Skip to main content
Log in

Image encryption based on roulette cascaded chaotic system and alienated image library

  • Original article
  • Published:
The Visual Computer Aims and scope Submit manuscript

Abstract

This paper proposes an image encryption algorithm based on roulette jump selection chaotic system and alienated image library transformation. The algorithm obtains the fitness of each system from the plain image. Run the roulette algorithm to choose different chaotic systems according to their fitness, and the roulette algorithm is also used for parameter control, thus effectively reduces the dynamic degradation of chaotic systems. This paper first proposes an alienated image library transformation, which operates the plain image and multiple images in the agreed image library, thereby greatly improving the security of encryption. In the scrambling diffusion, synchronous scrambling diffusion is used. The pseudo-random sequence is sorted as a row and column index, and the image is synchronously scrambled and diffused by a pair of row and column mapping arrays. Through the experimental results and security analysis, the algorithm has very good security and can resist various attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Tsafack, N., Sankar, S., Abd-El-Atty, B., et al.: A new chaotic map with dynamic analysis and encryption application in Internet of Health Things. IEEE Access. 8, 137731–137744 (2020)

    Article  Google Scholar 

  2. Li, G.D.: Double chaotic image encryption algorithm based on optimal sequence solution and fractional transform. Vis. Comput. 35(9), 1267–1277 (2019)

    Article  Google Scholar 

  3. Abd-EL-Latif, A.A., Abd-El-Atty, B., Venegas-Andraca, S.E.: Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption. Phys. A: Stat. Mech. Appl. 547, 123869 (2020)

    Article  MathSciNet  Google Scholar 

  4. Tsafack, N., Kengne, J., Abd-El-Atty, B., et al.: Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption. Inf. Sci. 515, 191–217 (2020)

    Article  Google Scholar 

  5. Abd-El-Latif, A.A., Abd-El-Atty, B., Mazurczyk, W., et al.: Secure data encryption based on quantum walks for 5G Internet of Things scenario. IEEE Trans. Netw. Serv. Manage. 17(1), 118–131 (2020)

    Article  Google Scholar 

  6. Sambas, A., Vaidyanathan, S., Tlelo-Cuautle, E., et al.: A 3-D multi-stable system with a peanut-shaped equilibrium curve: circuit design, FPGA realization, and an application to image encryption. IEEE Access. 8, 137116–137132 (2020)

    Article  Google Scholar 

  7. Belazi, A., Abd-El-Latif, A.A., Diaconu, A.V., et al.: Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt. Lasers Eng. 88, 37–50 (2017)

    Article  Google Scholar 

  8. Abd-El-Atty, B., Abd-El-Latif, A.A., Venegas-Andraca, S.E.: An encryption protocol for NEQR images based on one-particle quantum walks on a circle. Quantum Inf. Process. 18(9), 272 (2019)

    Article  Google Scholar 

  9. Xian, Y.J., Wang, X.Y.: Fractal sorting matrix and its application on chaotic image encryption. Inf. Sci. 547, 1154–1169 (2021)

    Article  MathSciNet  Google Scholar 

  10. Enayatifar, R., Abdullah, A.H., Isnin, I.F.: Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt. Lasers Eng. 56, 83–93 (2014)

    Article  Google Scholar 

  11. Mansouri, A., Wang, X.: Image encryption using shuffled Arnold map and multiple values manipulations. Vis. Comput. (2020). https://doi.org/10.1007/s00371-020-01791-y

    Article  Google Scholar 

  12. Li, S., Chen, G., Mou, X.: On the dynamical degradation of digital piecewise linear chaotic maps. Int. J. Bifurcation Chaos 15(10), 3119–3151 (2005)

    Article  MathSciNet  Google Scholar 

  13. Talhaoui, M.Z., Wang, X., Midoun, M.A.: A new one-dimensional cosine polynomial chaotic map and its use in image encryption. Vis. Comput. (2020). https://doi.org/10.1007/s00371-020-01822-8

    Article  Google Scholar 

  14. Chen, X., Hu, C.J.: Adaptive medical image encryption algorithm based on multiple chaotic mapping. Saudi J. Biol. Sci. 24(8), 1821–1827 (2017)

    Article  Google Scholar 

  15. Cao, G., Wang, X.: Image encryption based on the combination of roulette wheel selection with linear congruence pixel transformation. Multimed. Tools Appl. 78(8), 10625–10647 (2019)

    Article  Google Scholar 

  16. Weber, A. G.: The USC-SIPI image database version 5. USC-SIPI Report. 315(1) (1997)

  17. Wang, X., Feng, L., Zhao, H.: Fast image encryption algorithm based on parallel computing system. Inf. Sci. 486, 340–358 (2019)

