Skip to main content
Log in

A novel randomized one-dimensional chaotic Chebyshev mapping for chosen plaintext attack secure image encryption with a novel chaotic breadth first traversal

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

We construct a novel randomized chaotic image encryption algorithm based on the one-dimensional chaotic Chebyshev mappings. We first define a novel chaotic breadth-first search algorithm and then use it to apply the permutation to image pixels. We also use a novel approach to construct the diffusion matrix using a chaotic sequence. Using a one-dimensional chaotic mapping in constructing image encryption algorithm has the advantage of lower computational and space complexities compared to hyper-chaotic encryption schemes. Moreover, our design favors brute-force search attack resistance because of a sufficiently large key space, as well as providing CPA-security and robustness against noise and data loss scenarios. Finally, the security performance of our proposed method is investigated against statistical analysis, key-sensitivity analysis, and differential attack analysis which shows acceptable security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Bergamo P, D’Arco P, De Santis A, Kocarev L (2005) Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans Circuits Syst Regul Pap 52(7):1382–1393

    MathSciNet  MATH  Google Scholar 

  2. Briggs K (1990) An improved method for estimating liapunov exponents of chaotic time series. Phys Lett A 151(1-2):27–32

    MathSciNet  Google Scholar 

  3. Cao C, Sun K, Liu W (2018) A novel bit-level image encryption algorithm based on 2d-licm hyperchaotic map. Signal Process 143:122–133

    Google Scholar 

  4. Chai X, Gan Z, Chen Y, Zhang Y (2017) A visually secure image encryption scheme based on compressive sensing. Signal Process 134:35–51

    Google Scholar 

  5. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos, Solitons & Fractals 21(3):749–761

    MathSciNet  MATH  Google Scholar 

  6. Cheng P, Yang H, Wei P, Zhang W (2015) A fast image encryption algorithm based on chaotic map and lookup table. Nonlinear Dyn 79(3):2121–2131

    Google Scholar 

  7. Cormen TH, Leiserson CE, Rivest RL, Stein C (2009) Introduction to algorithms. MIT Press, Cambridge

    MATH  Google Scholar 

  8. Daemen J, Rijmen V (2013) The design of rijndael: AES-the advanced encryption standard. Springer Science & Business Media, Berlin

    MATH  Google Scholar 

  9. Eslami Z, Bakhshandeh A (2013) An improvement over an image encryption method based on total shuffling. Opt Commun 286:51–55

    Google Scholar 

  10. Gupta K, Silakari S (2012) Novel approach for fast compressed hybrid color image cryptosystem. Adv Eng Softw 49:29–42

    Google Scholar 

  11. Hermassi H, Rhouma R, Belghith S (2013) Improvement of an image encryption algorithm based on hyper-chaos. Telecommun Syst 52(2):539–549

    Google Scholar 

  12. Hu T, Liu Y, Gong LH, Guo SF, Yuan HM (2017) Chaotic image cryptosystem using DNA deletion and DNA insertion. Signal Process 134:234–243

    Google Scholar 

  13. Hua Z, Jin F, Xu B, Huang H (2018) 2d logistic-sine-coupling map for image encryption. Signal Process 149:148–161

    Google Scholar 

  14. Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 144:134–144

    Google Scholar 

  15. Huang C, Nien H (2009) Multi chaotic systems based pixel shuffle for image encryption. Opt Commun 282(11):2123–2127

    Google Scholar 

  16. Huang X (2012) Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn 67(4):2411–2417

    MathSciNet  Google Scholar 

  17. Kadir A, Hamdulla A, Guo WQ (2014) Color image encryption using skew tent map and hyper chaotic system of 6th-order cnn. Optik-International Journal for Light and Electron Optics 125(5):1671–1675

    Google Scholar 

  18. Khan M (2015) A novel image encryption scheme based on multiple chaotic s-boxes. Nonlinear Dyn 82(1-2):527–533

    MathSciNet  Google Scholar 

  19. Kocarev L, Tasev Z (2003) Public-key encryption based on Chebyshev maps. In: Proceedings of the 2003 international symposium on circuits and systems, 2003. ISCAS’03, vol 3. IEEE, pp III–III

