Skip to main content
Log in

Image encryption based on a combination of multiple chaotic maps

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Recent years have seen a rapid evolution of digital communications and an immense use of image transmissions over unsecured links. More specifically, some domains require the exchange of images depicting sensitive information, such as fingerprints, medical records and government or military satellite images. This creates a major challenge for researchers to come up with efficient and effective image encryption schemes. On the other hand, chaotic maps have proven suitable for such applications. This is because they exhibit characteristics such as ergodicity and sensitivity to control parameters and initial conditions. In this paper, an image encryption confusion-diffusion technique is proposed. First, the image pixels are disarranged resulting in a shuffled one which is then diffused through XORing its pixels with a secret key. This key is generated from a combination of different chaotic maps. Performance of the proposed scheme is evaluated utilizing various metrics. The proposed scheme is shown to be robust against differential attacks and resistant to statistical attacks. Its running time is very small which guarantees its efficiency and suitability for real time applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. AbdelRaouf A (2021) A new data hiding approach for image steganography based on visual color sensitivity. Multimedia Tools and Applications 80 (15):23393–23417

    Article  Google Scholar 

  2. Alexan W, El Beheiry M, Gamal-Eldin O (2020) A comparative study among different mathematical sequences in 3d image steganography. International Journal of Computing and Digital Systems 9(4):545–552

    Article  Google Scholar 

  3. Alexan W, ElBeltagy M, Aboshousha A (2021) Lightweight image encryption: Cellular automata and the lorenz system. In: 2021 International Conference on Microelectronics (ICM), pp 34–39

  4. Alexan W, Elkhateeb A, Mamdouh E, Al-Seba’Ey F, Amr Z, Khalil H (2021) Utilization of corner filters, aes and lsb steganography for secure message transmission. In: 2021 International Conference on Microelectronics (ICM), pp 29–33

  5. Alexan W, Hemeida F (2019) Security through blowfish and lsb bit–cycling with mathematical sequences. In: 2019 Signal Processing: Algorithms, Architectures, Arrangements, and Applications (SPA). IEEE, pp 229–234

  6. Alexan W, Mamdouh E, Elkhateeb A, Al-Seba’ey F, Amr Z, Khalil H (2021) Securing sensitive data through corner filters, chaotic maps and lsb embedding. In: 2021 3rd Novel Intelligent and Leading Emerging Sciences Conference (NILES), pp 359–364

  7. Arnold VI, Avez A (1968) Ergodic problems of classical mechanics (Vol. 9). Benjamin

  8. Dbsawie MA, Zabadani MA, ALJabbouli H (2021) A high payload double secured video steganography based on aes encryption and bch code. In: 2021 IEEE International Conference on Computing (ICOCO), pp 122–128

  9. Elkandoz MT, Alexan W, Hussein HH (2019) Logistic sine map based image encryption. In: 2019 Signal Processing: Algorithms, Architectures, Arrangements, and Applications (SPA). IEEE, pp 290–295

  10. Farrag S, Alexan W (2020) Secure 3d data hiding technique based on a mesh traversal algorithm. Multimedia Tools and Applications 79(39):29289–29303

    Article  Google Scholar 

  11. Ganwani P, Gupta L, Jain C, Kulkarni R, Chaudhari S (2021) Lsb based audio steganography using rsa and chacha20 encryption. In: 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT), pp 1–6

  12. Garcés H, Flores BC (2006) Statistical analysis of bernoulli, logistic, and tent maps with applications to radar signal design. In: Radar Sensor Technology X, vol 6210, International Society for Optics and Photonics, p 62100G

  13. Ge B, Chen X, Chen G, Shen Z (2021) Secure and fast image encryption algorithm using hyper-chaos-based key generator and vector operation. IEEE Access 9:137635–137654. https://doi.org/10.1109/ACCESS.2021.3118377

    Article  Google Scholar 

  14. Ghamsarian N, Khademi M (2020) Undetectable video steganography by considering spatio-temporal steganalytic features in the embedding cost function. Multimedia Tools and Applications 79:18909–18939

