Image Encryption Algorithm Methodology Based on Multi-mapping Image Pixel

  • W. M. Abd-ElhafiezEmail author
  • Omar Reyad
  • M. A. Mofaddel
  • Mohamed Fathy
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 921)


Image encryption and decryption using a key sequence based on the multi-mapping method of an image pixel is proposed in this paper. The generated key sequences are based on the logistic map, elliptic curves (EC) and Henon map. In the beginning, the one-dimensional sequence is generated using logistic map for the bifurcation parameter and initial value. The generated sequences are XORed with image pixels as a first mapping step. Then the resulted pixels are XORed with key sequence based on elliptic curve random number generator (ECRNG) as a second mapping step. Finally, the resulted pixels XORed with key sequence generated by Henon map. The obtained cipher image introduces good cryptographic properties in the case of multi-mapping. The performance of the proposed scheme is analyzed by computing Histogram, Entropy, and Correlation between the original and encrypted images. The proposed method provides an immense improvement in the encrypted image.


Encryption Gray image Henon map Logistic map Elliptic curves 


  1. 1.
    Auyporn, W., Vongpradhip, S.: A robust image encryption method based on bit plane decomposition and multiple chaotic maps. Int. J. Signal Process. Syst. 3(1), 8–13 (2015)Google Scholar
  2. 2.
    Reyad, O., Mofaddel, M.A., Abdelhafiez, W.M., Fathy, M.: A novel image encryption scheme based on different block size for grayscale and color images. In: 12th International Conference on Computer Engineering and Systems (ICCES), pp. 455–461. IEEE (2017)Google Scholar
  3. 3.
    Reyad, O., Kotulski, Z., Abdelhafiez, W.M.: Image encryption using chaos-driven elliptic curve pseudo-random number generators. Appl. Math. Inf. Sci. 10(4), 1283–1292 (2016)CrossRefGoogle Scholar
  4. 4.
    Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcat. Chaos 8, 1259–1284 (1998)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Ahmad, S., Alam, K., Rahman, H., Tamura, S.: A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets. In: International Conference in Networking Systems and Security (NSysS), pp. 1–5. IEEE (2015)Google Scholar
  6. 6.
    Reyad, O.: Text message encoding based on elliptic curve cryptography and a mapping methodology. Inf. Sci. Lett. 7(1), 7–11 (2018)CrossRefGoogle Scholar
  7. 7.
    Shah, J., Dohbi, J.S.: Review of image encryption and decryption techniques for 2D images. Int. J. Eng. Technol. Manage. Res. 5(1), 81–84 (2018)Google Scholar
  8. 8.
    Dhiman, R., Singh, B.: Image encryption techniques: a literature Review. Int. J. Adv. Res. Comput. Sci. 8(7), 239–244 (2017)CrossRefGoogle Scholar
  9. 9.
    Lagmiri, S.N., Elalami, N., Elalami, J.: Color and gray images encryption algorithm using chaotic systems of different dimensions. Int. J. Comput. Sci. Network Secur. 18(1), 79–86 (2018)Google Scholar
  10. 10.
    Zhang, X., Han, F., Niu, Y.: Chaotic image encryption algorithm based on bit permutation and dynamic DNA encoding. Hindawi Comput. Intell. Neurosci. 1–11 (2017)Google Scholar
  11. 11.
    Zang, Y., Li, X., Hou, W.: A fast image encryption scheme based on AES. In: 2nd International Conference on Image, Vision and Computing, pp. 624–628. IEEE (2017)Google Scholar
  12. 12.
    Chen, X., Hu, C.: Adaptive medical image encryption algorithm based on multiple chaotic mapping. Saudi J. Biol. Sci. 24(8), 1821–1827 (2017)CrossRefGoogle Scholar
  13. 13.
    Huang, H., Yang, S.: Image encryption technique combining compressive sensing with double random-phase encoding. Hindawi Math. Probl. Eng. (2018)Google Scholar
  14. 14.
    Wang, X., Zhu, X., Zhang, Y.: An image encryption algorithm based on Josephus traversing and mixed chaotic map. IEEE Access 6, 23733–23746 (2018)CrossRefGoogle Scholar
  15. 15.
    Bresten, C.L., Jung, J.H.: A study on the numerical convergence of the discrete logistic map. Commun. Nonlinear Sci. Numer. Simul. 14, 3076–3088 (2009)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Silverman, J.H.: The Arithmetic of Elliptic Curves. Springer, New York (2009)CrossRefGoogle Scholar
  17. 17.
    Reyad, O., Kotulski, Z.: On pseudo-random number generators using elliptic curves and chaotic systems. Appl. Math. Inf. Sci. 9(1), 31–38 (2015)MathSciNetCrossRefGoogle Scholar
  18. 18.
    Reyad, O., Kotulski, Z.: Statistical analysis of the chaos-driven elliptic curve pseudo-random number generators. In: CCIS, vol. 448, pp. 38–48. Springer, Heidelberg (2014)Google Scholar
  19. 19.
    Szczepanski, J., Kotulski, Z.: Pseudorandom number generators based on chaotic dynamical systems. Open. Syst. Inf. Dyn. 8, 137–146 (2001)MathSciNetCrossRefGoogle Scholar
  20. 20.
    Sarmah, H.K., Paul, R.: Period doubling route to chaos in a two parameter invertible map with constant Jacobian. Int. J. Res. Rev. Appl. Sci. (IJRRAS) 3, 72–82 (2010)zbMATHGoogle Scholar
  21. 21.
    Liu, H., Wang, X.: Color image encryption based on one-time keys and robust chaotic maps. J. Comput. Appl. Math. 59, 3320–3327 (2010)MathSciNetCrossRefGoogle Scholar
  22. 22.
    Rhouma, R., Meherzi, S., Belghith, S.: OCML-based colour image encryption. Chaos Soliton Fract. 40(1), 309–318 (2009)CrossRefGoogle Scholar
  23. 23.
    Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 3rd edn. Prentice-Hall Inc., Upper Saddle River (2006)Google Scholar
  24. 24.
    Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption. IEEE Transl. J. Sel. Areas Telecommun. (JSAT) 31–38 (2011)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • W. M. Abd-Elhafiez
    • 1
    • 2
    Email author
  • Omar Reyad
    • 1
  • M. A. Mofaddel
    • 1
  • Mohamed Fathy
    • 1
  1. 1.Faculty of ScienceSohag UniversitySohagEgypt
  2. 2.College of Computer Science and Information SystemsJazan UniversityJazanKingdom of Saudi Arabia

Personalised recommendations