Skip to main content
Log in

Quantum logistic image encryption algorithm based on SHA-3 and RSA

  • Original paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

This study proposes a quantum logistic image encryption algorithm based on the Rivest–Shamir–Adleman (RSA) and secure hash (SHA-3) algorithms. First, the asymmetric encryption algorithm RSA is used to randomly generate key pairs with private key and public key. A fixed matrix is then produced to confuse the plain image by additive modular operation and get preprocessed image. Second, the preprocessed image is computed by the hash function SHA-3 to obtain the plain message that is then stored secretly. Using RSA algorithm, the cipher message can be obtained corresponding to the plain message. After combining both the plain and cipher messages, the initial conditions of the quantum logistic map are calculated using a new mathematical model. Random keystream can then be generated from the quantum logistic map. Third, the keystream is further employed to cyclically confuse row and column pixels in the preprocessed image with different directions. Then, diffusion operations to odd row and odd column are carried out followed by even row and column, respectively. Finally, the cipher image can be reconstructed by both inverse cyclic confusion and inverse diffusion to each row and column. The test results show that the algorithm has strong plaintext sensitivity and key sensitivity as well as an enhanced ability to resist various cryptographic attacks. Therefore, the proposed algorithm is suitable for secure communication of network image in conjunction with a public cryptosystem.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Wang, R., Deng, G., Duan, X.: An image encryption scheme based on double chaotic cyclic shift and Josephus problem. J. Inf. Secur. Appl. 58, 102699 (2021). https://doi.org/10.1016/j.jisa.2020.102699

    Article  Google Scholar 

  2. Luo, Y., Tang, S., Liu, J., Cao, L., Qiu, S.: Image encryption scheme by combining the hyper-chaotic system with quantum coding. Opt. Laser Eng. 124, 105836 (2020). https://doi.org/10.1016/j.optlaseng.2019.105836

    Article  Google Scholar 

  3. Liao, X., Li, K., Yin, J.: Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed. Tools Appl. 76, 20739–20753 (2017). https://doi.org/10.1007/s11042-016-3971-4

    Article  Google Scholar 

  4. Brahim, A.H., Pacha, A.A., Said, N.H.: Image encryption based on compressive sensing and chaos systems. Opt. Laser Technol. 132, 106489 (2020). https://doi.org/10.1016/j.optlastec.2020.106489

    Article  Google Scholar 

  5. Musanna, F., Kumar, S.: A novel image encryption algorithm using chaotic compressive sensing and nonlinear exponential function. J. Inf. Secur. Appl. 54, 102560 (2020). https://doi.org/10.1016/j.jisa.2020.102560

    Article  Google Scholar 

  6. Wei, D., Jiang, M.: A fast image encryption algorithm based on parallel compressive sensing and DNA sequence. Optik 238, 166748 (2021). https://doi.org/10.1016/j.ijleo.2021.166748

    Article  Google Scholar 

  7. Ye, G., Pan, C., Dong, Y., Shi, Y., Huang, X.: Image encryption and hiding algorithm based on compressive sensing and random numbers insertion. Signal Process. 172, 107563 (2020). https://doi.org/10.1016/j.sigpro.2020.107563

    Article  Google Scholar 

  8. Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcat. Chaos 8, 1259–1284 (1998). https://doi.org/10.1142/S021812749800098X

    Article  MathSciNet  MATH  Google Scholar 

  9. Albahrani, E.A., Maryoosh, A.A., Lafta, S.H.: Block image encryption based on modified playfair and chaotic system. J. Inf. Secur. Appl. 51, 102445 (2020). https://doi.org/10.1016/j.jisa.2019.102445

    Article  Google Scholar 

  10. Alawida, M., Samsudin, A., Teh, J.S., Alkhawaldeh, R.S.: A new hybrid digital chaotic system with applications in image encryption. Signal Process. 160, 45–58 (2019). https://doi.org/10.1016/j.sigpro.2019.02.016

