Abstract
In this study, encrypted image transmission was carried out with a secure communication application using reversible chaotic image encryption with the synchronization of two identical chaotic systems. Encryption and decryption of the image can be done with the same algorithm using the same chaotic signal. The image can be encrypted using the same chaotic signal on the sending side and decoded with the encryption algorithm and chaotic signal on the receiving side. Experimental results show that the proposed encryption algorithm can securely encrypt and transfer images in 24-bit RGB and 8-bit grayscale images. In the study, histogram, histogram variance, salt & pepper, speckle, NPCR and UACI, four classical types of attacks, NIST, key sensitive and crop visual and statistical attacks were made on encrypted images and the robustness of the encryption method was tested. In addition, PSNR, SSIM, UIQ, BER and NCC image quality criteria were used and the results of attacks on chaotic encrypted images were measured. As a result of visual and statistical attacks, it has been seen that the proposed chaotic encryption algorithm is resistant to attacks. The NPCR and UACI analysis results of the proposed method were compared with the results of similar studies in the literature. According to similar chaotic image coding studies in the literature, the NPCR and UACI values of the proposed method gave better results than most. As a result of the tests, with the secure communication application of the proposed method, image encryption and decryption can be performed by using a common chaotic signal on the sender and receiver sides.
Similar content being viewed by others
Data availability
No data were used to support this study.
Code availability
The codes used in this article were written by the authors and can be used on demand.
References
Babu NR, Kalpana M, Balasubramaniam P (2021) A novel audio encryption approach via finite-time synchronization of fractional order hyperchaotic system. Multimed Tools Appl 80:18043–18067. https://doi.org/10.1007/s11042-020-10288-8
Cheng C, Bin, Cheng CJ (2012) Robust synchronization of chaotic systems subject to noise and its application to secure communication. Proceedings – 2012 4th International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN. https://doi.org/10.1109/CICSyN.2012.46
Durdu A, Özcerit AT, Uyaroğlu Y (2015) A novel chaotic system for secure communication applications. Inform Technol Control 44(3):271–278. https://doi.org/10.5755/j01.itc.44.3.7720
Findik O, Kahramanli Ş (2010) Using chaotic system in encryption. In: Papasratorn B, Lavangnananda K, Chutimaskul W, Vanijja V (eds) Advances in Information Technology. IAIT 2010. Communications in computer and information science, vol 114. Springer, Berlin. https://doi.org/10.1007/978-3-642-16699-0_4
Hamadi IA, Jamal RK, Mousa SK (2022) Image encryption based on computer generated hologram and Rossler chaotic system. Opt Quant Electron 54:33. https://doi.org/10.1007/s11082-021-03406-9
Hasimoto-Beltran R (2007) Low-complexity chaotic encryption system. Rev Mex Fis 53(1):58–65
Hore A, Ziou D (2010) Image quality, metrics PSNR vs. SSIM. 20th international conference on pattern recognition, Istanbul, Turkey, 2366–2369, August 23–26. https://doi.org/10.1109/ICPR.2010.579
Huang L, Feng R, Wang M (2004) Synchronization of chaotic systems via nonlinear control. Phys Lett Sect A Gen At Solid State Phys. https://doi.org/10.1016/j.physleta.2003.11.027
Jamil T (1999) Steganography: the art of hiding information in plain sight. Potentials IEEE 18(1):10–12
Kumar M, Powduri P, Reddy A (2015) An RGB image encryption using diffusion process associated with chaotic map. J Inf Secur Appl 21:20–30. https://doi.org/10.1016/j.jisa.2014.11.003
Kumar M, Sathish G, Alphonse M, Lahcen RAM (2019) A new RGB image encryption using generalized heat equation associated with generalized Vigen è re-type table over symmetric group. Multimed Tools Appl 78:28025–28061. https://doi.org/10.1007/s11042-019-07893-7
Kumar M, Saxena A, Vuppala SS (2020) A Survey on Chaos based image encryption techniques. In: Hosny K (ed) Multimedia Security using chaotic maps: principles and methodologies. Studies in computational intelligence, vol 884. Springer, Cham. https://doi.org/10.1007/978-3-030-38700-6_1
Lan R, He J, Wang S, Gu T, Luo X (2018) Integrated chaotic systems for image encryption. Sig Process 147:133–145. https://doi.org/10.1016/j.sigpro.2018.01.026
Li W, Zhang Q, Ding Q (2015) Digital encryption method based on lorenz continuous chaotic system. 2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC), pp 262–266. https://doi.org/10.1109/IMCCC.2015.62
Li C, Luo G, Qin K et al (2017) An image encryption scheme based on chaotic tent map. Nonlinear Dyn 87:127–133. https://doi.org/10.1007/s11071-016-3030-8
Li C, Luo G, Qin K, Li C (2017) Chaotic image encryption schemes: a review. In: Proceedings of the 2017 2nd International Conference on Electrical, Automation and Mechanical Engineering (EAME 2017). Atlantis Press, pp 261–263. https://doi.org/10.2991/eame-17.2017.61
Liao X, Yin J, Chen M, Qin Z (2022) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Trans Dependable Secur Comput 19(2):897–911. https://doi.org/10.1109/TDSC.2020.3004708
Liao TL, Lin SH (1999) Adaptive control and synchronization of Lorenz systems. J Frankl Inst 336:925
