.: Weaknesses in security considerations related to chaos-based image encryption. In: 18th International Conference on Information and Communications Security (ICICS). Singapore, Singapore (2016)

  19. Sharma, M., Bhargava, A., IEEE: Chaos based image encryption using two step iterated logistic map. In: IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE). Jaipur, India (2016)

  20. Cavusoglu, U., et al.: Secure image encryption algorithm design using a novel chaos based S-Box. Chaos Solitons Fractals 95, 92–101 (2017)

    Article  Google Scholar 

  21. Sukegawa, N., Ikeguchi, T.: How to perturb Bernoulli shift map. Chaos Solitons Fractals 165, 112793 (2022)

    Article  Google Scholar 

  22. He, J., et al.: An integrated chaotic system with application to image encryption. In: 24th International Conference on Neural Information Processing (ICONIP). Guangzhou, People's Republic of China (2017)

  23. Li, C., et al.: Chaotic image encryption schemes: a review. In: 2nd International Conference on Electrical, Automation and Mechanical Engineering (EAME). Shanghai, People's Republic of China (2017)

  24. Matthews, R.: On the derivation of a “chaotic” encryption algorithm. Cryptologia 13(1), 29–42 (1989)

    Article  MathSciNet  Google Scholar 

  25. Mehmood, A., et al.: A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: an application in image encryption. J. Inf. Secur. Appl. 78, 103590 (2023)

    Google Scholar 

  26. Mehmood, A., et al.: Advances and vulnerabilities in modern cryptographic techniques: a comprehensive survey on cybersecurity in the domain of machine/deep learning and quantum techniques. IEEE Access 12, 27530–27555 (2024)

    Article  Google Scholar 

  27. Alawida, M.: Enhancing logistic chaotic map for improved cryptographic security in random number generation. J. Inf. Secur. Appl. 80, 103685 (2024)

    Google Scholar 

  28. Hua, Z., et al.: 2D Logistic-Sine-coupling map for image encryption. Signal Process. 149, 148–161 (2018)

    Article  Google Scholar 

  29. Liu, J., et al.: A new simple chaotic system and its application in medical image encryption. Multimedia Tools Appl. 77(17), 22787–22808 (2018)

    Article  Google Scholar 

  30. Parvaz, R., Zarebnia, M.: A combination chaotic system and application in color image encryption. Opt. Laser Technol. 101, 30–41 (2018)

    Article  Google Scholar 

  31. Prasetyo, H., IEEE: A new image encryption technique using simple chaotic maps. In: International Symposium on Electronics and Smart Devices (ISESD)—Smart Devices for Big Data Analytic and Machine Learning. Bandung, Indonesia (2018)

  32. Al-Hazaimeh, O.M., et al.: Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys. Neural Comput. Appl. 31(7), 2395–2405 (2019)

    Article  Google Scholar 

  33. Li, H., et al.: Double-image encryption by using chaos-based local pixel scrambling technique and gyrator transform. Opt. Lasers Eng. 51(12), 1327–1331 (2013)

    Article  Google Scholar 

  34. Chen, C., Li, J., Deng, H.: An image encryption algorithm based on chua's chaos and baker's transformation. In: 6th International Conference on Applications and Techniques in Information Security (ATIS). Beijing Jiaotong Univ, Beijing, People's Republic of China (2015)

  35. Saeed, S., et al.: A gray-scale image encryption using fisher-yates chaotic shuffling in wavelet domain. In: IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE). Poornima Univ, Jaipur, India (2014)

  36. Chai, X., et al.: An image encryption algorithm based on chaotic system and compressive sensing. Signal Process. 148, 124–144 (2018)

    Article  Google Scholar 

  37. Wang, X., Guan, N.: A novel chaotic image encryption algorithm based on extended Zigzag confusion and RNA operation. Opt. Laser Technol. 131, 106366 (2020)

    Article  Google Scholar 

  38. E, X., et al. A new method of information encryption. In: 2nd ISECS International Colloquium on Computing, Communication, Control and Management (CCCM 2009). Sanya, People's Republic of China (2009)

  39. Wang, X., Zhao, M.: An image encryption algorithm based on hyperchaotic system and DNA coding. Opt. Laser Technol. 143, 107316 (2021)

    Article  Google Scholar 

  40. Hua, Z., et al.: Image encryption using josephus problem and filtering diffusion. Ieee Access 7, 8660–8674 (2019)

    Article  Google Scholar 

  41. Li, X., et al.: Image encryption based on dynamic filtering and bit cuboid operations. Complexity (2019). https://doi.org/10.1155/2019/7485621

