Advertisement

Chaotic Maps for Image Encryption: An Assessment Study

  • Sara T. Kamal
  • Mohamed M. DarwishEmail author
  • Khalid M. Hosny
Chapter
  • 46 Downloads
Part of the Studies in Computational Intelligence book series (SCI, volume 884)

Abstract

Digital images, which are transmitted over different networks nowadays, need a high level of security. Protecting these images is a big challenge. Image encryption is one of the most important methods in securing digital images. In recent years, chaotic maps have proved the efficiency in image encryption. This efficiency is due to excellent properties such as unpredictability and high sensitivity to their initial condition and control parameters. In this chapter, a performance analysis of the chaotic maps-based methods for image encryption is presented. In this comparative study, chaotic maps are used in the permutation and diffusion operations to encrypt the plain image. Moreover, evaluation criteria are selected carefully to evaluate the performance of the image encryption methods in terms of NPCR, UACI, PSNR, correlation coefficient, Local Shannon entropy and computational time. Experiments are performed where the obtained results are used to analyze the performance of the chaotic maps-based image encryption methods.

References

  1. 1.
    Cao W, Zhou Y, Chen CLP, Xia L (2017) Medical image encryption using edge maps. Signal Process 132:96–109CrossRefGoogle Scholar
  2. 2.
    Liu J, Ma Y, Li S, Lian J, Zhang X (2018) A new simple chaotic system and its application in medical image encryption. Multimed Tools Appl 77(17):22787–22808CrossRefGoogle Scholar
  3. 3.
    Saidi M, Hermassi H, Rhouma R, Belghith S (2017) A new adaptive image steganography scheme based on DCT and chaotic map. Multimed Tools Appl 76(11):13493–13510CrossRefGoogle Scholar
  4. 4.
    Parah SA, Loan NA, Shah AA, Sheikh JA, Bhat GM (2018) A new secure and robust watermarking technique based on logistic map and modification of DC coefficient. Nonlinear Dyn 93(4):1933–1951CrossRefGoogle Scholar
  5. 5.
    Thakur S, Singh AK, Ghrera SP, Mohan A (2018) Chaotic based secure watermarking approach for medical images. Multimed Tools ApplGoogle Scholar
  6. 6.
    Dagadu JC, Li J (2018) Context-based watermarking cum chaotic encryption for medical images in telemedicine applications. Multimed Tools Appl 77(18):24289–24312CrossRefGoogle Scholar
  7. 7.
    Reyad O, Mofaddel MA, Abd-Elhafiez WM, Fathy M (2018) A novel image encryption scheme based on different block sizes for grayscale and color images. In: Proceedings of ICCES 2017 12th International Conference on Computer Engineering and System, vol. 2018, no. 1, pp 455–461Google Scholar
  8. 8.
    Parvaz R, Zarebnia M (2018) A combination chaotic system and application in color image encryption. Opt Laser Technol 101:30–41CrossRefGoogle Scholar
  9. 9.
    Zahmoul R, Ejbali R, Zaied M (2017) Image encryption based on new Beta chaotic maps. Opt Lasers Eng 96(April):39–49CrossRefGoogle Scholar
  10. 10.
    Mondal B, Kumar P, Singh S (2018) A chaotic permutation and diffusion based image encryption algorithm for secure communications. Multimed Tools Appl 77(23):31177–31198CrossRefGoogle Scholar
  11. 11.
    Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Sig Process 144:134–144CrossRefGoogle Scholar
  12. 12.
    Jiang N, Dong X, Hu H, Ji Z, Zhang W (2019) Quantum image encryption based on Henon mapping. Int J Theor Phys 58(3):979–991MathSciNetCrossRefGoogle Scholar
  13. 13.
    Annaby MH, Rushdi MA, Nehary EA (2018) Color image encryption using random transforms, phase retrieval, chaotic maps, and diffusion. Opt Lasers Eng 103:9–23CrossRefGoogle Scholar
  14. 14.
    Belazi A, Abd El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155–170CrossRefGoogle Scholar
  15. 15.
