Skip to main content
Log in

An image encryption algorithm based on substitution technique and chaos mixing

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

These recent years, countless chaos-based image encryption algorithms have been proposed to meet security needs in real time multimedia communication. However, many of these have exhibited flaws due to the chaotic map inadequacy. In this paper, we proposed a fast and secure image encryption algorithm by using new 1D chaotic systems, with better chaotic properties in the range of their control parameters. These new chaotic systems were obtained from well-known 1D chaotic maps (Logistic, May, Gaussian, Gompertz) with flaws in their chaotic properties. From the chaotic systems designed, we extracted a pseudo random number sequence (PRNS) and generated S-boxes. Then a novel technique of plain image substitution was used to enhance the sensitivity of the original image pixels, followed by a scrambling-masking technique using the generated S-box. Security tests and evaluation metrics confirmed that the proposed cryptosystem was efficient, practicable, and reliable, with high potential to be adopted for network security and secure communications because of its high encryption speed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Abanda Y, Tiedeu A (2016) Image encryption by chaos mixing. IET Image Process 10(10):742–750

    Article  Google Scholar 

  2. Ahmed A, El-Latif A, Li L, Niu X (2014) A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimed Tools Appl 70(3):1559–1584

    Article  Google Scholar 

  3. Arroyo D, Alvarez G, Fermandez V (2008) On the inadequacy of the logistic map for cryptographic applications. arXiv:0805.4355v1[nlin.CD]

  4. Arroyo D, Alvarez G, Fermandez V (2008) A basic framework for the cryptanalysis of digital chaos-based cryptography. arXiv:0811.1859v1[cs.CR]

  5. Bechikh R, Hermassi H, El-Latif AAA, Rhouma R, Belghith S (2015) Breaking an image encryption scheme based on a spatiotemporal chaotic system. Signal Process Image Commun 39:151–158

    Article  Google Scholar 

  6. Belazi A, Abd El-Latif AA, Diaconu A-V, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37–50

    Article  Google Scholar 

  7. Belazi A, El-Latif AAA, Belghiht S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155–170

    Article  Google Scholar 

  8. Belazi A, Hermassi H, Rhouma R, Belghith S (2014) Algebraic analysis of a RGB image encryption algorithm based on DNA encoding and chaotic map. J NonLinear Dyn 76(4):1989–2009

    Article  Google Scholar 

  9. Çavusoglu Ü, Kaçar S, Pehlivan I, Zengin A (2017) A Secure image encryption algorithm design using a novel chaos based S-Box. Chaos, Solitons Fractals 95:92–101

    Article  Google Scholar 

  10. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption Scheme based on 3D Chaotic cat maps. Chaos, Solitons Fractals 21:749–761

    Article  MathSciNet  Google Scholar 

  11. Chen L, Wang S (2015) Differential cryptanalysis of a medical image cryptosystem with multiple rounds. Comput Biol Med 65:69–75

    Article  Google Scholar 

  12. Chen J-X, Zhu Z-L, Fu C, Yu H, Zhang Y (2015) Reusing the permutation matrix dynamically for efficient image cryptographic algorithm. Signal Process 111:294–307

    Article  Google Scholar 

  13. El-Latif A, Niu XM (2013) A hybrid chaotic system and cyclic elliptic curve for image encryption. Int J Electron Commun 67:136–143

    Article  Google Scholar 

  14. Eyebe JSA, Effa JY, Alie M (2014) Highly secured chaotic block cipher for fast image encryption. Appl Soft Comput 25:435–444

    Article  Google Scholar 

  15. Fan H, Li M, Liu D, AN K (2017) Cryptanalysis of a plaintext-related chaotic RGB image encryption scheme using total plain image characteristics. Multimed Tools Appl 1–25

  16. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8(6):1259–1284

    Article  MathSciNet  Google Scholar 

  17. Fu C, Meng WH, Zhan YF (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43(8):1000–1010

    Article  Google Scholar 

  18. Guesmi R, Farah MAB, Kachouri A, Sametwang M (2016) A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2. Nonlinear Dyn 83(3):1123–1136