    Article  Google Scholar 

  11. Vidhya, R., Brindha, M., Gounden, N.A.: A secure image encryption algorithm based on a parametric switching chaotic system. Chinese J. Phys. 62, 26–42 (2019). https://doi.org/10.1016/j.cjph.2019.09.011

    Article  MathSciNet  Google Scholar 

  12. Ye, G., Pan, C., Dong, Y., Jiao, K., Huang, X.: A novel multi-image visually meaningful encryption algorithm based on compressive sensing and Schur decomposition. T. Emerg. Telecommun. T. (2020). https://doi.org/10.1002/ett.4071

    Article  Google Scholar 

  13. Niyat, A.Y., Moattar, M.H., Torshiz, M.N.: Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt. Laser Eng. 90, 225–237 (2017). https://doi.org/10.1016/j.optlaseng.2016.10.019

    Article  Google Scholar 

  14. Babaei, A., Motameni, H., Enayatifar, R.: A new permutation- diffusion-based image encryption technique using cellular automata and DNA sequence. Optik 203, 164000 (2020). https://doi.org/10.1016/j.ijleo.2019.164000

    Article  Google Scholar 

  15. Ping, P., Wu, J., Mao, Y., Xu, F., Fan, J.: Design of image cipher using Life-like cellular automata and chaotic map. Signal Process. 150, 233–247 (2018). https://doi.org/10.1016/j.sigpro.2018.04.018

    Article  Google Scholar 

  16. Chen, J., Zhu, Z., Zhang, L., Zhang, Y., Yang, B.: Exploiting self-adaptive permutation–diffusion and DNA random encoding for secure and efficient image encryption. Signal Process. 142, 340–353 (2018). https://doi.org/10.1016/j.sigpro.2017.07.034

    Article  Google Scholar 

  17. Liu, L., Zhang, Q., Wei, X.: A RGB image encryption algorithm based on DNA encoding and chaos map. Comput. Electr. Eng. 38, 1240–1248 (2012). https://doi.org/10.1016/j.compeleceng.2012.02.007

    Article  Google Scholar 

  18. Chen, J., Chen, L., Zhou, Y.: Cryptanalysis of a DNA-based image encryption scheme. Inf. Sci. 520, 130–141 (2020). https://doi.org/10.1016/j.ins.2020.02.024

    Article  MathSciNet  MATH  Google Scholar 

  19. Patro, K.A., Acharya, B.: An efficient colour image encryption scheme based on 1-D chaotic maps. J. Inf. Secur. Appl. 46, 23–41 (2019). https://doi.org/10.1016/j.jisa.2019.02.006

    Article  Google Scholar 

  20. Wang, X., Yang, J.: A novel image encryption scheme of dynamic S-boxes and random blocks based on spatiotemporal chaotic system. Optik 217, 164884 (2020). https://doi.org/10.1016/j.ijleo.2020.164884

    Article  Google Scholar 

  21. Hu, G., Li, B.: Coupling chaotic system based on unit transform and its applications in image encryption. Signal Process. 178, 107790 (2020). https://doi.org/10.1016/j.sigpro.2020.107790

    Article  Google Scholar 

  22. Malik, D.S., Shah, T.: Color multiple image encryption scheme based on 3D-chaotic maps. Math. Comput. Simulat. 178, 646–666 (2020). https://doi.org/10.1016/j.matcom.2020.07.007

    Article  MathSciNet  MATH  Google Scholar 

  23. Zhou, M., Wang, C.: A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks. Signal Process. 171, 107484 (2020). https://doi.org/10.1016/j.sigpro.2020.107484

    Article  Google Scholar 

  24. Slimane, N.B., Bouallegue, K., Machhout, M.: Designing a multi-scroll chaotic system by operating Logistic map with fractal process. Nonlinear Dynam. 88, 1655–1675 (2017). https://doi.org/10.1007/s11071-017-3337-0