    Elsadany AA, Yousef AM, Elsonbaty A (2018) Further analytical bifurcation analysis and applications of coupled logistic maps. Appl Math Comput 338:314–336MathSciNetzbMATHGoogle Scholar
  16. 16.
    Salman SM, Elsadany AA (2018) On the bifurcation of Marotto’s map and its application in image encryption. J Comput Appl Math 328:177–196MathSciNetCrossRefGoogle Scholar
  17. 17.
    Wang X, Qin X, Liu C (2019) Color image encryption algorithm based on customized globally coupled map lattices. Multimed Tools Appl 78(5):6191–6209CrossRefGoogle Scholar
  18. 18.
    Fu C, Chen ZF, Zhao W, Jiang HY (2017) A new fast color image encryption scheme using Chen chaotic system. In: Proceedings of 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing. SNPD 2017, pp 121–126Google Scholar
  19. 19.
    Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Sig Process 138:129–137CrossRefGoogle Scholar
  20. 20.
    Han C (2019) An image encryption algorithm based on modified logistic chaotic map. Optik (Stuttg) 181:779–785CrossRefGoogle Scholar
  21. 21.
    Sahari ML, Boukemara I (2018) A pseudo-random numbers generator based on a novel 3D chaotic map with an application to color image encryption. Nonlinear Dyn 94(1):723–744CrossRefGoogle Scholar
  22. 22.
    Bansal R, Gupta S, Sharma G (2017) An innovative image encryption scheme based on chaotic map and Vigenère scheme. Multimed Tools Appl 76(15):16529–16562CrossRefGoogle Scholar
  23. 23.
    Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238–246CrossRefGoogle Scholar
  24. 24.
    Xingyuan W, Le F, Shibing W, Zhang C, Yingqian Z (2018) Spatiotemporal Chaos in coupled logistic map lattice with dynamic coupling coefficient and its application in image encryption. IEEE Access 6:39705–39724CrossRefGoogle Scholar
  25. 25.
    Li C, Luo G, Qin K, Li C (2017) An image encryption scheme based on chaotic tent map. Nonlinear Dyn 87(1):127–133CrossRefGoogle Scholar
  26. 26.
    Hua Z, Jin F, Xu B, Huang H (2018) 2D logistic-sine-coupling map for image encryption. Sig Process 149:148–161CrossRefGoogle Scholar
  27. 27.
    Wu J, Liao X, Yang B (2018) Image encryption using 2D Hénon-Sine map and DNA approach. Sig Process 153:11–23CrossRefGoogle Scholar
  28. 28.
    Shokouh Saljoughi A, Mirvaziri H (2019) A new method for image encryption by 3D chaotic map. Pattern Anal Appl 22(1):243–257MathSciNetCrossRefGoogle Scholar
  29. 29.
    Chai X, Gan Z, Yuan K, Chen Y, Liu X (2019) A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput Appl 31(1):219–237CrossRefGoogle Scholar
  30. 30.
    Khan JS, Ahmad J (2019) Chaos based efficient selective image encryption. Multidimens Syst Signal Process 30(2):943–961MathSciNetCrossRefGoogle Scholar
  31. 31.
    Safi HW, Maghari AY (2017) Image encryption using double chaotic logistic map. In: Proceedings 2017. International Conference on Promising Electronic Technologies (ICPET), pp 66–70Google Scholar
  32. 32.
    Sayed WS, Radwan AG, Fahmy HAH (2016) Double-sided bifurcations in tent maps: analysis and applications. In: 2016 3rd International conference on advances in computational tools for engineering applications, ACTEA 2016, no. 2, pp 207–210Google Scholar
  33. 33.
    Zhou Y, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Sig Process 97:172–182CrossRefGoogle Scholar
  34. 34.
    Liu H, Wen F, Kadir A (2018) Construction of a new 2D Chebyshev-Sine map and its application to color image encryption. Multimed Tools ApplGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Sara T. Kamal
    • 1
  • Mohamed M. Darwish
    • 1
    Email author
  • Khalid M. Hosny
    • 2
  1. 1.Department of Mathematics, Faculty of ScienceAssiut UniversityAssiutEgypt
  2. 2.Department of Information Technology, Faculty of Computers and InformaticsZagazig UniversityZagazigEgypt

Personalised recommendations