Abstract
This paper introduces a new one-dimensional chaotic system, which can be considered as an improvement upon the Bernoulli map. The Quadratic Bernoulli Chaotic System (QBCS) is introduced by replacing the linear segment of the Bernoulli map's two segments with quadratic nonlinearity. Subsequently, an image encryption algorithm is proposed, utilizing a sliding window mechanism and dynamic stack sequences. Initially, the position of the initial window is determined, and to ensure the traversal of the window, the initial window position is set to the top-left corner of the original image. Subsequently, the step size for window movement is determined, and chaotic sequences generated by QBCS are used to scramble the contents selected by each window. Moreover, on the basis of the standard index scrambling concept, a dynamic stack traversal method is employed, wherein the behavior of elements entering and exiting the stack is determined according to the chaotic sequences generated by QBCS, effectively expanding the value space of the chaotic index sequence. Furthermore, combined with the chaotic sequences generated by QBCS, a diffusion process using distribution dilution is applied to the contents within each window. Experimental simulations and performance analysis demonstrate the algorithm's robust security.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fig8_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fig9_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fig10_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fig11_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fig12_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Figa_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Figb_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Figc_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Figd_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fige_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Figf_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fig13_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fig14_HTML.jpg)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fig15_HTML.jpg)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fig16_HTML.jpg)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fig17_HTML.jpg)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fig18_HTML.jpg)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fig19_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fig20_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fig21_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fig22_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fig23_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fig24_HTML.jpg)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11071-024-09727-0/MediaObjects/11071_2024_9727_Fig25_HTML.jpg)
Similar content being viewed by others
Data availability
Data will be made available on reasonable request.
References
Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24(9), 926–934 (2006)
Dong, C., et al.: Improvement of an image encryption algorithm based on combined multidimensional chaotic systems. In: 11th International Conference on Knowledge-Based Intelligent Informational and Engineering Systems/17th Italian Workshop on Neural Networks. Vietri sul Mare, Italy (2007)
Sun, F.-Y., Liu, S.-T., Lue, Z.-W.: Image encryption using high-dimension chaotic system. Chin. Phys. 16(12), 3616–3623 (2007)
Jian, J., et al.: Encryption of digital image based on chaos system. In: 2nd IFIP International Conference on Computer and Computing Technologies in Agriculture. Beijing, People's Republic of China (2008)
Lorenz, E.N.: Deterministic Nonperiodic Flow, In: The Theory of Chaotic Attractors, B.R. Hunt, et al. (eds.) pp. 25–36, Springer New York: New York, NY. (2004)
Zhao, S., Li, H., Yan, X.: A secure and efficient fingerprint images encryption scheme. In: 9th International Conference for Young Computer Scientists. Zhangjiajie, People's Republic of China (2008)
Zhang, Y.-P., et al.: Digital image encryption algorithm based on chaos and improved DES. In: IEEE International Conference on Systems, Man and Cybernetics. San Antonio, TX (2009)
Zhang, H., Wang, R.: Image encryption technology based on composite chaotic system and symmetric encryption algorithm. In: International Conference on Advanced Materials in Microwaves and Optics (AMMO 2011). Bangkok, Thailand (2011)