    Article  MathSciNet  Google Scholar 

  19. Hermassi H, Belazi A, Rhouma R, Belghith S (2014) Security analysis of an image encryption algorithm based on a DNA addition combining With chaotic maps. Multimed Tools Appl 72(3):2211–2224

    Article  Google Scholar 

  20. Huang XL (2012) Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn 67(4):2411–2417

    Article  MathSciNet  Google Scholar 

  21. Jain A, Rajpal N (2015) A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps. Multimed Tools Appl 75(10):5455–5472

    Article  Google Scholar 

  22. Jakimoski G, Koracev L (2001) Chaos and cryptography: Block encryption ciphers based on chaotic Maps. IEEE Transactions on Circuits and Systems Fund Theo Appl 48(2):163–169

    Article  MathSciNet  Google Scholar 

  23. Li C, Li S, Lo K-T (2011) Breaking a modified substitution–diffusion image cipher based on chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 16:837–843

    Article  MathSciNet  Google Scholar 

  24. Li C, Li S, Muhammad A (2009) On the security defects of an image encryption Scheme. Image Vis Comput 27(9):1371–1381

    Article  Google Scholar 

  25. Liu H, Kadir A, Gong P (2015) A fast color image encryption scheme using one-time S-Boxes based on complex chaotic system and random noise. Optics Comm 338:340–347

    Article  Google Scholar 

  26. Liu H, Liu Y (2014) Cryptanalyzing an image encryption scheme based on hybrid chaotic system and cyclic elliptic curve. Opt Laser Technol 56:15–19

    Article  Google Scholar 

  27. Liu Y, Nie L, Han L, Zhang L, Rosenblum DS (2015) Action2Activity: Recognizing Complex Activities from Sensor Data In: Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence IJCAI, 2015. aaai.org, pp 1617–1623

  28. Liu Y, Tang J, Xie T (2014) Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map. Opt Laser Technol 60:111–115

    Article  Google Scholar 

  29. Liu Y, Tong X, Ma J (2015) Image encryption algorithm based on hyper-chaotic system and dynamic S-box. Multimedia Tools Appl 1–21

  30. Liu Y, Zhang L, Nie L, Yan Y, Rosenblum DS (2016) Fortune Teller: Predicting Your Career Path. In: Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence AAAI, 2016. aaai.org, pp 201–207

  31. Liu L, Zhang Q, Wei X (2012) A RGB image encryption algorithm based on DNA encoding and chaotic map. J Comput Electric Eng 28(5):1240–1248

    Article  Google Scholar 

  32. Matthews R (1989) On the derivation of a chaotic encryption algorithm. Cryptologia XIII 1:29–42

    Article  MathSciNet  Google Scholar 

  33. Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel subimage encryption with hyperchaos. Nonlinear Dyn 67:557–566

    Article  Google Scholar 

  34. Murillo-Escobar MA, Cryz-Hernandez C, Abundiz-Pérez F, Lopez-Gutiérrez RM, Del Campo ORA (2015) A RBG image encryption algorithm based on total plain image characteristics and chaos. Signal Process 109:119–131

    Article  Google Scholar 

  35. Noura, M, Noura, H, Chehab A, Mansour M M, Sleem M, Couturier R (2018) A dynamic approach for a lightweight and secure cipher for medical images. Multimed Tools Appl 1–19

  36. Pandurang HT, Kumar N, Kiran SK (2014) Image encryption based on permutation-substitution using chaotic map and Latin square image cipher. The European Physical J-Spec Topics 223(8):1663–1677

    Article  Google Scholar 

  37. Parvin Z, Seyedarabi H, Shamsi M (2014) A new secure and sensitive image encryption scheme based on new substitution with chaotic function, Multimed Tools Appl 1–18

