An Image Encryption Scheme Based on the Discrete Auto-Switched Chaotic System

  • Chunlei Fan
  • Kai Feng
  • Xin Huang
  • Qun DingEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 834)


Aiming at finite computational precision would make digital chaotic binary sequences into a short period sequence, so that the security of multimedia encryption information based on chaotic cipher is not guaranteed. In this paper, we designed a discrete auto-switched chaotic system with a simple structure and good performance in order to increase the period length of chaotic sequences. The autocorrelation and complexity experiments of chaotic sequences were performed to demonstrate the good performance of the sequence. Finally, the simulation experiment results show that this image encryption scheme is both reliable and secure.


Chaotic system Binary sequences Image encryption Computational precision 



This work was supported by the Natural Science Foundation of China (No. 61471158) and the “modern sensing technology” innovation team project of Heilongjiang province (No. 2012TD007).


  1. 1.
    Feigenbaum, M.J.: Quantitative universality for a chaos of nonlinear transformations. J. Stat. Phys. 19(1), 25–52 (1978)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Li, T.Y., Yorke, J.A.: Period three implies chaos. J. Am. Math. Mon. 82(10), 985–992 (1975)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Matthews, R.: On the derivation of a chaotic encryption algorithm. J. Cryptologia. 3(1), 29–41 (1989)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Liu, C.Y., Ding, Q.: Complexity analysis and research based on the chaotic system of sample entropy. J. Netw. Intell. 3(3), 162–169 (2018)Google Scholar
  5. 5.
    Fan, C.L., Ding, Q.: ARM-embedded Implementation of H.264 selective encryption based on chaotic stream cipher. J. Netw. Intell. 3(1), 9–15 (2018)Google Scholar
  6. 6.
    Yang, B., Liao, X.F.: A new color image encryption scheme based on logistic map over the finite field Z(N). J. Multimed. Tools Appl. 77(16), 21803–21821 (2018)CrossRefGoogle Scholar
  7. 7.
    Liu, Y., Tang, S.Y., Liu, R., et al.: Secure and robust digital image watermarking scheme using logistic and RSA encryption. J. Expert Syst. Appl. 97, 95–105 (2018)CrossRefGoogle Scholar
  8. 8.
    Li, C.H., Luo, G.C., Qin, K., et al.: An image encryption scheme based on chaotic tent map. J. Nonlinear Dyn. 87(1), 127–133 (2017)CrossRefGoogle Scholar
  9. 9.
    Fan, C.L., Liu, S.Y., Ding, Q.: Design of embedded ethernet interface based on chaotic stream cipher. J. Inf. Hiding Multimed. Sig. Process. 6(3), 2073–4212 (2015)Google Scholar
  10. 10.
    Du, B.X., Geng, X.L., Chen, F.Y., Pan, J., Ding, Q.: Generation and realization of digital chaotic key sequence based on double K-L transform. Chin. J Electron. 22(1), 131–134 (2013)Google Scholar
  11. 11.
    Xiang, F., Qiu, S.S.: Stream cipher design based on inter-perturbations of chaotic systems. Acta Phys. Sin-Ch. Ed. 57(10), 6132–6138 (2008)zbMATHGoogle Scholar
  12. 12.
    Chen, T.M., Jiang, R.R.: New hybrid stream cipher based on chaos and neural networks. Acta Phys. Sin-Ch. Ed. 62(4), 040301 (2013)Google Scholar
  13. 13.
    Fan, C.L., Zhang, Q., Sun, H.R., Song, B.B., Ding, Q.: Designing network encryption machine based on Henon chaotic key algorithm. J. Appl. Anal. Comput. 6(4), 1126–1134 (2016)MathSciNetGoogle Scholar
  14. 14.
    Bandt, C., Pompe, B.: Permutation entropy: a natural complexity measure for time series. Phys. Rev. Lett. 88, 174102 (2002)CrossRefGoogle Scholar
  15. 15.
    Yin, Q., Wang, C.H.: A new chaotic image encryption scheme using breadth-first search and dynamic diffusion. Int. J. Bifurcat. Chaos. 28, 1850047 (2018)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Electronic Engineering College of Heilongjiang UniversityHarbinChina

Personalised recommendations