Zhang, H.-Y.: Image encryption algorithm based on self-adaptive and chaos theory. In: International Conference on Materials, Mechatronics and Automation (ICMMA 2011). Melbourne, Australia (2011)
Chen, H., et al.: Comparison of the image encryption effects based on different unary polynomial transformation chaos. In: International Conference on Mechatronics and Semiconductor Materials (ICMSCM 2013). Xian, People's Republic of China (2013)
Pak, C., et al.: A novel bit-level color image encryption using improved 1D chaotic map. Multimedia Tools Appl 78(9), 12027–12042 (2019)
Raza, S.F., Satpute, V.: A novel bit permutation-based image encryption algorithm. Nonlinear Dyn. 95(2), 859–873 (2019)
Yu, W., et al.: Double-image encryption based on spatiotemporal chaos and DNA operations. Multimedia Tools Appl 78(14), 20037–20064 (2019)
You, S., Wu, L., Cai, B.: Image double encryption based on iteration Fourier and chaos system. Optik 124(20), 4197–4200 (2013)
Avasare, M.G., Kelkar, V.V., IEEE: Image encryption using chaos theory. In: International Conference on Communication, Information & Computing Technology (ICCICT). Inst Technol Mumbai, Mumbai, India (2015)
Song, C., Qiao, Y.: A novel image encryption algorithm based on DNA encoding and spatiotemporal chaos. Entropy 17(10), 6954–6968 (2015)
Gao, H., Gao, T., Cheng, R.: Random selective image encryption algorithm based on chaos search. In: 11th Chinese Conference on Image and Graphics Technologies and Applications (IGTA). Peking Univ, Beijing, People's Republic of China (2016)
Huetter, T., et al.: Weaknesses in security considerations related to chaos-based image encryption. In: 18th International Conference on Information and Communications Security (ICICS). Singapore, Singapore (2016)
Sharma, M., Bhargava, A., IEEE: Chaos based image encryption using two step iterated logistic map. In: IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE). Jaipur, India (2016)
Cavusoglu, U., et al.: Secure image encryption algorithm design using a novel chaos based S-Box. Chaos Solitons Fractals 95, 92–101 (2017)
Sukegawa, N., Ikeguchi, T.: How to perturb Bernoulli shift map. Chaos Solitons Fractals 165, 112793 (2022)
He, J., et al.: An integrated chaotic system with application to image encryption. In: 24th International Conference on Neural Information Processing (ICONIP). Guangzhou, People's Republic of China (2017)
Li, C., et al.: Chaotic image encryption schemes: a review. In: 2nd International Conference on Electrical, Automation and Mechanical Engineering (EAME). Shanghai, People's Republic of China (2017)
Matthews, R.: On the derivation of a “chaotic” encryption algorithm. Cryptologia 13(1), 29–42 (1989)
Mehmood, A., et al.: A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: an application in image encryption. J. Inf. Secur. Appl. 78, 103590 (2023)
Mehmood, A., et al.: Advances and vulnerabilities in modern cryptographic techniques: a comprehensive survey on cybersecurity in the domain of machine/deep learning and quantum techniques. IEEE Access 12, 27530–27555 (2024)
Alawida, M.: Enhancing logistic chaotic map for improved cryptographic security in random number generation. J. Inf. Secur. Appl. 80, 103685 (2024)
Hua, Z., et al.: 2D Logistic-Sine-coupling map for image encryption. Signal Process. 149, 148–161 (2018)
Liu, J., et al.: A new simple chaotic system and its application in medical image encryption. Multimedia Tools Appl. 77(17), 22787–22808 (2018)
Parvaz, R., Zarebnia, M.: A combination chaotic system and application in color image encryption. Opt. Laser Technol. 101, 30–41 (2018)
Prasetyo, H., IEEE: A new image encryption technique using simple chaotic maps. In: International Symposium on Electronics and Smart Devices (ISESD)—Smart Devices for Big Data Analytic and Machine Learning. Bandung, Indonesia (2018)
Al-Hazaimeh, O.M., et al.: Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys. Neural Comput. Appl. 31(7), 2395–2405 (2019)
Li, H., et al.: Double-image encryption by using chaos-based local pixel scrambling technique and gyrator transform. Opt. Lasers Eng. 51(12), 1327–1331 (2013)
Chen, C., Li, J., Deng, H.: An image encryption algorithm based on chua's chaos and baker's transformation. In: 6th International Conference on Applications and Techniques in Information Security (ATIS). Beijing Jiaotong Univ, Beijing, People's Republic of China (2015)
Saeed, S., et al.: A gray-scale image encryption using fisher-yates chaotic shuffling in wavelet domain. In: IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE). Poornima Univ, Jaipur, India (2014)
