Skip to main content

A Novel Image Encryption Technique Using Multiple One Dimensional Chaotic Map

  • Conference paper
  • First Online:
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020) (SoCPaR 2020)

Abstract

In cryptography, chaotic systems are commonly used for image encryption due to the complex properties of chaos such as sensitivity to initial conditions, unpredictability, and ergodicity. An image encryption method using one-dimensional chaotic maps and Josephus permutation sequence is depicted in this paper. The keystreams required for the encryption process are generated from one-dimensional chaotic maps. Double scrambling operation is proposed in the pixel permutation phase to enhance security. Josephus permutation sequence is used in the first level scrambling. For the second level of scrambling, a novel method is implemented using the keystream generated from a chaotic tent map. Also, the keystream generated from the logistic map is used in the substitution phase. Experimental results and security analysis shows that the proposed encryption scheme can resist various attacks and ensures high security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Lorenz, E.N., Haman, K.: The essence of chaos. Pure Appl. Geophys. 147(3), 598–599 (1996)

    Google Scholar 

  2. Wu, X., Zhu, B., Hu, Y., Ran, Y.: A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access 5, 6429–6436 (2017)

    Google Scholar 

  3. Wang, X., Wang, S., Wei, N., Zhang, Y.: A novel chaotic image encryption scheme based on hash function and cyclic shift. IETE Tech. Rev. 36(1), 39–48 (2019)

    Article  Google Scholar 

  4. Shahna, K.U., Mohamed, A.: A novel image encryption scheme using both pixel level and bit level permutation with chaotic map. Appl. Soft Comput. 90, 106162 (2020)

    Article  Google Scholar 

  5. Kar, M., Kumar, A., Nandi, D., Mandal, M.K.: Image encryption using DNA coding and hyper chaotic system. IETE Tech. Rev. 37, 1–12 (2018)

    Google Scholar 

  6. Fu, X.Q., Liu, B.C., Xie, Y.Y., Li, W., Liu, Y.: Image encryption-then-transmission using DNA encryption algorithm and the double chaos. IEEE Photon. J. 10(3), 1–15 (2018)

    Google Scholar 

  7. Ge, R., Yang, G., Wu, J., Chen, Y., Coatrieux, G., Luo, L.: A novel chaos-based symmetric image encryption using bit-pair level process. IEEE Access 7, 99470–99480 (2019)

    Article  Google Scholar 

  8. Xu, L., Li, Z., Li, J., Hua, W.: A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 78, 17–25 (2016)

    Article  Google Scholar 

  9. Ye, G., Huang, X.: An image encryption algorithm based on autoblocking and electrocardiography. IEEE Multimedia 23(2), 64–71 (2016)

    Article  Google Scholar 

  10. Shahna, K., Mohamed, A.: An image encryption technique using logistic map and Z-order curve. In: 2018 International Conference on Emerging Trends and Innovations in Engineering and Technological Research (ICETIETR), pp. 1–6. IEEE (2018)

    Google Scholar 

  11. Zhang, W., Wong, K.W., Yu, H., Zhu, Z.L.: An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun. Nonlinear Sci. Numer. Simul. 18(8), 2066–2080 (2013)

    Article  MathSciNet  Google Scholar 

  12. Hua, Z., Zhou, Y.: Image encryption using 2D Logistic-adjusted-Sine map. Inf. Sci. 339, 237–253 (2016)

    Article  Google Scholar 

  13. Niyat, A.Y., Moattar, M.H., Torshiz, M.N.: Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt. Lasers Eng. 90, 225–237 (2017)

    Article  Google Scholar 

  14. Norouzi, B., Mirzakuchaki, S.: A fast color image encryption algorithm based on hyper-chaotic systems. Nonlinear Dyn. 78(2), 995–1015 (2014)

    Article  Google Scholar 

  15. Zhu, C.: A novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun. 285(1), 29–37 (2012)

    Article  Google Scholar 

  16. Desheng, X., Yueshan, X.: Digital image scrambling based on Josephus traversing. Comput. Eng. Appl. 10, 44–46 (2005)

    Google Scholar 

  17. Ye, G., Huang, X., Zhu, C.: December. Image encryption algorithm of double scrambling based on ASCII code of matrix element. In: 2007 International Conference on Computational Intelligence and Security (CIS 2007), pp. 843–847. IEEE (2007)

    Google Scholar 

  18. Yang, G., Jin, H., Bai, N.: Image encryption using the chaotic Josephus matrix. Math. Probl. Eng. 2014, 632060 (2014)

    MathSciNet  MATH  Google Scholar 

  19. Wang, X., Zhu, X., Zhang, Y.: An image encryption algorithm based on Josephus traversing and mixed chaotic map. IEEE Access 6, 23733–23746 (2018)

    Article  Google Scholar 

  20. Furht, B., Kirovski, D. (eds.): Multimedia Security Handbook. CRC Press, Boca Raton (2004)

    Google Scholar 

  21. Shahna, K., Mohamed, A.: An image encryption method using Henon map and Josephus traversal. In: 2018 World Congress on Information and Communication Technologies (WICT). Advances in Intelligent Systems and Computing, Springer (2018)

    Google Scholar 

  22. Bakhshandeh, A., Eslami, Z.: An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Opt. Lasers Eng. 51(6), 665–673 (2013)

    Article  Google Scholar 

  23. Guo, Y., Shao, L.P., Yang, L.: Bit-level image encryption algorithm based on Josephus and Henon chaotic map. Appl. Res. Comput. 32(4), 1131–1137 (2015)

    Google Scholar 

  24. Wang, S., Wang, C., Xu, C.: An image encryption algorithm based on a hidden attractor chaos system and the Knuth-Durstenfeld algorithm. Opt. Lasers Eng. 128, 105995 (2020)

    Article  Google Scholar 

  25. Wang, M., Wang, X., Zhang, Y., Gao, Z.: A novel chaotic encryption scheme based on image segmentation and multiple diffusion models. Opt. Laser Technol. 108, 558–573 (2018)

    Article  Google Scholar 

Download references

Acknowledgment

Authors acknowledge the support from DST-PURSE (Phase - II), Government of India.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shahna, K.U., Mohamed, A. (2021). A Novel Image Encryption Technique Using Multiple One Dimensional Chaotic Map. In: Abraham, A., et al. Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020). SoCPaR 2020. Advances in Intelligent Systems and Computing, vol 1383. Springer, Cham. https://doi.org/10.1007/978-3-030-73689-7_84

Download citation

Publish with us

Policies and ethics