    Article  Google Scholar 

  18. Lipowski, A., Lipowska, D.: Roulette-wheel selection via stochastic acceptance. Phys. A 391(6), 2193–2196 (2012)

    Article  Google Scholar 

  19. Wang, X.Y., Gao, S.: Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inf. Sci. 539, 195–214 (2020)

    Article  MathSciNet  Google Scholar 

  20. Wang, X., Gao, S.: Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf. Sci. 507, 16–36 (2020)

    Article  MathSciNet  Google Scholar 

  21. Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24(9), 926–934 (2006)

    Article  Google Scholar 

  22. Bisht, A., Dua, M., Dua, S.: A novel approach to encrypt multiple images using multiple chaotic maps and chaotic discrete fractional random transform. J. Ambient Intell. Human. Comput. 10(9), 3519–3531 (2019)

    Article  Google Scholar 

  23. Abd-El-Latif, A.A., Li, L., Wang, N., et al.: A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Process. 93(11), 2986–3000 (2013)

    Article  Google Scholar 

  24. Abd-El-Latif, A.A., Abd-El-Atty, B., Talha, M.: Robust encryption of quantum medical images. IEEE Access. 6, 1073–1081 (2017)

    Article  Google Scholar 

  25. Zhang, Y., Tang, Y.: A plaintext-related image encryption algorithm based on chaos. Multimed. Tools Appl. 77(6), 6647–6669 (2018)

    Article  Google Scholar 

  26. Song, X.H., Wang, H.Q., Venegas-Andraca, S.E., et al.: Quantum video encryption based on qubit-planes controlled-XOR operations and improved logistic map. Phys. A: Stat. Mech. Appl. 537, 122660 (2020)

    Article  MathSciNet  Google Scholar 

  27. Chai, X.: An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multimed. Tools Appl. 76(1), 1159–1175 (2017)

    Article  Google Scholar 

  28. Zhang, Y.: The image encryption algorithm based on chaos and DNA computing. Multimed. Tools Appl. 77(16), 21589–21615 (2018)

    Article  Google Scholar 

  29. Chai, X., Chen, Y., Broyde, L.: A novel chaos-based image encryption algorithm using DNA sequence operations. Opt. Lasers Eng. 88, 197–213 (2017)

    Article  Google Scholar 

  30. Benrhouma, O., Hermassi, H., Abd-El-Latif, A.A., et al.: Cryptanalysis of a video encryption method based on mixing and permutation operations in the DCT domain. SIViP 9(6), 1281–1286 (2015)

    Article  Google Scholar 

  31. Bechikh, R., Hermassi, H., Abd-El-Latif, A.A., et al.: Breaking an image encryption scheme based on a spatiotemporal chaotic system. Signal Process. Image Commun. 39, 151–158 (2015)

    Article  Google Scholar 

  32. Enayatifar, R., Guimarães, F.G., Siarry, P.: Index-based permutation-diffusion in multiple-image encryption using DNA sequence. Opt. Lasers Eng. 115, 131–140 (2019)

    Article  Google Scholar 

  33. Alawida, M., Samsudin, A., Teh, J.S., Alkhawaldeh, R.S.: A new hybrid digital chaotic system with applications in image encryption. Signal Process. 160, 45–58 (2019)

    Article  Google Scholar 

  34. Belazi, A., Khan, M., Abd-El-Latif, A.A., et al.: Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption. Nonlinear Dyn. 87(1), 337–361 (2017)

    Article  Google Scholar 

  35. Zhang, T., El-Fatyany, A., Li, L., et al.: Secret sharing-based chaotic image encryption. Int. J. Security Appl. 9(7), 217–224 (2015)

    Google Scholar 

  36. Talhaoui, M.Z., Wang, X., Talhaoui, A.: A new one-dimensional chaotic map and its application in a novel permutation-less image encryption scheme. Vis. Comput. (2020). https://doi.org/10.1007/s00371-020-01936-z

    Article  Google Scholar 

  37. Aslam, M.N., Belazi, A., Kharbech, S., Talha, M., Xiang, W.: Fourth order MCA and chaos-based image encryption scheme. IEEE Access. 7, 66395–66409 (2019)

    Article  Google Scholar 

Download references

Acknowledgement

This research is supported by the National Natural Science Foundation of China (No: 61672124), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (No: MMJJ20170203), Liaoning Province Science and Technology Innovation Leading Talents Program Project (No: XLYC1802013), Key R&D Projects of Liaoning Province (No: 2019020105-JH2/103), Jinan City ‘20 universities’ Funding Projects Introducing Innovation Team Program (No: 2019GXRC031).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Xingyuan Wang or Pengbo Liu.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, X., Liu, P. Image encryption based on roulette cascaded chaotic system and alienated image library. Vis Comput 38, 763–779 (2022). https://doi.org/10.1007/s00371-020-02048-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00371-020-02048-4

Keywords

Navigation