Chai, X., et al.: An image encryption algorithm based on chaotic system and compressive sensing. Signal Process. 148, 124–144 (2018)
Wang, X., Guan, N.: A novel chaotic image encryption algorithm based on extended Zigzag confusion and RNA operation. Opt. Laser Technol. 131, 106366 (2020)
E, X., et al. A new method of information encryption. In: 2nd ISECS International Colloquium on Computing, Communication, Control and Management (CCCM 2009). Sanya, People's Republic of China (2009)
Wang, X., Zhao, M.: An image encryption algorithm based on hyperchaotic system and DNA coding. Opt. Laser Technol. 143, 107316 (2021)
Hua, Z., et al.: Image encryption using josephus problem and filtering diffusion. Ieee Access 7, 8660–8674 (2019)
Li, X., et al.: Image encryption based on dynamic filtering and bit cuboid operations. Complexity (2019). https://doi.org/10.1155/2019/7485621
Xiao, S., Yu, Z., Deng, Y.: Design and analysis of a novel chaos-based image encryption algorithm via switch control mechanism. Secur. Commun. Netw. 2020, 1–12 (2020)
Charalampidis, N., et al.: A novel piecewise chaotic map for image encryption. In: 11th International Conference on Modern Circuits and Systems Technologies (MOCAST). Bremen, Germany (2022)
Ho, J., Jain, A., Abbeel, P.: Denoising diffusion probabilistic models. (2020). ArXiv:abs/2006.11239
Alawida, M.: A novel chaos-based permutation for image encryption. J. King Saud Univ.—Comput. Inf. Sci. 35(6), 101595 (2023)
Alawida, M., Teh, J.S., Alshoura, W.H.: A new image encryption algorithm based on DNA state machine for UAV data encryption. Drones (2023). https://doi.org/10.3390/drones7010038
Alawida, M., et al.: A new hybrid digital chaotic system with applications in image encryption. Signal Process. 160, 45–58 (2019)
Abba, A., Teh, J.S., Alawida, M.: Towards accurate keyspace analysis of chaos-based image ciphers. Multimed. Tools Appl. (2024). https://doi.org/10.1007/s11042-024-18628-8
Gao, X., et al.: A fast and efficient multiple images encryption based on single-channel encryption and chaotic system. Nonlinear Dyn. 108(1), 613–636 (2022)
Li, X., et al.: Fractional-order double-ring erbium-doped fiber laser chaotic system and its application on image encryption. Opt. Laser Technol. 140, 107074 (2021)
Niyat, A.Y., Moattar, M.H., Torshiz, M.N.: Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt. Lasers Eng. 90, 225–237 (2017)
Wu, J., Liao, X., Yang, B.: Image encryption using 2D Henon-Sine map and DNA approach. Signal Process. 153, 11–23 (2018)
Elkhalil, N., Weddy, Y.C., Ejbali, R.: Image encryption using the new two-dimensional Beta chaotic map. Multimed. Tools Appl. 82(20), 31575–31589 (2023)
Wang, X., Chen, X.: An image encryption algorithm based on dynamic row scrambling and Zigzag transformation. Chaos Solitons Fractals 147, 110962 (2021)
Cao, C., Sun, K., Liu, W.: A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Process. 143, 122–133 (2018)
Li, X., et al.: Image encryption based on dynamic filtering and bit cuboid operations. Complexity 2019, 7485621 (2019)
Hua, Z., Zhou, Y.: Image encryption using 2D Logistic-adjusted-Sine map. Inf. Sci. 339, 237–253 (2016)
Wu, X., Kan, H., Kurths, J.: A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl. Soft Comput. 37, 24–39 (2015)
Rehman, A.U., et al.: A color image encryption algorithm based on one time key, chaos theory, and concept of rotor machine. IEEE Access 8, 172275–172295 (2020)
Funding
This work is supported by the National Natural Science Foundation of China (Nos: 61701070), the Fundamental Research Funds for the Central Universities (Nos: 3132023252), China Postdoctoral Science Foundation (No: 2020M680933).
Author information
Authors and Affiliations
Contributions
P.F.Cao. wrote the main manuscript text, conducted data analysis, and performed visualization. L.Teng. primarily contributed to reviewing and revising the initial draft, as well as supervising and leading the experiments. All authors reviewed and approved the final version of the manuscript.
Corresponding author
Ethics declarations
Competing interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Cao, P., Teng, L. A chaotic image encryption algorithm based on sliding window and pseudo-random stack shuffling. Nonlinear Dyn (2024). https://doi.org/10.1007/s11071-024-09727-0
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11071-024-09727-0