Liao X, Li K, Zhu X, Liu KJR (2020) Robust detection of Image Operator Chain with Two-Stream Convolutional neural network. IEEE J Selec Topics Signal Process 14(5):955–968. https://doi.org/10.1109/JSTSP.2020.3002391
Liao X, Yu Y, Li B, Li Z, Qin Z (2020) A new payload partition strategy in color image steganography. IEEE Trans Circuits Syst Video Technol 30(3):685–696. https://doi.org/10.1109/TCSVT.2019.2896270
Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284:3895–3903. https://doi.org/10.1016/J.OPTCOM.2011.04.001
Liu H, Wang X, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12:1457–1466. https://doi.org/10.1016/J.ASOC.2012.01.016
Matlab Code. https://drive.google.com/file/d/11p4axhfV9w7KQ9cjepfEmqT4D2IxPXCi/view?usp=sharing
Park JH (2005) Chaos synchronization of a chaotic system via nonlinear control. Chaos Solitons Fractals 25:57984
Pecora LM, Carroll TL (1990) Synchronization in chaotic systems. Phys Rev Lett 64:821–824. https://doi.org/10.1103/PhysRevLett.64.821
Pecora LM, Carroll TL (1991) Driving systems with chaotic signals. Phys Rev A 44(4):2374–2383. https://doi.org/10.1103/PhysRevA.44.2374
Pehlivan İ, Uyaroğlu Y, Yalçın MA, Ferikoğlu A (2007) Sprott_94_A Kaotik Sisteminin Senkronizasyonu ve Bilgi Gizlemede Kullanılması. Information security and cryptology conference with international participation
Proakis JG, Salehi M (2007) Digital communications. McGraw-Hill Education, New York
Qobbi Y, Jarjar A, Essaid M et al (2022) Image encryption algorithm based on genetic operations and chaotic DNA encoding. Soft Comput. https://doi.org/10.1007/s00500-021-06567-7
Sun FY, Liu ST, Lü ZW (2007) Image encryption using high-dimension chaotic system. Chin Phys 16:3616–3623. https://doi.org/10.1088/1009-1963/16/12/011
Uçar A, Lonngren KE, Bai EW (2006) Synchronization of the unified chaotic systems via active control. Chaos Solitons Fractals 27:12927
Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Process Lett 9(3):81–84. https://doi.org/10.1109/TIP.2003.819861
Wang F, Liu C (2007) Synchronization of unified chaotic system based on passive control. Phys D 225:55–60
Wang X, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a boolean network. Inf Sci (Ny) 539:195–214. https://doi.org/10.1016/J.INS.2020.06.030
Wang X, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci (Ny) 507:16–36. https://doi.org/10.1016/J.INS.2019.08.041
Wang X, Yang J (2021) A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient. Inf Sci (Ny) 569:217–240. https://doi.org/10.1016/J.INS.2021.04.013
Wang X, Zhang M (2021) An image encryption algorithm based on new chaos and diffusion values of a truth table. Inf Sci (Ny) 579:128–149. https://doi.org/10.1016/j.ins.2021.07.096
Wang X, Liu PA (2022) New full Chaos coupled Mapping Lattice and its application in privacy image encryption. IEEE Trans Circuits Syst 69:1291–1301. https://doi.org/10.1109/TCSI.2021.3133318
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612
Wang XY, Yang L, Liu R et al (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62:615–621. https://doi.org/10.1007/s11071-010-9749-8
Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Sig Process 92:1101–1108. https://doi.org/10.1016/j.sigpro.2011.10.023
Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61. https://doi.org/10.1016/j.optlaseng.2015.03.022
Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18. https://doi.org/10.1016/j.optlaseng.2014.08.005
Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci (Ny) 486:340–358. https://doi.org/10.1016/J.INS.2019.02.049
Wang X, Liu C, Jiang D (2021) A novel triple-image encryption and hiding algorithm based on chaos, compressive sensingand 3D DCT. Inf Sci (Ny) 574:505–527. https://doi.org/10.1016/J.INS.2021.06.032
Xian Y, Wang X (2021) Fractal sorting matrix and its application on chaotic image encryption. Inf Sci (Ny) 547:1154–1169. https://doi.org/10.1016/J.INS.2020.09.055
Xian Y, Wang X, Teng L (2021) Double parameters Fractal sorting Matrix and its application in image encryption. IEEE Trans Circuits Syst Video Technol. https://doi.org/10.1109/TCSVT.2021.3108767
Xiao HP, Zhang GJ (2006) An image encryption scheme based on chaotic systems. 5th International Conference on Machine Learning and Cybernetics, Dalian, Peoples R, China
Yang CY, Wang WF (2015) Block-based colour image steganography using smart pixel-adjustment. Adv Intell Syst Comput 329:145–154. https://doi.org/10.1007/978-3-319-12286-1_15
Yassen MT (2003) Chaos synchronization between two different chaotic systems using active control. Chaos Solitons Fractals 15:27183
Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf Sci (Ny) 273:329–351. https://doi.org/10.1016/j.ins.2014.02.156
Zhang YQ, Wang XY (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10–20. https://doi.org/10.1016/j.asoc.2014.09.039
Zhao M, Tong X (2010) A multiple chaotic encryption scheme for image. 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), pp 1–4. https://doi.org/10.1109/WICOM.2010.5601297
Author information
Authors and Affiliations
Contributions
Ali DURDU: Corresponding author and undertakes more than 80% of the article.
Corresponding author
Ethics declarations
Conflicts of interest/Competing interests
There are no conflicts of interest regarding the publication of this paper.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Durdu, A. Image transfer with secure communications application using a new reversible chaotic image encryption. Multimed Tools Appl 83, 3397–3424 (2024). https://doi.org/10.1007/s11042-023-15707-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15707-0