Skip to main content
Log in

A Novel Image Encryption Algorithm Based on the Two-Dimensional Logistic Map and the Latin Square Image Cipher

  • 3DR Review
  • Published:
3D Research

Abstract

In this paper, we introduce a new hybrid system consisting of a permutation-substitution network based on two different encryption techniques: chaotic systems and the Latin square. This homogeneity between the two systems allows us to provide the good properties of confusion and diffusion, robustness to the integration of noise in decryption. The security analysis shows that the system is secure enough to resist brute-force attack, differential attack, chosen-plaintext attack, known-plaintext attack and statistical attack. Therefore, this robustness is proven and justified.

Graphical Abstract

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Abbreviations

DC:

Cyclicshift

Dcr:

Decryption

Ecr:

Encryption

GCL:

Latin Square Generator

GS:

Sequence Generator

PCCL:

Column Latin Square Permutation

PCL:

Latin Square Permutation

PLCL:

Row Latin Square Permutation

SCCL:

Column Latin Square Substitution

SLCL:

Row Latin Square Substitution

References

  1. Said, F., Yasser, A., & Abdo, A. (2011). How good is the DES algorithm in image ciphering? International Journal of Advanced Networking and Applications, 2(5), 796–803.

    Google Scholar 

  2. Manoj, B., Manjula, N. (2012) Image encryption and decryption using AES. International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249–8958, 1(5).

  3. Irfan, L., Burhanuddin, C., Aamna, P. et al. (2012) Image encryption and decryption using blowfish algorithm, National Conference on Emerging Trends in Information Technology.

  4. Lian, S. (2009). A block cipher based on chaotic neural networks. Neurocomputing, 72, 1296–1301.

    Article  Google Scholar 

  5. Guan, Z., Huang, F., & Guan, W. (2005). Chaos-based image encryption algorithm. Physics Letters A, 346, 153–157.

    Article  MATH  Google Scholar 

  6. Pareek, N., Patidar, V., & Sud, K. (2006). Image encryption using chaotic logistic map. Image and Vision Computing, 24, 926–934.

    Article  Google Scholar 

  7. Lian, S. (2009). Efficient image or video encryption based on spatiotemporal chaos system. International Journal of Chaos Solitons Fractals, 40(15), 2509–2510.

    Article  MATH  Google Scholar 

  8. Fu, C., Zhu, Z. (2008) A chaotic image encryption scheme based on circular bit shift method. The 9th International Conference for Young Computer Scientists, pp. 3057–3061.

  9. Yue, W., Gelan, Y., Huixia, J., et al. (2012). Image encryption using the two-dimensional logistic chaotic map. Journal of Electronic Imaging, 21(1), 013–014.

    Google Scholar 

  10. Li, S., Mou, X., Cai, Y., et al. (2003). On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision. Computer Physics Communications, 153(1), 52–58.

    Article  MathSciNet  MATH  Google Scholar 

  11. Alvarez, G., Li, S., & Hernandez, L. (2007). Analysis of security problems in a medical image encryption system. Computers in Biology and Medicine, 37(3), 424–427.

    Article  Google Scholar 

  12. lvarez, G., Montoya, F., Romera, M., et al. (2003). Cryptanalysis of a discrete chaotic cryptosystem using external key. Physics Letters A, 319(3–4), 334–339.

    Article  MathSciNet  Google Scholar 

  13. Yue, W., Yicong, Z., Joseph, P., et al. (2014). Design of image cipher using latin squares. Information Sciences, 264, 317–339.

    Article  MathSciNet  Google Scholar 

  14. Radwan, A., Soliman, A., & Sedeek, E. L. (2004). Realization of the modified Lorenz chaotic system. Chaos Soliton Fractals, 21, 553–561.

    Article  MATH  Google Scholar 

  15. Radwan, A., Soliman, A., & Elwakil, A. (2007). 1-D digitally-controlled multi-scroll chaos generator. International Journal of Bifurcation and Chaos (IJBC), 17(1), 227–242.

    Article  MATH  Google Scholar 

  16. Telem, A. N. K., Segning, C. M., Kenne, G., Fotsin, H. B. (2014) A simple and robust gray image encryption scheme using chaotic logistic map and artificial neural network. Advances in Multimedia (2014): 19

  17. Zhu, H., Zhao, C., & Zhang, X. (2013). A novel image encryption–compression scheme using hyper-chaos and Chinese remainder theorem. Signal Processing: Image Communication, 28(6), 670–680.

    MATH  Google Scholar 

  18. Hraoui, S., Gmira, F., Saaidi, A., et al. (2015). Chaos based crypto-compression using SPIHT coding. International Journal of Imaging and Robotics, 15(2), 68–78.

