Skip to main content
Log in

Image transfer with secure communications application using a new reversible chaotic image encryption

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this study, encrypted image transmission was carried out with a secure communication application using reversible chaotic image encryption with the synchronization of two identical chaotic systems. Encryption and decryption of the image can be done with the same algorithm using the same chaotic signal. The image can be encrypted using the same chaotic signal on the sending side and decoded with the encryption algorithm and chaotic signal on the receiving side. Experimental results show that the proposed encryption algorithm can securely encrypt and transfer images in 24-bit RGB and 8-bit grayscale images. In the study, histogram, histogram variance, salt & pepper, speckle, NPCR and UACI, four classical types of attacks, NIST, key sensitive and crop visual and statistical attacks were made on encrypted images and the robustness of the encryption method was tested. In addition, PSNR, SSIM, UIQ, BER and NCC image quality criteria were used and the results of attacks on chaotic encrypted images were measured. As a result of visual and statistical attacks, it has been seen that the proposed chaotic encryption algorithm is resistant to attacks. The NPCR and UACI analysis results of the proposed method were compared with the results of similar studies in the literature. According to similar chaotic image coding studies in the literature, the NPCR and UACI values of the proposed method gave better results than most. As a result of the tests, with the secure communication application of the proposed method, image encryption and decryption can be performed by using a common chaotic signal on the sender and receiver sides.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

Data availability

No data were used to support this study.

Code availability

The codes used in this article were written by the authors and can be used on demand.

References

  1. Babu NR, Kalpana M, Balasubramaniam P (2021) A novel audio encryption approach via finite-time synchronization of fractional order hyperchaotic system. Multimed Tools Appl 80:18043–18067. https://doi.org/10.1007/s11042-020-10288-8

    Article  Google Scholar 

  2. Cheng C, Bin, Cheng CJ (2012) Robust synchronization of chaotic systems subject to noise and its application to secure communication. Proceedings – 2012 4th International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN. https://doi.org/10.1109/CICSyN.2012.46

  3. Durdu A, Özcerit AT, Uyaroğlu Y (2015) A novel chaotic system for secure communication applications. Inform Technol Control 44(3):271–278. https://doi.org/10.5755/j01.itc.44.3.7720

    Article  Google Scholar 

  4. Findik O, Kahramanli Ş (2010) Using chaotic system in encryption. In: Papasratorn B, Lavangnananda K, Chutimaskul W, Vanijja V (eds) Advances in Information Technology. IAIT 2010. Communications in computer and information science, vol 114. Springer, Berlin. https://doi.org/10.1007/978-3-642-16699-0_4

    Chapter  Google Scholar 

  5. Hamadi IA, Jamal RK, Mousa SK (2022) Image encryption based on computer generated hologram and Rossler chaotic system. Opt Quant Electron 54:33. https://doi.org/10.1007/s11082-021-03406-9

    Article  Google Scholar 

  6. Hasimoto-Beltran R (2007) Low-complexity chaotic encryption system. Rev Mex Fis 53(1):58–65

    Google Scholar 

  7. Hore A, Ziou D (2010) Image quality, metrics PSNR vs. SSIM. 20th international conference on pattern recognition, Istanbul, Turkey, 2366–2369, August 23–26. https://doi.org/10.1109/ICPR.2010.579

  8. Huang L, Feng R, Wang M (2004) Synchronization of chaotic systems via nonlinear control. Phys Lett Sect A Gen At Solid State Phys. https://doi.org/10.1016/j.physleta.2003.11.027

    Article  Google Scholar 

  9. Jamil T (1999) Steganography: the art of hiding information in plain sight. Potentials IEEE 18(1):10–12

    Article  Google Scholar 

  10. Kumar M, Powduri P, Reddy A (2015) An RGB image encryption using diffusion process associated with chaotic map. J Inf Secur Appl 21:20–30. https://doi.org/10.1016/j.jisa.2014.11.003

    Article  Google Scholar 

  11. Kumar M, Sathish G, Alphonse M, Lahcen RAM (2019) A new RGB image encryption using generalized heat equation associated with generalized Vigen è re-type table over symmetric group. Multimed Tools Appl 78:28025–28061. https://doi.org/10.1007/s11042-019-07893-7

