Skip to main content
Log in

A new secure and sensitive image encryption scheme based on new substitution with chaotic function

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a new image encryption scheme is proposed with high sensitivity to the plain image. In proposed scheme, two chaotic functions and logical operator xor are used. Image encryption process includes substitution of pixels and permutation. Using the new method of substitution, algorithm sensitivity somewhat has elevated to changes in the plain image that by changing a single pixel of the plain image, amount of NPCR reaches 100 %. Results of tests show that the cipher image does not give any information of statistical such as entropy, histogram and correlation of adjacent pixels to attackers. Also the proposed scheme has the wide key space and is so safe to the noise ratio and compression.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Notes

  1. Data Encryption Standard

  2. International Data Encryption Algorithm

  3. Rivest Shamir Adelman

  4. Number of Pixels Change Rate

  5. Unified Average Changing Intensity

References

  1. Abd E-L, Ahmed A, Xiamu N (2013) A hybrid chaotic system and cyclic elliptic curve for image encryption. AEU-Int JElectron Commun 67(2):136–143

    Article  Google Scholar 

  2. Abdullah, Abdul H, Rasul E, Malrey L (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU-Int JElectron Commun 66(10):806–816

    Article  Google Scholar 

  3. Bakhshandeh A, Eslami Z (2013) An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Opt Lasers Eng 51(9):665–673

    Article  Google Scholar 

  4. Behnia S, Akhshani A, Ahadpour S, Mahmodi H, Akhavan A (2007) A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. Phys Lett A 366(4):391–396

    Article  MATH  Google Scholar 

  5. Bigdeli N, Farid Y, Afshar K (2012) A novel image encryption/decryption scheme based on chaotic neural networks. Eng Appl Artif Intell 25(4):753–765

    Article  Google Scholar 

  6. François M, Grosges T, Barchiesi D, Erra R (2012) A new image encryption scheme based on a chaotic function. Signal Process Image Commun 27(3):249–259

    Article  Google Scholar 

  7. Jiang J, Armstrong A, Guo-Can F (2004) Web-based image indexing and retrieval in JPEG compressed domain. Multimedia Systems 9(5):424–432

    Article  Google Scholar 

  8. Norouzi, Benyamin, Seyed Mohammad S, Sattar M, Mohammad Reza M (2014) A novel image encryption based on hash function with only two-round diffusion process. Multimedia Systems 20(1):45–64

    Article  Google Scholar 

  9. Pareek NK, Patidar V, Sud KK (2013) Diffusion-substitution based gray image encryption scheme. DigitSig Process 23(8):894–901

    Article  MathSciNet  Google Scholar 

  10. Patidar, Vinod NK, Pareek, Sud KK (2009) A new substitution–diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14(7):3056–3075

    Article  MATH  Google Scholar 

  11. Song C-Y, Qiao Y-L, Zhang X-Z (2013) An image encryption scheme based on new spatiotemporal chaos. Opt-Int J Light Electron Opt 124(18):3329–3334

    Article  Google Scholar 

  12. Tong X, Cui M (2008) Image encryption with compound chaotic sequence cipher shifting dynamically. Image Vis Comput 26(6):843–850

    Article  Google Scholar 

  13. Wang Y, Wong K-W, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514–522

    Article  Google Scholar 

  14. Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290–299

    Article  Google Scholar 

  15. Yang H, Wong K-W, Liao X, Zhang W, Wei P (2010) A fast image encryption and authentication scheme based on chaotic maps. Commun Nonlinear Sci Numer Simul 15(11):3507–3517

    Article  MATH  Google Scholar 

  16. Zhou Y, Karen P, Sos A, Chen CL (2012) Image encryption using P-Fibonacci transform and decomposition. Opt Commun 285(5):594–608

    Article  Google Scholar 

  17. Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(1):29–37

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hadi Seyedarabi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Parvin, Z., Seyedarabi, H. & Shamsi, M. A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimed Tools Appl 75, 10631–10648 (2016). https://doi.org/10.1007/s11042-014-2115-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-2115-y

Keywords

Navigation