    Article  Google Scholar 

  25. Guo, Y., Qi, G., Hamam, Y.: A multi-wing spherical chaotic system using fractal process. Nonlinear Dyn. 85, 2765–2775 (2016). https://doi.org/10.1007/s1107-016-2861-7

    Article  MATH  Google Scholar 

  26. Zhang, Y.: The fast image encryption algorithm based on lifting scheme and chaos. Inf. Sci. 520, 177–194 (2020). https://doi.org/10.1016/j.ins.2020.02.012

    Article  MathSciNet  MATH  Google Scholar 

  27. Akhshani, A., Akhavan, A., Lim, S.-C., Hassan, Z.: An image encryption scheme based on quantum logistic map. Commun. Nonlinear Sci. Numer. Simulat. 17, 4653–4661 (2012). https://doi.org/10.1016/j.cnsns.2012.05.033

    Article  MathSciNet  MATH  Google Scholar 

  28. Seyedzadeh, S.M., Norouzi, B., Mosavi, M.R., Mirzakuchaki, S.: A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dyn. 81, 511–529 (2015). https://doi.org/10.1007/s11071-015-2008-2

    Article  MathSciNet  MATH  Google Scholar 

  29. Zhang, J., Huo, D.: Image encryption algorithm based on quantum chaotic map and DNA coding. Multimed. Tools Appl. 78, 15605–15621 (2019). https://doi.org/10.1007/s11042-018-6973-6

    Article  Google Scholar 

  30. Huang, L., Cai, S., Xiong, X., Xiao, M.: On symmetric color image encryption system with permutation-diffusion simultaneous operation. Opt. Laser Eng. 115, 7–20 (2019). https://doi.org/10.1016/j.optlaseng.2018.11.015

    Article  Google Scholar 

  31. Ye, G., Huang, X.: An efficient symmetric image encryption algorithm based on an intertwining logistic map. Neurocomputing 251, 45–53 (2017). https://doi.org/10.1016/j.neucom.2017.04.016

    Article  Google Scholar 

  32. Zhang, Y., Wang, X.: A symmetric image encryption algorithm based on mixed linea-nonlinear coupled map lattice. Inf. Sci. 273, 329–351 (2014). https://doi.org/10.1016/j.ins.2014.02.156

    Article  Google Scholar 

  33. Wu, C., Hu, K., Wang, Y., Wang, J., Wang, Q.: Scalable asymmetric image encryption based on phase-truncation in cylindrical diffraction domain. Opt. Commun. 448, 26–32 (2019). https://doi.org/10.1016/j.optcom.2019.05.009

    Article  Google Scholar 

  34. Kumari, E., Mukherjee, S., Singh, P., Kumar, R.: Asymmetric color image encryption and compression based on discrete cosine transform in Fresnel domain. Results Opt. 1, 100005 (2020). https://doi.org/10.1016/j.rio.2020.100005

    Article  Google Scholar 

  35. Rakheja, P., Singh, P., Vig, R.: An asymmetric image encryption mechanism using QR decomposition in hybrid multi-resolution wavelet domain. Opt. Laser Eng. 134, 106177 (2020). https://doi.org/10.1016/j.optlaseng.2020.106177

    Article  Google Scholar 

  36. Hsiao, F.: Chaotic synchronization cryptosystems combined with RSA encryption algorithm. Fuzzy Set. Syst. 342, 109–137 (2018). https://doi.org/10.1016/j.fss.2017.10.016

    Article  MathSciNet  MATH  Google Scholar 

  37. Gong, L., Qiu, K., Deng, C., Zhou, N.: An optical image compression and encryption scheme based on compressive sensing and RSA algorithm. Opt. Laser Eng. 121, 169–180 (2019). https://doi.org/10.1016/j.optlaseng.2019.03.006

    Article  Google Scholar 

  38. Ye, G., Jiao, K., Wu, H., Pan, C., Huang, X.: An asymmetric image encryption algorithm based on a fractional-order chaotic system and the RSA public-key cryptosystem. Int. J. Bifurcat. Chaos 30, 2050233 (2020). https://doi.org/10.1142/S0218127420502338

