Skip to main content
Log in

Optimizing chaos based image encryption

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Due to its inherent properties such as sensitivity to initial condition, ergodicity and systematic parametrization chaos systems have been extensively used in image encryption. However, one needs to optimize the chaos for each image being encrypted to provide high quality encryption. Features such as high entropy or low pixel correlation are measures of interest in image encryption. In this paper, we propose a novel technique to optimize a chaos based image encryption algorithm. The image is confused using logistic map as chaos function and diffused by modified Knuth shuffling algorithm. We use the logistic map parameters as encryption key. We then harness TLBO and GSA evolutionary algorithms to speed up the optimization process of these parameters. The optimization method yields parameters that lead to lowest correlation among adjacent pixels or highest entropy. We compare the quality and security of our cryptosystem with some famous image encryption methods in the literature.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU Int J Electron Commun 66(10):806–816

    Article  Google Scholar 

  2. Alligood KT, Sauer TD, Yorke JA (1997) Chaos. In: Chaos. Springer, Berlin, pp 105–147

  3. Bani Younes MA, Jantan A (2008) Image encrytion using block based transformation algorithm. IAENG Int J Comput Sci 35:1

  4. Belkhouche F, Qidwai U (2003) Binary image encoding using 1D chaotic maps. In: 2003 Annual technical conference on IEEE region 5. IEEE, pp 39–43

  5. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749–761

    Article  MathSciNet  MATH  Google Scholar 

  6. Enayatifar R (2011) Image encryption via logistic map function and heap tree. Int J Phys Sci 6(2):221–228

    Google Scholar 

  7. Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93

    Article  Google Scholar 

  8. Fard EB, Atani RE (2013) A novel image encryption method based on chaotic maps. In: 2013 3th international conference on computer and knowledge engineering (ICCKE). IEEE, pp 190–195

  9. Guan ZH, Huang F, Guan W (2005) Chaos-based image encryption algorithm. Phys Lett A 346(1):153–157

    Article  MATH  Google Scholar 

  10. Jolfaei A, Mirghadri A (2010) A new approach to measure quality of image encryption. Int J Comput Netw Secur 2(8):38–44

    Google Scholar 

  11. Kamali SH, Shakerian R, Hedayati M, Rahmani M (2010) A new modified version of advanced encryption standard based algorithm for image encryption. In: 2010 International conference on electronics and information engineering (ICEIE), vol 1. IEEE, pp V1-141

  12. Khan J, Ahmad J, Hwang SO (2015) An efficient image encryption scheme based on: Henon map, skew tent map and S-Box. In: 2015 6th international conference on modeling, simulation, and applied optimization (ICMSAO). IEEE, pp 1–6

  13. Knuth DE (1998) The art of computer programming: sorting and searching, vol. 3. Pearson Education, London

    MATH  Google Scholar 

  14. Lafe O (1996) Data compression and encryption using cellular automata transforms. In: IEEE international joint symposia on intelligence and systems, 1996. IEEE, pp 234–241

  15. Li C, Li S, Chen G, Chen G, Hu L (2005) Cryptanalysis of a new signal security system for multimedia data transmission. EURASIP J Adv Signal Process 2005 (8):1–12

    Article  MathSciNet  MATH  Google Scholar 

  16. Lian S, Sun J, Wang Z (2005) A block cipher based on a suitable use of the chaotic standard map. Chaos, Solitons Fractals 26(1):117–129

    Article  MATH  Google Scholar 

  17. Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90(9):2714–2722

    Article  MATH  Google Scholar 

  18. Maniccam SS, Bourbakis NG (2004) Image and video encryption using SCAN patterns. Pattern Recogn 37(4):725–737

    Article  Google Scholar 

  19. Mitra A, Rao YS, Prasanna SRM (2006) A new image encryption approach using combinational permutation techniques. Int J Comput Sci 1(2):127–131

    Google Scholar 

  20. Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimedia Tools Appl 71(3):1469–1497

    Article  Google Scholar 

  21. Rao RV, Savsani VJ, Vakharia DP (2011) Teaching–learning-based optimization: a novel method for constrained mechanical design optimization problems. Comput Aided Des 43(3):303–315

    Article  Google Scholar 

  22. Rao RV, Savsani VJ, Vakharia DP (2012) Teaching–learning-based optimization: an optimization method for continuous non-linear large scale problems. Inf Sci 183 (1):1–15

    Article  MathSciNet  Google Scholar 

  23. Rashedi E, Nezamabadi-Pour H, Saryazdi S (2009) GSA: a gravitational search algorithm. Inf Sci 179(13):2232–2248

    Article  MATH  Google Scholar 

  24. Sabri NM, Puteh M, Mahmood MR (2013) A review of gravitational search algorithm. Int J Advance Soft Comput Appl 5(3):1–39

    Google Scholar 

  25. Sinha A, Singh K (2003) A technique for image encryption using digital signature. Opt Commun 218(4):229–234

    Article  Google Scholar 

  26. Sreelaja NK, Pai GV (2012) Stream cipher for binary image encryption using Ant Colony Optimization based key generation. Appl Soft Comput 12(9):2879–2895

    Article  Google Scholar 

  27. Van Droogenbroeck M, Benedett R (2002) Techniques for a selective encryption of uncompressed and compressed images. In: ACIVS advanced concepts for intelligent vision systems, proceedings, pp 90–97

  28. Wang Y, Wong KW, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514–522

    Article  Google Scholar 

  29. Wang W, Tan H, Pang Y, Li Z, Ran P, Wu J (2016) A novel digital image encryption algorithm based on wavelet transform and multi chaos. J Sensors 2016: Article ID 2646205

  30. Wang W, Si M, Pang Y, Ran P, Wang H, Jiang X, Liu Y, Wu J, Wu W, Chilamkurti N, Jeon G (2017) An encryption algorithm based on combined chaos in body area networks. J Comput Electric Eng Available online 18

  31. Zefreh EZ, Rajaee S, Farivary M (2011) Image security system using recursive Cellular automata substitution and its parallelization. In: 2011 CSI international symposium on computer science and software engineering (CSSE). IEEE, pp 77–86

  32. Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775–2780

    Article  Google Scholar 

  33. Zhang Y, Xiao D (2014) Self-adaptive permutation and combined global diffusion for chaotic color image encryption. AEU Int J Electron Commun 68(4):361–368

    Article  Google Scholar 

  34. Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model 52(11):2028–2035

    Article  MathSciNet  MATH  Google Scholar 

  35. Zhou Y, Panetta K, Agaian S, Chen CP (2013) (n, k, p)-Gray code for image systems. IEEE Trans Cybern 43(2):515–529

    Article  Google Scholar 

  36. Zhou Y, Bao L, Chen CP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182

    Article  Google Scholar 

  37. Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171–1186

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seyed Javad Kazemitabar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Noshadian, S., Ebrahimzade, A. & Kazemitabar, S.J. Optimizing chaos based image encryption. Multimed Tools Appl 77, 25569–25590 (2018). https://doi.org/10.1007/s11042-018-5807-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-5807-x

Keywords

Navigation