    Article  Google Scholar 

  42. Xiao, S., Yu, Z., Deng, Y.: Design and analysis of a novel chaos-based image encryption algorithm via switch control mechanism. Secur. Commun. Netw. 2020, 1–12 (2020)

    Article  Google Scholar 

  43. Charalampidis, N., et al.: A novel piecewise chaotic map for image encryption. In: 11th International Conference on Modern Circuits and Systems Technologies (MOCAST). Bremen, Germany (2022)

  44. Ho, J., Jain, A., Abbeel, P.: Denoising diffusion probabilistic models. (2020). ArXiv:abs/2006.11239

  45. Alawida, M.: A novel chaos-based permutation for image encryption. J. King Saud Univ.—Comput. Inf. Sci. 35(6), 101595 (2023)

    Google Scholar 

  46. Alawida, M., Teh, J.S., Alshoura, W.H.: A new image encryption algorithm based on DNA state machine for UAV data encryption. Drones (2023). https://doi.org/10.3390/drones7010038

    Article  Google Scholar 

  47. Alawida, M., et al.: A new hybrid digital chaotic system with applications in image encryption. Signal Process. 160, 45–58 (2019)

    Article  Google Scholar 

  48. Abba, A., Teh, J.S., Alawida, M.: Towards accurate keyspace analysis of chaos-based image ciphers. Multimed. Tools Appl. (2024). https://doi.org/10.1007/s11042-024-18628-8

    Article  Google Scholar 

  49. Gao, X., et al.: A fast and efficient multiple images encryption based on single-channel encryption and chaotic system. Nonlinear Dyn. 108(1), 613–636 (2022)

    Article  Google Scholar 

  50. Li, X., et al.: Fractional-order double-ring erbium-doped fiber laser chaotic system and its application on image encryption. Opt. Laser Technol. 140, 107074 (2021)

    Article  Google Scholar 

  51. Niyat, A.Y., Moattar, M.H., Torshiz, M.N.: Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt. Lasers Eng. 90, 225–237 (2017)

    Article  Google Scholar 

  52. Wu, J., Liao, X., Yang, B.: Image encryption using 2D Henon-Sine map and DNA approach. Signal Process. 153, 11–23 (2018)

    Article  Google Scholar 

  53. Elkhalil, N., Weddy, Y.C., Ejbali, R.: Image encryption using the new two-dimensional Beta chaotic map. Multimed. Tools Appl. 82(20), 31575–31589 (2023)

    Article  Google Scholar 

  54. Wang, X., Chen, X.: An image encryption algorithm based on dynamic row scrambling and Zigzag transformation. Chaos Solitons Fractals 147, 110962 (2021)

    Article  MathSciNet  Google Scholar 

  55. Cao, C., Sun, K., Liu, W.: A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Process. 143, 122–133 (2018)

    Article  Google Scholar 

  56. Li, X., et al.: Image encryption based on dynamic filtering and bit cuboid operations. Complexity 2019, 7485621 (2019)

    Google Scholar 

  57. Hua, Z., Zhou, Y.: Image encryption using 2D Logistic-adjusted-Sine map. Inf. Sci. 339, 237–253 (2016)

    Article  Google Scholar 

  58. Wu, X., Kan, H., Kurths, J.: A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl. Soft Comput. 37, 24–39 (2015)

    Article  Google Scholar 

  59. Rehman, A.U., et al.: A color image encryption algorithm based on one time key, chaos theory, and concept of rotor machine. IEEE Access 8, 172275–172295 (2020)

    Article  Google Scholar 

Download references

Funding

This work is supported by the National Natural Science Foundation of China (Nos: 61701070), the Fundamental Research Funds for the Central Universities (Nos: 3132023252), China Postdoctoral Science Foundation (No: 2020M680933).

Author information

Authors and Affiliations

Authors

Contributions

P.F.Cao. wrote the main manuscript text, conducted data analysis, and performed visualization. L.Teng. primarily contributed to reviewing and revising the initial draft, as well as supervising and leading the experiments. All authors reviewed and approved the final version of the manuscript.

Corresponding author

Correspondence to Lin Teng.

Ethics declarations

Competing interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cao, P., Teng, L. A chaotic image encryption algorithm based on sliding window and pseudo-random stack shuffling. Nonlinear Dyn (2024). https://doi.org/10.1007/s11071-024-09727-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11071-024-09727-0

Keyword

Navigation