A New Image Cipher Using Chaotically Twisted Maps

  • P. Devaraj
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 250)


This paper presents a new image encryption scheme that employs the Arnold cat map for total shuffling of the positions of image pixels and then uses two mixed chaotic maps twisted together to increase the key length and security. The states combination of two coupled chaotic systems are used to confuse the relationship between the plain-image and the cipher-image in a nonlinear fashion so as to resist against known plain-text and chosen plain-text attacks. In the diffusion process, the pixel values are altered sequentially. Various operations employed include nonlinear diffusion using the second chaotic key, random like diffusion of adjacent pixels and XORing with the third chaotic key. The security and performance of the proposed image encryption technique have been analyzed using statistical analysis, key sensitivity analysis, key space analysis, differential analysis and entropy analysis. The simulation shows that a single pixel difference of the plain-image will change almost all the pixels in the cipher-image (NPCR>99%), and the unified average changing intensity is high (UACI>33%). Since the entropy is found to be close to the theoretical value, we can observe that the information leakage is negligible and hence the scheme is highly secure. The experimental results demonstrate that the new algorithm has a low time complexity and the suggested encryption algorithm has the advantages of large key space and high security, and moreover, the distribution of grey values of the encrypted image has a random-like behavior.


Twisted Chaotic Maps Permutation Byte Substitution Nonlinear Diffusion Random Diffusion 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Alvarez, G., Shujun, L.: Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption. Commun. Nonlinear Sci. Numer. Simulat. 14, 3743–3749 (2009)CrossRefGoogle Scholar
  2. 2.
    Cokal, C., Solak, E.: Cryptanalysis of a chaos-based image encryption algorithm. Physics Letters A 373, 1350–1357 (2009)MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption based on 3D chaotic cat maps. Chaos Solitons and Fractals 21, 749–761 (2004)MathSciNetCrossRefzbMATHGoogle Scholar
  4. 4.
    Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc Chaos 8(6), 1259–1284 (1998)MathSciNetCrossRefzbMATHGoogle Scholar
  5. 5.
    Guan, Z.H., Huang, F., Guan, W.: Chaos based image encryption algorithm. Phys. Lett. A 346, 153–157 (2005)CrossRefzbMATHGoogle Scholar
  6. 6.
    Li, C., Li, S., Lo, K.-T.: Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simulat. (article in press), doi:10.1016/j.cnsns.2009.07.007 Google Scholar
  7. 7.
    Li, C., Li, S., Alvarez, G., Chen, G., Lo, K.-T.: Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations. Phys. Lett. A 369(1-2), 23–30 (2007)CrossRefzbMATHGoogle Scholar
  8. 8.
    Li, C., Li, S., Asim, M., Nunez, J., Alvarez, G., Chen, G.: On the security defects of an image encryption scheme. Image Vis. Comput. 27, 1371–1381 (2009)CrossRefGoogle Scholar
  9. 9.
    Patidar, V., Pareek, N.K., Sud, K.K.: A new substitution diffusion based image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simulat. 14(7), 3056–3075 (2009)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Patidar, V., Pareek, N.K., Purohit, G., Sud, K.K.: Modified substitution-diffusion image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simulat. 15(10), 2755–2765 (2010)MathSciNetCrossRefzbMATHGoogle Scholar
  11. 11.
    Rhouma, R., Solak, E., Belghith, S.: Cryptanalysis of a new substitution-diffusion based image cipher. Commun. Nonlinear Sci. Numer. Simulat. 15(7), 1887–1892 (2010)MathSciNetCrossRefzbMATHGoogle Scholar
  12. 12.
    Shatheesh Sam, I., Devaraj, P., Bhuvaneswaran, R.S.: Enhanced substitution-diffusion based image cipher using improved chaotic map. In: Das, V.V., Vijaykumar, R. (eds.) ICT 2010. CCIS, vol. 101, pp. 116–123. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  13. 13.
    Sam, I.S., Devaraj, P., Bhuvaneswaran, R.S.: A novel image cipher based on mixed transformed logistic maps. In: Multimedia Tools and Applications. Springer, Heidelberg, doi:10.1007/s11042-010-0652-6Google Scholar
  14. 14.
    Xiaojun, T., Minggen, C.: Image encryption with compound chaotic sequence cipher shifting dynamically. Image Vision Comput. 26, 843–850 (2008)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • P. Devaraj
    • 1
  1. 1.Department of MathematicsCollege of Engineering Guindy, Anna UniversityChennaiIndia

Personalised recommendations