    Article  Google Scholar 

  12. Kumar M, Saxena A, Vuppala SS (2020) A Survey on Chaos based image encryption techniques. In: Hosny K (ed) Multimedia Security using chaotic maps: principles and methodologies. Studies in computational intelligence, vol 884. Springer, Cham. https://doi.org/10.1007/978-3-030-38700-6_1

    Chapter  Google Scholar 

  13. Lan R, He J, Wang S, Gu T, Luo X (2018) Integrated chaotic systems for image encryption. Sig Process 147:133–145. https://doi.org/10.1016/j.sigpro.2018.01.026

    Article  Google Scholar 

  14. Li W, Zhang Q, Ding Q (2015) Digital encryption method based on lorenz continuous chaotic system. 2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC), pp 262–266. https://doi.org/10.1109/IMCCC.2015.62

  15. Li C, Luo G, Qin K et al (2017) An image encryption scheme based on chaotic tent map. Nonlinear Dyn 87:127–133. https://doi.org/10.1007/s11071-016-3030-8

    Article  Google Scholar 

  16. Li C, Luo G, Qin K, Li C (2017) Chaotic image encryption schemes: a review. In: Proceedings of the 2017 2nd International Conference on Electrical, Automation and Mechanical Engineering (EAME 2017). Atlantis Press, pp 261–263. https://doi.org/10.2991/eame-17.2017.61

  17. Liao X, Yin J, Chen M, Qin Z (2022) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Trans Dependable Secur Comput 19(2):897–911. https://doi.org/10.1109/TDSC.2020.3004708

    Article  Google Scholar 

  18. Liao TL, Lin SH (1999) Adaptive control and synchronization of Lorenz systems. J Frankl Inst 336:925

    Article  MathSciNet  Google Scholar 

  19. Liao X, Li K, Zhu X, Liu KJR (2020) Robust detection of Image Operator Chain with Two-Stream Convolutional neural network. IEEE J Selec Topics Signal Process 14(5):955–968. https://doi.org/10.1109/JSTSP.2020.3002391

    Article  Google Scholar 

  20. Liao X, Yu Y, Li B, Li Z, Qin Z (2020) A new payload partition strategy in color image steganography. IEEE Trans Circuits Syst Video Technol 30(3):685–696. https://doi.org/10.1109/TCSVT.2019.2896270

    Article  Google Scholar 

  21. Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284:3895–3903. https://doi.org/10.1016/J.OPTCOM.2011.04.001

    Article  Google Scholar 

  22. Liu H, Wang X, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12:1457–1466. https://doi.org/10.1016/J.ASOC.2012.01.016

    Article  Google Scholar 

  23. Matlab Code. https://drive.google.com/file/d/11p4axhfV9w7KQ9cjepfEmqT4D2IxPXCi/view?usp=sharing

  24. Park JH (2005) Chaos synchronization of a chaotic system via nonlinear control. Chaos Solitons Fractals 25:57984

    Google Scholar 

  25. Pecora LM, Carroll TL (1990) Synchronization in chaotic systems. Phys Rev Lett 64:821–824. https://doi.org/10.1103/PhysRevLett.64.821

    Article  MathSciNet  Google Scholar 

  26. Pecora LM, Carroll TL (1991) Driving systems with chaotic signals. Phys Rev A 44(4):2374–2383. https://doi.org/10.1103/PhysRevA.44.2374

    Article  Google Scholar 

  27. Pehlivan İ, Uyaroğlu Y, Yalçın MA, Ferikoğlu A (2007) Sprott_94_A Kaotik Sisteminin Senkronizasyonu ve Bilgi Gizlemede Kullanılması. Information security and cryptology conference with international participation

  28. Proakis JG, Salehi M (2007) Digital communications. McGraw-Hill Education, New York

    Google Scholar 

  29. Qobbi Y, Jarjar A, Essaid M et al (2022) Image encryption algorithm based on genetic operations and chaotic DNA encoding. Soft Comput. https://doi.org/10.1007/s00500-021-06567-7

    Article  Google Scholar 

  30. Sun FY, Liu ST, Lü ZW (2007) Image encryption using high-dimension chaotic system. Chin Phys 16:3616–3623. https://doi.org/10.1088/1009-1963/16/12/011

    Article  Google Scholar 

  31. Uçar A, Lonngren KE, Bai EW (2006) Synchronization of the unified chaotic systems via active control. Chaos Solitons Fractals 27:12927

    Article  Google Scholar 

  32. Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Process Lett 9(3):81–84. https://doi.org/10.1109/TIP.2003.819861

