Skip to main content
Log in

A novel image encryption algorithm based on chaotic maps and GF(28) exponent transformation

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

In this paper, we propose an image encryption algorithm that is based on GF(28) transformations, using the Arnold cat map and incorporating the nonlinear chaotic algorithm. The plain image is processed with the nonlinear chaotic algorithm and is shuffled iteratively with the Arnold cat map, while transforming the image pixel values into GF(28). We show that the encryption characteristics of this approach are better as compared to some well known encryption algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Wheeler, D.D., Matthews, R.A.J.: Super computer investigations of a chaotic encryption algorithm. Cryptologia 15, 40–52 (1991)

    Google Scholar 

  2. Zhang, L.H., Liao, X.F., Wang, X.B.: An image encryption approach based on chaotic maps. Chaos Solitons Fractals 24, 759–765 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  3. Belmouhoub, I., Djemai, M., Barbot, J.P.: Cryptography by discrete-time hyperchaotic systems. In: Proceedings of 42nd IEEE Conference on Decision and Control, 9–12 Dec. 2003, vol. 2, pp. 1902–1907 (2003)

    Google Scholar 

  4. Scharinger, J.: Secure and fast encryption using chaotic Kolmogorov flows. In: Information Theory Workshop, 22–26 June 1998, pp. 124–125 (1998)

    Google Scholar 

  5. Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21, 749–761 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  6. Zhou, Z., Yang, H., Zhu, Y., Pan, W., Zhang, Y.: A block encryption scheme based on 3D chaotic Arnold maps. In: Intelligent Interaction and Affective Computing (ASIA’09), International Asia Symposium (2009)

    Google Scholar 

  7. Hussain, I., Shah, T., Mahmood, H.: A New Algorithm to Construct Secure Keys for AES. Int. J. Cont. Math. Sci. 5(26), 1263–1270 (2010)

    MathSciNet  MATH  Google Scholar 

  8. Sobhy, M.I., Shehata, A.R.: Methods of attacking chaotic encryption and countermeasures. IEEE Trans. Acoust Speech Signal Process 2, 1001–1004 (2001)

    Google Scholar 

  9. Guo, Q., Liu, Z.G., Liu, S.T.: Colour image encryption by using Arnold and discrete fractional random transforms in IHS space. Opt. Lasers Eng. 48(12), 1174–1181 (2010)

    Article  Google Scholar 

  10. Rhouma, R., Soumaya, M., Safya, B.: OCML-based colour image encryption. Chaos Solitons Fractals 40(1), 309–318 (2009)

    Article  MATH  Google Scholar 

  11. Sahar, M., Amir, M.E.: Colour image encryption based on coupled nonlinear chaotic map. Chaos Solitons Fractals 42(3), 1745–1754 (2009)

    Article  MATH  Google Scholar 

  12. Liu, H.J., Wang, X.Y.: Colour image encryption based on one-time keys and robust chaotic maps. Comput. Math. Appl. 59(10), 3320–3327 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  13. Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput. Appl. (2012). doi:10.1007/s00521-012-0870-0

    Google Scholar 

  14. Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Analysis of S-box in image encryption using root mean square error method. Z. Naturforsch. A 67a, 327–332 (2012)

    Article  Google Scholar 

  15. Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Generalized majority logic criterion to analyze the statistical strength of S-boxes. Z. Naturforsch. A 67a, 282–288 (2012)

    Article  Google Scholar 

  16. Hussain, I., Shah, T., Mahmood, H.: A group theoretic approach to construct cryptographically strong substitution boxes. Neural Comput. Appl. (2012). doi:10.1007/s00521-012-0914-5

    Google Scholar 

  17. Hussain, I., Shah, T., Gondal, M.A.: Image encryption algorithm based on PGL(2,GF(28)) S-boxes and TD-ERCS chaotic sequence. Nonlinear Dyn. (2012). doi:10.1007/s11071-012-0440-0

    MathSciNet  Google Scholar 

  18. Hussain, I., Shah, T.: S8 affine power affine S-boxes and their application. Neural Comput. Appl. (2012). doi:10.1007/s00521-012-1036-9

    Google Scholar 

  19. Hussain, I., Shah, T., Gondal, M.A., Mahmood, H.: Construction of S8 Lui J S-boxes and their application. Comput. Math. Appl. (2012). doi:10.1016/j.camwa.2012.05.017

    MathSciNet  Google Scholar 

  20. Hussain, I., Shah, T., Gondal, M.A.: An efficient image encryption algorithm based on S8 S-box transformation and NCA map. Opt. Commun. (2012). doi:10.1016/j.optcom.2012.06.011

    Google Scholar 

  21. Hussain, I., Shah, T., Gondal, M.A., Wang, Y.: Analyses of SKIPJACK S-box. World Appl. Sci. J. 13(11), 2385–2388 (2011)

    Google Scholar 

  22. Hussain, I., Shah, T., Gondal, M.A., Khan, W.A.: Construction of cryptographically strong 8×8 S-boxes. World Appl. Sci. J. 13(11), 2389–2395 (2011)

    Google Scholar 

  23. Khan, M., Shah, T., Mahmood, H., Asif Gondal, M.: An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dyn. doi:10.1007/s11071-012-0675-9

  24. Khan, M., Shah, T., Mahmood, H., Asif Gondal, M., Hussain, I.: A novel technique for the construction of strong s-boxes based on chaotic Lorenz systems. Nonlinear Dyn. 70, 2303–2311 (2012). doi:10.1007/s11071-012-0621-x

    Article  Google Scholar 

  25. Hussain, I., Shah, T., Gondal, M.A., Hassan, H.: Construction of new s-boxes over finite field and their application to watermarking. Z. Naturforsch. 67a, 705–710 (2012). doi:10.5560/ZNA.2012-0090

    Article  Google Scholar 

  26. Hussain, I., Shah, T., Mahmood, H., Afzal, M.: Comparative analysis of S-boxes based on graphical SAC. Int. J. Comput. Appl. 2(5), 975–8887 (2010)

    Google Scholar 

  27. Hussain, I.: A novel approach of audio watermarking based on S-box transformation. Math. Comput. Model. 57(3–4), 963–969 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Iqtadar Hussain.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hussain, I., Shah, T., Gondal, M.A. et al. A novel image encryption algorithm based on chaotic maps and GF(28) exponent transformation. Nonlinear Dyn 72, 399–406 (2013). https://doi.org/10.1007/s11071-012-0723-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-012-0723-5

Keywords

Navigation