  38. Schneier B (1996) Applied cryptography-protocols, algorithms, and source code in C, 2nd edn. Wiley, Hoboken

    MATH  Google Scholar 

  39. Sheela S J, Suresh K V, Tandur D (2018) Image encryption based on modified Henon map using hybrid chaotic shift transform. Multimed Tools Appl 1–29

  40. Skiadas CH, Skiadas C (2009) Chaotic Modelling and Simulation; Analysis of Chaotic Models, Attractors and Forms. Chapman & Hall/CRC Taylor & Francis Group, New York

    MATH  Google Scholar 

  41. Song C-Y, Qia Y-L, Zhang X-Z (2013) An image encryption scheme based on new spatiotemporal chaos. Optik 124:3329–3334

    Article  Google Scholar 

  42. Wang X, Liu L, Zhang Y (2015) A Novel Chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18

    Article  Google Scholar 

  43. Wang X, Luan D, Bao X (2014) Cryptanalysis of an image encryption algorithm using Chebyshev generator. Digital Signal Process 25:244–247

    Article  Google Scholar 

  44. Wang X, Qiang W (2014) A Novel image encryption algoritm based on dynamic S-boxes constructed by chaos. Nonlinear Dyn 75:567–576

    Article  Google Scholar 

  45. Wang W, Si M, Pang Y, Ran P, Wang H, Jiang X, Liu Y, Wub J, Wu W, Chilamkurti N, Jeon G (2018) An encryption algorithm based on combined chaos in body area networks. Comput Electr Eng 65:282–291

    Article  Google Scholar 

  46. Wang W, Tan H, Sun P, Yu P, Ren B (2015) A novel digital image encryption algorithm based on wavelet transform and multi-chaos. In: Proceeding of the International Conference Wireless Communications and Sensor Network, WCSN 2015, pp 711–71946.

  47. Wang X-Y, Zhang Y-Q, Liu L-T (2016) An enhanced sub-image encryption method. Opt Lasers Eng 86:248–254

    Article  Google Scholar 

  48. Wua X, Kan H, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24–39

    Article  Google Scholar 

  49. Yang B, Liao X (2018) A new color image encryption scheme based on logistic map over the finite field ZN. Multimed Tools Appl 1–19

  50. Yang H, Wong K-W, Liao X, Zhang W, Wei P (2010) A fast image encryption and authentification scheme based on chaotic maps. Commun Nonlinear Sci Numer Simul 15:3507–3517

    Article  Google Scholar 

  51. Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. J Math Comput Modeling 52:2028–2035

    Article  MathSciNet  Google Scholar 

  52. Zhang X, Nie W, Ma Y et al (2017) Cryptanalysis and improvement of an image encryption algorithm based on hyper-chaotic system and dynamic S-box. Multimed Tools Appl 76(14):15641–15659

    Article  Google Scholar 

  53. Zhang Y-Q, Wang X-Y (2014) Analysis and improvement of a chaotic-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn 77(4):687–698

    Article  Google Scholar 

  54. Zhang W, Yu H, Zhao Y-I, Zhu Z-L (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36–50

    Article  Google Scholar 

  55. Zhang LB, Zhu ZL, Yang BQ, Liu W-Y, Zhug H-F, Zou M (2015) Cryptanalysis and improvement of an efficient and secure medical image protection scheme. Math Probl Eng 2015:1–11

    Google Scholar 

  56. Zhou Y, Bao L, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182

    Article  Google Scholar 

  57. Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181:1171–1186

    Article  Google Scholar 

Download references

Acknowledgement

The authors wish to thank Professor Barbara ATOGHO-TIEDEU for proof reading the manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alain Tiedeu.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nkandeu, Y.P.K., Tiedeu, A. An image encryption algorithm based on substitution technique and chaos mixing. Multimed Tools Appl 78, 10013–10034 (2019). https://doi.org/10.1007/s11042-018-6612-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6612-2

Keywords

Navigation