  20. Li S, Chen G, Cheung A, Bhargava B, Lo KT (2007) On the design of perceptual mpeg-video encryption algorithms. IEEE Trans Circuits Syst Video Technol 17(2):214–223

    Google Scholar 

  21. Li XW, Lee IK (2015) Robust copyright protection using multiple ownership watermarks. Opt Express 23(3):3035–3046

    MathSciNet  Google Scholar 

  22. Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76 (20):20,739–20,753

    Google Scholar 

  23. Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146–156

    Google Scholar 

  24. Liao X, Yin J (2018) Two embedding strategies for payload distribution in multiple images steganography. In: 2018 IEEE International conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 1982–1986

  25. Lindell Y, Katz J (2014) Introduction to modern cryptography. Chapman and Hall/CRC, London

    MATH  Google Scholar 

  26. Liu H, Wang X, Kadir A (2013) Color image encryption using choquet fuzzy integral and hyper chaotic system. Optik-International Journal for Light and Electron Optics 124(18):3527–3533

    Google Scholar 

  27. Liu H, Wang X, et al. (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466

    Google Scholar 

  28. Liu HS, Xin XJ, Yin XL, Yu CX, Zhang Q (2009) An optimization scheme for generating of Chebyshev optical chaotic sequence. Acta Phys Sin 58(4):2231–2234

    Google Scholar 

  29. Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26–36

    Google Scholar 

  30. Mao Y, Chen G, Lian S (2004) A novel fast image encryption scheme based on 3d chaotic baker maps. Int J Bifurcation Chaos 14(10):3613–3624

    MathSciNet  MATH  Google Scholar 

  31. Mason J, Handscomb D (2003) Chebyshev polynomials. CRC Press Company, Boca Raton

    MATH  Google Scholar 

  32. Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71(3):1469–1497

    Google Scholar 

  33. Pak C, Huang L (2017) A new color image encryption using combination of the 1d chaotic map. Signal Process 138:129–137

    Google Scholar 

  34. Rhouma R, Meherzi S, Belghith S (2009) Ocml-based colour image encryption. Chaos, Solitons & Fractals 40(1):309–318

    MATH  Google Scholar 

  35. Rostami MJ, Shahba A, Saryazdi S, Nezamabadi-pour H (2017) A novel parallel image encryption with chaotic windows based on logistic map. Comput Electr Eng 62:384–400

    Google Scholar 

  36. Shakiba A (2019) A randomized CPA-secure asymmetric-key chaotic color image encryption scheme based on the Chebyshev mappings and one-time pad. Journal of King Saud University-Computer and Information Sciences

  37. Shakiba A, Hooshmandasl MR, Meybodi MA (2016) Cryptanalysis of multiplicative coupled cryptosystems based on the Chebyshev polynomials. Int J Bifurcation Chaos 26(07):1650,112

    MathSciNet  MATH  Google Scholar 

  38. Song CY, Qiao YL, Zhang XZ (2013) An image encryption scheme based on new spatiotemporal chaos. Optik-International Journal for Light and Electron Optics 124(18):3329–3334

    Google Scholar 

  39. Souyah A, Faraoun KM (2016) An image encryption scheme combining chaos-memory cellular automata and weighted histogram. Nonlinear Dyn 86(1):639–653

    MathSciNet  Google Scholar 

  40. Stallings W (2017) Cryptography and network security: principles and practice. Pearson, Upper Saddle River

    Google Scholar 

  41. Wang W, Si M, Pang Y, Ran P, Wang H, Jiang X, Liu Y, Wu J, Wu W, Chilamkurti N, et al. (2018) An encryption algorithm based on combined chaos in body area networks. Comput Electr Eng 65:282–291

    Google Scholar 

  42. Wang W, Tan H, Pang Y, Li Z, Ran P, Wu J (2016) A novel encryption algorithm based on dwt and multichaos mapping. Journal of Sensors 2016

  43. Wang X, Luan D, Bao X (2014) Cryptanalysis of an image encryption algorithm using Chebyshev generator. Digital Signal Process 25:244–247