    Article  Google Scholar 

  33. Wang F, Liu C (2007) Synchronization of unified chaotic system based on passive control. Phys D 225:55–60

    Article  MathSciNet  Google Scholar 

  34. Wang X, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a boolean network. Inf Sci (Ny) 539:195–214. https://doi.org/10.1016/J.INS.2020.06.030

    Article  MathSciNet  Google Scholar 

  35. Wang X, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci (Ny) 507:16–36. https://doi.org/10.1016/J.INS.2019.08.041

    Article  MathSciNet  Google Scholar 

  36. Wang X, Yang J (2021) A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient. Inf Sci (Ny) 569:217–240. https://doi.org/10.1016/J.INS.2021.04.013

    Article  MathSciNet  Google Scholar 

  37. Wang X, Zhang M (2021) An image encryption algorithm based on new chaos and diffusion values of a truth table. Inf Sci (Ny) 579:128–149. https://doi.org/10.1016/j.ins.2021.07.096

    Article  MathSciNet  Google Scholar 

  38. Wang X, Liu PA (2022) New full Chaos coupled Mapping Lattice and its application in privacy image encryption. IEEE Trans Circuits Syst 69:1291–1301. https://doi.org/10.1109/TCSI.2021.3133318

    Article  Google Scholar 

  39. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  40. Wang XY, Yang L, Liu R et al (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62:615–621. https://doi.org/10.1007/s11071-010-9749-8

    Article  Google Scholar 

  41. Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Sig Process 92:1101–1108. https://doi.org/10.1016/j.sigpro.2011.10.023

    Article  Google Scholar 

  42. Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61. https://doi.org/10.1016/j.optlaseng.2015.03.022

    Article  Google Scholar 

  43. Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18. https://doi.org/10.1016/j.optlaseng.2014.08.005

    Article  Google Scholar 

  44. Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci (Ny) 486:340–358. https://doi.org/10.1016/J.INS.2019.02.049

    Article  Google Scholar 

  45. Wang X, Liu C, Jiang D (2021) A novel triple-image encryption and hiding algorithm based on chaos, compressive sensingand 3D DCT. Inf Sci (Ny) 574:505–527. https://doi.org/10.1016/J.INS.2021.06.032

    Article  Google Scholar 

  46. Xian Y, Wang X (2021) Fractal sorting matrix and its application on chaotic image encryption. Inf Sci (Ny) 547:1154–1169. https://doi.org/10.1016/J.INS.2020.09.055

    Article  MathSciNet  Google Scholar 

  47. Xian Y, Wang X, Teng L (2021) Double parameters Fractal sorting Matrix and its application in image encryption. IEEE Trans Circuits Syst Video Technol. https://doi.org/10.1109/TCSVT.2021.3108767

    Article  Google Scholar 

  48. Xiao HP, Zhang GJ (2006) An image encryption scheme based on chaotic systems. 5th International Conference on Machine Learning and Cybernetics, Dalian, Peoples R, China

  49. Yang CY, Wang WF (2015) Block-based colour image steganography using smart pixel-adjustment. Adv Intell Syst Comput 329:145–154. https://doi.org/10.1007/978-3-319-12286-1_15

    Article  Google Scholar 

  50. Yassen MT (2003) Chaos synchronization between two different chaotic systems using active control. Chaos Solitons Fractals 15:27183

    Google Scholar 

  51. Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf Sci (Ny) 273:329–351. https://doi.org/10.1016/j.ins.2014.02.156

    Article  Google Scholar 

  52. Zhang YQ, Wang XY (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10–20. https://doi.org/10.1016/j.asoc.2014.09.039

    Article  Google Scholar 

  53. Zhao M, Tong X (2010) A multiple chaotic encryption scheme for image. 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), pp 1–4. https://doi.org/10.1109/WICOM.2010.5601297

Download references

Author information

Authors and Affiliations

Authors

Contributions

Ali DURDU: Corresponding author and undertakes more than 80% of the article.

Corresponding author

Correspondence to Ali Durdu.

Ethics declarations

Conflicts of interest/Competing interests

There are no conflicts of interest regarding the publication of this paper.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Durdu, A. Image transfer with secure communications application using a new reversible chaotic image encryption. Multimed Tools Appl 83, 3397–3424 (2024). https://doi.org/10.1007/s11042-023-15707-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15707-0

Keywords

Navigation