    Google Scholar 

  19. Kanso, A., & Ghebleh, M. (2012). A novel image encryption algorithm based on a 3D chaotic map. Communications in Nonlinear Science and Numerical Simulation, 17(7), 2943–2959.

    Article  MathSciNet  MATH  Google Scholar 

  20. Pareek, N. K., Patidar, V., & Sud, K. K. (2013). Diffusion–substitution based gray image encryption scheme. Digital Signal Process, 23(3), 894–901.

    Article  MathSciNet  Google Scholar 

  21. Al-Husainy, M. A. F. (2012). A novel encryption method for image security. International Journal of Security and Its Applications, 6(1), 1–8.

    Google Scholar 

  22. Pareek, N. K., Patidar, V., & Sud, K. K. (2011). Substitution-diffusion based image cipher. International Journal of Network Security and Its Applications (IJNSA), 3(2), 149–160.

    Article  Google Scholar 

  23. Li Z, Liu X (2010) The image encryption algorithm based on the novel diffusion transformation. In 2010 International Conference on Computer, Mechatronics, Control and Electronic Engineering (CMCE) (pp. 345–348).

  24. Wang, X., & Yang, L. (2012). A novel chaotic image encryption algorithm based on water wave motion and water drop diffusion models. Optics Communication, 285(20), 4033–4042.

    Article  Google Scholar 

  25. Fouda, J. S. A. E., Effa, J. Y., Sabat, S. L., & Ali, M. (2014). A fast chaotic block cipher for image encryption. Communications in Nonlinear Science and Numerical Simulation, 19(3), 578–588.

    Article  MathSciNet  Google Scholar 

  26. Zhang, A., & Zhou, N. (2013). Color image encryption algorithm combining compressive sensing with Arnold transform. Journal of Computers, 8(11), 2857–2863.

    Google Scholar 

  27. Zhang, Y., & Xiao, D. (2014). Self-adaptive permutation and combined global diffusion for chaotic color image encryption. International Journal of Electronics and Communications (AEÜ), 68, 361–368.

    Article  Google Scholar 

  28. AbdElHaleem, S. H., Radwan, A. G., Abd-El-Hafiz, S. K. (2014) A chess-based chaotic block cipher. In IEEE 12th International Conference on New Circuits and Systems (pp. 405–408).

  29. Fournier-Prunaret, D., Lopez-Ruiz, R. (2003) Basin bifurcations in a two-dimensional logistic map, EprintarXiv:nlin/0304059.

  30. Luo, W., Huang, F., & Huang, J. (2010). Edge adaptive image steganography based on lsb matching revisited. Information Forensics and Security. IEEE Transactions, 5(2), 201–214.

    Article  MathSciNet  Google Scholar 

  31. Menezes, A., Van Orschot, P., & Vanstone, S. (1997). Handbook of Applied Cryptography. Boca Raton: Chapman and Hall CRC.

    MATH  Google Scholar 

  32. Press, W. (2007). The art of scientific computing. Numerical recipes. New York: Cambridge University Press.

    Google Scholar 

  33. Data encryption standard (1977) Federal Information Processing Standards Publication 46.

  34. Advanced encryption standard (2001) Federal Information Processing Standards Publication 197.

  35. Stinson, D. (2006). The CRC Press series on discrete mathematics and its applications, cryptography: Theory and practice. New York: Chapman & Hall/CRC.

    Google Scholar 

  36. Zhi-liang, Z., Wei, Z., Wong, K., & Hai, Y. (2011). A chaos-based symmetric image encryption scheme using a bit-level permutation. Information Sciences, 181, 1171–1186.

    Article  Google Scholar 

  37. Wang, X., & Lei, Y. (2012). A novel chaotic image encryption algorithm based on water wave motion and water drop diffusion models. Optics Communications, 285, 4033–4042.

    Article  Google Scholar 

  38. Zhang, G., & Liu, Q. (2011). A novel image encryption method based on total shuffling scheme. Optics Communications, 284, 2775–2780.

    Article  Google Scholar 

  39. Wang, X., Zhang, Y., & Bao, X. (2015). A novel chaotic image encryption scheme using DNA sequence operations. Optics and Lasers in Engineering, 73, 53–61.

    Article  Google Scholar 

  40. Wua, Y., Joseph, P. N., & Agaianb, S. (2011). Shannon entropy based randomness measurement and test for image encryption. Information Sciences, 00, 1–23.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Machkour.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Machkour, M., Saaidi, A. & Benmaati, M.L. A Novel Image Encryption Algorithm Based on the Two-Dimensional Logistic Map and the Latin Square Image Cipher. 3D Res 6, 36 (2015). https://doi.org/10.1007/s13319-015-0068-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s13319-015-0068-1

Keywords

Navigation