    Article  MathSciNet  MATH  Google Scholar 

  39. Ghadirli, H.M., Nodehi, A., Enayatifar, R.: An overview of encryption algorithms in color images. Signal Process. 164, 163–185 (2019). https://doi.org/10.1016/j.sigpro.2019.06.010

    Article  Google Scholar 

  40. Liu, W., Sun, K., Zhu, C.: A fast image encryption algorithm based on chaotic map. Opt. Laser Eng. 84, 26–36 (2016). https://doi.org/10.1016/j.optlaseng.2016.03.019

    Article  Google Scholar 

  41. Hua, Z., Zhu, Z., Yi, S., Zhang, Z., Huang, H.: Cross-plane colour image encryption using a two-dimensional logistic tent modular map. Inf. Sci. 546, 1063–1083 (2021). https://doi.org/10.1016/j.ins.2020.09.032

    Article  MathSciNet  Google Scholar 

  42. May, R.: Simple mathematical models with very complicated dynamics. Nature 261, 459–467 (1976). https://doi.org/10.1038/261459a0

    Article  MATH  Google Scholar 

  43. Goggin, M.E., Sundaram, B., Milonn, P.W.: Quantum Logistic Map. Phys. Rev. A 41, 5705–5708 (1990). https://doi.org/10.1007/s11071-018-4614-20

    Article  MathSciNet  Google Scholar 

  44. Wang, X., Li, Y., Jin, J.: A new one-dimensional chaotic system with applications in image encryption. Chaos Soliton Fract. 139, 110102 (2020). https://doi.org/10.1016/j.chaos.2020.110102

    Article  MathSciNet  Google Scholar 

  45. Chai, X., Bi, J., Gan, Z., Liu, X., Zhang, Y., Chen, Y.: Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Process. 176, 107684 (2020). https://doi.org/10.1016/j.sigpro.2020.107684

    Article  Google Scholar 

  46. Valandar, M.Y., Barani, M.J., Ayubi, P.: A fast color image encryption technique based on three dimensional chaotic map. Optik 193, 162921 (2019). https://doi.org/10.1016/j.ijleo.2019.06.021

    Article  Google Scholar 

  47. Ghebleh, M., Kanso, A., Stevanović, D.: A novel image encryption algorithm based on piecewise linear chaoticmaps and least squares approximation. Multimed. Tools Appl. 77, 7305–7326 (2018). https://doi.org/10.1007/s11042-017-4634-9

    Article  Google Scholar 

  48. Wang, L., Song, H., Liu, P.: A novel hybrid color image encryption algorithm using two complex chaotic systems. Opt. Laser Eng. 77, 118–125 (2016). https://doi.org/10.1016/j.optlaseng.2015.07.015

    Article  Google Scholar 

  49. Wang, X., Qin, X., Liu, C.: Color image encryption algorithm based on customized globally coupled map lattices. Multimed. Tools Appl. 78, 6191–6209 (2019). https://doi.org/10.1007/s11042-018-6326-5

    Article  Google Scholar 

  50. Zhang, Y., He, Y., Li, P., Wang, X.: A new color image encryption scheme based on 2DNLCML system and genetic operations. Opt. Laser Eng. 128, 106040 (2020). https://doi.org/10.1016/j.optlaseng.2020.106040

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to thank the anonymous reviewers for their valuable comments and the editor’s helpful suggestions. This work was supported in part by the National Natural Science Foundation of China (No.61972103), the Natural Science Foundation of Guangdong Province of China (No.2019A1515011361), and the Key Scientific Research Project of Education Department of Guangdong Province of China (No.2020ZDZX3064).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guodong Ye.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ye, G., Jiao, K. & Huang, X. Quantum logistic image encryption algorithm based on SHA-3 and RSA. Nonlinear Dyn 104, 2807–2827 (2021). https://doi.org/10.1007/s11071-021-06422-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-021-06422-2

Keywords

Navigation