    Article  Google Scholar 

  15. Gong L, Qiu K, Deng C, Zhou N (2019) An image compression and encryption algorithm based on chaotic system and compressive sensing. Optics & Laser Technology 115:257–267

    Article  Google Scholar 

  16. Hamza R, Muhammad K, Lv Z, Titouna F (2017) Secure video summarization framework for personalized wireless capsule endoscopy. Pervasive and Mobile Computing 41:436–450

    Article  Google Scholar 

  17. Hasanzadeh E, Yaghoobi M (2019) A novel color image encryption algorithm based on substitution box and hyper-chaotic system with fractal keys. Multimedia Tools and Applications 79(11):7279–7297

    Google Scholar 

  18. Hemeida F, Alexan W, Mamdouh S (2019) Blowfish–secured audio steganography. In: 2019 Novel Intelligent and Leading Emerging Sciences Conference (NILES), vol 1. IEEE, pp 17–20

  19. Hu X, Wei L, Chen W, Chen Q, Guo Y (2020) Color image encryption algorithm based on dynamic chaos and matrix convolution. IEEE Access 8:12452–12466

    Article  Google Scholar 

  20. Hua Z, Zhou Y, Pun C-M, Chen CL Philip (2014) Image encryption using 2d logistic-sine chaotic map. In: 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, pp 3229–3234

  21. Huang C-K, Nien H-H (2009) Multi chaotic systems based pixel shuffle for image encryption. Optics communications 282(11):2123–2127

    Article  Google Scholar 

  22. Jithin KC, Sankar S (2020) Colour image encryption algorithm combining, arnold map, dna sequence operation, and a mandelbrot set. Journal of Information Security and Applications 50:102428

    Article  Google Scholar 

  23. Jung K-H (2016) A survey of reversible data hiding methods in dual images. IETE Tech Rev 33(4):441–452

    Article  Google Scholar 

  24. Khan M, Masood F (2019) A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimedia Tools and Applications 78(18):26203–26222

    Article  Google Scholar 

  25. Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput & Applic 26(5):1137–1148

    Article  Google Scholar 

  26. Kuznetsov A, Smirnov O, Zhora V, Onikiychuk A, Pieshkova O (2021) Hiding messages in audio files using direct spread spectrum. In: 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), vol 1, pp 414–418

  27. Liu H, Kadir A (2015) Asymmetric color image encryption scheme using 2d discrete-time map. Signal Processing 113:104–112

    Article  Google Scholar 

  28. Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16-17):3895–3903

    Article  Google Scholar 

  29. Liu L, Miao S (2017) An image encryption algorithm based on baker map with varying parameter. Multimedia Tools and Applications 76(15):16511–16527

    Article  Google Scholar 

  30. Mashaly M, El Saied A, Alexan W, Khalifa A S (2019) A multiple layer security scheme utilizing information matrices. In: 2019 Signal Processing: Algorithms, Architectures, Arrangements, and Applications (SPA). IEEE, pp 284–289

  31. Matthews R (1989) On the derivation of a “chaotic” encryption algorithm. Cryptologia 13(1):29–42

    Article  MathSciNet  Google Scholar 

  32. Melman A, Evsutin O (2021) On the efficiency of metaheuristic optimization for adaptive image steganography in the dft domain. In: 2021 XVII International Symposium “Problems of Redundancy in Information and Control Systems” (REDUNDANCY), pp 49–54

  33. Moussa Y, Alexan W (2020) Message security through aes and lsb embedding in edge detected pixels of 3d images. In: 2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES), pp 224–229

  34. Niyat AY, Moattar MH, Torshiz MN (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt Lasers Eng 90:225–237

    Article  Google Scholar 

  35. Norouzi B, Mirzakuchaki S (2014) A fast color image encryption algorithm based on hyper-chaotic systems. Nonlinear Dynamics 78(2):995–1015

    Article  Google Scholar 

  36. Patidar V, Pareek NK, Purohit G, Sud KK (2010) Modified substitution–diffusion image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 15(10):2755–2765