    Google Scholar 

  44. Wang X, Wang Q, Zhang Y (2015) A fast image algorithm based on rows and columns switch. Nonlinear Dyn 79(2):1141–1149

    MathSciNet  Google Scholar 

  45. Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290–299

    Google Scholar 

  46. Wong K. w. (2002) A fast chaotic cryptographic scheme with dynamic look-up table. Phys Lett A 298(4):238–242

    MathSciNet  MATH  Google Scholar 

  47. Wu J, Liao X, Yang B (2018) Image encryption using 2d hénon-sine map and DNA approach. Signal Process 153:11–23

    Google Scholar 

  48. Wu X, Hu H, Zhang B (2004) Parameter estimation only from the symbolic sequences generated by chaos system. Chaos, Solitons & Fractals 22(2):359–366

    MATH  Google Scholar 

  49. Wu X, Wang D, Kurths J, Kan H (2016) A novel lossless color image encryption scheme using 2d dwt and 6d hyperchaotic system. Inf Sci 349:137–153

    Google Scholar 

  50. Wu X, Wang K, Wang X, Kan H (2017) Lossless chaotic color image cryptosystem based on DNA encryption and entropy. Nonlinear Dyn 90(2):855–875

    MathSciNet  MATH  Google Scholar 

  51. Wu Y, Zhou Y, Noonan JP, Agaian S (2014) Design of image cipher using latin squares. Inf Sci 264:317–339

    MathSciNet  MATH  Google Scholar 

  52. Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25

    Google Scholar 

  53. Yang YG, Tian J, Lei H, Zhou Y, Shi WM (2016) Novel quantum image encryption using one-dimensional quantum cellular automata. Inf Sci 345:257–270

    Google Scholar 

  54. Ye G, Pan C, Huang X, Zhao Z, He J (2018) A chaotic image encryption algorithm based on information entropy. Int J Bifurcation Chaos 28(01):1850,010

    MathSciNet  MATH  Google Scholar 

  55. Ye G, Wong KW (2012) An efficient chaotic image encryption algorithm based on a generalized arnold map. Nonlinear Dyn 69(4):2079–2087

    MathSciNet  Google Scholar 

  56. Yin Q, Wang C (2018) A new chaotic image encryption scheme using breadth-first search and dynamic diffusion. Int J Bifurcation Chaos 28(04):1850,047

    MathSciNet  Google Scholar 

  57. Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic s-box. Inf Sci 450:361–377

    MathSciNet  Google Scholar 

  58. Zhang Y, Xiao D (2014) An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simul 19 (1):74–82

    MATH  Google Scholar 

  59. Zhang Y, Zhang LY, Zhou J, Liu L, Chen F, He X (2016) A review of compressive sensing in information security field. IEEE Access 4:2507–2519

    Google Scholar 

  60. Zhen P, Zhao G, Min L, Jin X (2016) Chaos-based image encryption scheme combining dna coding and entropy. Multimed Tools Appl 75(11):6303–6319

    Google Scholar 

  61. Zhou Y, Bao L, Chen CP (2013) Image encryption using a new parametric switching chaotic system. Signal Process 93(11):3039–3052

    Google Scholar 

  62. Zhou Y, Bao L, Chen CP (2014) A new 1d chaotic system for image encryption. Signal Process 97:172–182

    Google Scholar 

  63. Zhou Y, Hua Z, Pun CM, Chen CP (2015) Cascade chaotic system with applications. IEEE Transactions on Cybernetics 45(9):2001–2012

    Google Scholar 

Download references

Acknowledgements

The author gratefully acknowledges and is in debt of the helpful comments and suggestions of the reviewers, which have improved the presentation and the technicality of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ali Shakiba.

Ethics declarations

Conflict of interests

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shakiba, A. A novel randomized one-dimensional chaotic Chebyshev mapping for chosen plaintext attack secure image encryption with a novel chaotic breadth first traversal. Multimed Tools Appl 78, 34773–34799 (2019). https://doi.org/10.1007/s11042-019-08071-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08071-5

Keywords

Navigation