Skip to main content
Log in

Image encryption algorithm with compound chaotic maps

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

This paper proposes a novel image encryption scheme based on two even-symmetric chaotic maps and a skew tent chaotic map. In the permutation process, a P-box produced by sorting an even-symmetric chaotic sequence is applied to shuffle the positions of all image pixels. In the diffusion process, both even-symmetric chaotic map and skew tent map are used to generate the key stream. The pixels in the permuted image determine which of two even-symmetric chaotic maps is iterated for next byte in the keystream each time, so the keystream is closely related to the plain image. The performance and security of the proposed method are evaluated thoroughly histogram, correlation of adjacent pixels, information entropy and sensitivity analysis. Results are encouraging and suggest that the scheme is reliable to be adopted for the secure image communication application.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  • Alvarez G, Li S (2009) Cryptanalyzing a nonlinear chaotic algorithm (nca) for image encryption. Commun Nonlinear Sci Numer Simul 14(11):3743–3749

    Article  MathSciNet  Google Scholar 

  • Amin M, Faragallah OS, Abd El-Latif AA (2010) A chaotic block cipher algorithm for image cryptosystems. Commun Nonlinear Sci Numer Simul 15(11):3484–3497

    Article  MATH  MathSciNet  Google Scholar 

  • Barsocchi P, Chessa S, Martinovic I, Oligeri G (2013) A cyber-physical approach to secret key generation in smart environments. J Ambient Intell Humaniz Comput 4(1):1–16

    Article  Google Scholar 

  • Chen X, Li J, Susilo W (2012) Efficient fair conditional payments for outsourcing computations. IEEE Trans Inf Forensics Secur 7(6):1687–1694

    Article  Google Scholar 

  • Huang C, Nien H (2009) Multi chaotic systems based pixel shuffle for image encryption. Opt Commun 282(11):2123–2127

    Article  Google Scholar 

  • Kohda T, Tsuneda A (1997) Statistics of chaotic binary sequences. IEEE Trans Inf Theory 43(1):104–112

    Article  MATH  MathSciNet  Google Scholar 

  • Kwok H, Tang WK (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos Solitons Fractals 32(4):1518–1529

    Article  MATH  MathSciNet  Google Scholar 

  • Li J, Kim K (2010) Hidden attribute-based signatures without anonymity revocation. Inf Sci 180(9):1681–1689

    Article  MATH  MathSciNet  Google Scholar 

  • Li C, Lo KT (2011) Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process 91(4):949–954

    Article  MATH  Google Scholar 

  • Li C, Li S, Asim M, Nunez J, Alvarez G, Chen G (2009) On the security defects of an image encryption scheme. Image Vis Comput 27(9):1371–1381

    Article  Google Scholar 

  • Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, pp 1–5

  • Li J, Zhang F, Chen X, Kim K, Wong DS (2012) Generic security-amplifying methods of ordinary digital signatures. Inf Sci 201:128–139

    Article  MATH  MathSciNet  Google Scholar 

  • Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934

    Article  Google Scholar 

  • Pisarchik A, Zanin M (2008) Image encryption with chaotically coupled chaotic maps. Phys D Nonlinear Phenom 237(20):2638–2648

    Article  MATH  MathSciNet  Google Scholar 

  • Rhouma R, Solak E, Belghith S (2010) Cryptanalysis of a new substitution–diffusion based image cipher. Commun Nonlinear Sci Numer Simul 15(7):1887–1892

    Article  MATH  MathSciNet  Google Scholar 

  • Sang T, Wang R, Yan Y (2001) Generating binary bernoulli sequences based on a class of even-symmetric chaotic maps. IEEE Trans Commun 49(4):620–623

    Article  MATH  Google Scholar 

  • Solak E, Rhouma R, Belghith S (2010) Cryptanalysis of a multi-chaotic systems based image cryptosystem. Opt Commun 283(2):232–236

    Article  Google Scholar 

  • Sun F, Lü Z, Liu S (2010) A new cryptosystem based on spatial chaotic system. Opt Commun 283(10):2066–2073

    Article  Google Scholar 

  • Tong X, Cui M (2008) Image encryption with compound chaotic sequence cipher shifting dynamically. Image Vis Comput 26(6):843–850

    Article  Google Scholar 

  • Wang Y, Wong KW, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514–522

    Article  Google Scholar 

  • Xiao D, Liao X, Wei P (2009) Analysis and improvement of a chaos-based image encryption algorithm. Chaos Solitons Fractals 40(5):2191–2199

    Article  MATH  MathSciNet  Google Scholar 

  • Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775–2780

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuan Li.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, X., Zhang, G. & Zhang, X. Image encryption algorithm with compound chaotic maps. J Ambient Intell Human Comput 6, 563–570 (2015). https://doi.org/10.1007/s12652-013-0217-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-013-0217-4

Keywords

Navigation