    Article  MathSciNet  Google Scholar 

  37. Rhouma R, Meherzi S, Belghith S (2009) Ocml-based colour image encryption. Chaos, Solitons & Fractals 40(1):309–318

    Article  Google Scholar 

  38. Samir A, Alexan W, ElDin R T, El-Rafei A (2020) 3d steganography by random shuffling of image contents using residue model. In: 2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA), pp 912–918

  39. Slimane N B, Aouf N, Bouallegue K, Machhout M (2018) A novel chaotic image cryptosystem based on dna sequence operations and single neuron model. Multimedia Tools and Applications 77(23):30993–31019

    Article  Google Scholar 

  40. Tang H-C (2007) An analysis of linear congruential random number generators when multiplier restrictions exist. European journal of operational research 182 (2):820–828

    Article  MathSciNet  Google Scholar 

  41. Vakani H, Abdallah S, Kamel I, Rabie T, Baziyad M (2021) Dct-in-dct: A novel steganography scheme for enhanced payload extraction quality. In: 2021 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT), pp 201–206

  42. van Harten M (2018) The dynamics of the one-dimensional tent map family and quadratic family, Ph.D. dissertation

  43. Wang Y, Wu C, Kang S, Wang Q, Mikulovich VI (2020) Multi-channel chaotic encryption algorithm for color image based on dna coding. Multimedia Tools and Applications 79(25):18317–18342

    Article  Google Scholar 

  44. Wu D-C, Shih Z-N, Wu J-H (2022) Modified multiway pixel-value differencing methods based on general quantization ranges for image steganography. IEEE Access 10:8824–8839. https://doi.org/10.1109/ACCESS.2021.3138895

    Article  Google Scholar 

  45. Wu X, Kurths J, Kan H (2018) A robust and lossless dna encryption scheme for color images. Multimedia Tools and Applications 77(10):12349–12376

    Article  Google Scholar 

  46. Wu X, Wang K, Wang X, Kan H (2017) Lossless chaotic color image cryptosystem based on dna encryption and entropy. Nonlinear Dynamics 90(2):855–875

    Article  MathSciNet  Google Scholar 

  47. Wu X, Wang K, Wang X, Kan H, Kurths J (2018) Color image dna encryption using nca map-based cml and one-time keys. Signal Process 148:272–287

    Article  Google Scholar 

  48. Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25

    Article  Google Scholar 

  49. Yang B, Liao X (2018) A new color image encryption scheme based on logistic map over the finite field zn. Multimedia Tools and Applications 77(16):21803–21821

    Article  Google Scholar 

  50. Yang F, Mou J, Sun K, Cao Y, Jin J (2019) Color image compression-encryption algorithm based on fractional-order memristor chaotic circuit. IEEE Access 7:58751–58763

    Article  Google Scholar 

  51. Yasser S, Hesham A, Hassan M, Alexan W (2020) Aes-secured bit-cycling steganography in sliced 3d images. In: 2020 International Conference on Innovative Trends in Communication and Computer Engineering (ITCE). IEEE, pp 227–231

  52. Younas I, Khan M (2018) A new efficient digital image encryption based on inverse left almost semi group and lorenz chaotic system. Entropy 20(12):913

    Article  Google Scholar 

  53. Zhang X, Wang L, Wang Y, Niu Y, Li Y (2020) An image encryption algorithm based on hyperchaotic system and variable-step josephus problem. International Journal of Optics 2020:15. https://doi.org/10.1155/2020/6102824

    Article  Google Scholar 

  54. Zhang Y-Q, He Y, Li P, Wang X-Y (2020) A new color image encryption scheme based on 2dnlcml system and genetic operations. Opt Lasers Eng 128:106040

    Article  Google Scholar 

  55. Zhang Y-Q, Wang X-Y (2014) A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf Sci 273:329–351

    Article  Google Scholar 

  56. Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic s-box. Inf Sci 450:361–377

    Article  MathSciNet  Google Scholar 

Download references

Funding

This research received no external funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wassim Alexan.

Ethics declarations

Conflict of Interest

The authors declare no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Elkandoz, M.T., Alexan, W. Image encryption based on a combination of multiple chaotic maps. Multimed Tools Appl 81, 25497–25518 (2022). https://doi.org/10.1007/s11042-022-12595-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-12595-8

Keywords

Navigation