1 Introduction

In recent era of science and technology digital information become a basic currency to nations. The ultimate goal of the digital communication is to transmit information with ease within no time. The faith of the nation’s precisely depends on its secret information. The privacy of digital information is one of the unavoidable issues of the digitally advanced fifth generation communications. The digital information are nowadays places in the form of bits in different national and multinational organizations databanks. The digital contents are now in the form of images, audio and video files. The digital information is accessed and available largely on different social and web links. In order to secure the secret information different data security techniques were designed which includes classical and modern encryption schemes. The classical encryption schemes either utilized substitution or permutation [20,21,22, 24, 25, 35]. This means that idea of confusion and diffusion proposed by Claude Shannon, were used separately before 1949. Nowadays, modern encryption mechanisms particularly private encryption schemes use both confusion, diffusion and number of rounds in a combined fashion. The most famous block ciphers which were based on idea of confusion and diffusion were international data encryption algorithm (IDEA), data encryption standard (DES) and advanced encryption standard (AES) and their different variants [23, 26]. Designing of new encryption methodology is one of the prominent area of research in information security. Several adaptations were proposed in standard encryption schemes in order to deploy them in different environments. Moreover, numerous encryption algorithms were designed in order to secure the digital information. The encryption algorithms which are in fashion nowadays are chaos based cryptosystems. The fundamental characteristics of chaos are quite related with cryptography which make it possible to equally utilize chaos in encryption of digital information. The sensitivity of chaotic parameters and initial state dependency are the famous characteristics of chaos which were utilized in order to ensure the confusion and diffusion characteristics in designed encryption scheme [2,3,4,5, 11, 15, 31, 36, 38, 39, 42,43,44,45].

Chaotic dynamical systems, which are the building blocks of any chaotic encryption. These systems can be characterized into discrete and continuous chaotic systems [7, 8, 10, 14, 33]. Discrete chaotic systems utilize an arrangement of different chaotic iterative maps, while the continuous chaotic frameworks are can be represented by differential equations. The development of chaos theory in the field of information security from last one decade is quite promising. The idea of confusion and diffusion developed by Shannon in 1949 can be achieved by utilizing different chaotic systems. There are fundamentally two domains of digital image namely spatial and frequency. Several image encryption techniques based on chaotic systems were developed based on spatial and frequency domains. In spatial domains, most significant and least significant bits are two basic components. The nonlinear chaotic systems were operated either on most significant and least significant bits or as a whole n-bits of a pixel. Another important classification in spatial domain chaotic image encryption is selective image encryption techniques which reduces the computational in processing of digital image enciphering in real time encryption. The second most important class of chaotic image encryption techniques is frequency based design mechanisms. These schemes fundamentally used different frequency filters in order to encrypt the digital contents. Numerous transforms such as discrete cosine and sine transform, fast Fourier transform and wavelets transform were used to encrypt images along with chaotic dynamical systems [1, 6, 9, 12, 13, 16,17,18,19, 26,27,28,29,30, 32, 34, 37, 41]. Our scheme is based on discrete chaotic dynamical systems namely Henon map, circle map and duffing map. The principle aim of article is to utilize multiple chaotic maps in order to achieve strong confusion and diffusion with minimum rounds. The decrease in number of round surely minimize the computational cost which of the important aspects of modern cryptosystems.

The rest of the paper is prepared as follows. In Section 2, we have discussed some relationships between chaos and cryptography. In Section 3, we have presented the proposed encryption algorithm. The performance analyses are placed in Section 4. Finally, we have ended our article with conclusion in Section 5.

2 Chaos and cryptography

Chaos is branch of mathematics which deals with the study of behavior of dynamical systems. These systems are highly sensitive to initial conditions and chaotic parameters. Some well-known properties of chaos comprise topology mixing, strange attractor, ergodicity, randomness and dependence on its initial conditions [7, 8, 10, 14, 33]. These properties attract to make strong cryptosystem algorithm for security against advertisers. Chaotic systems show high randomness in its output and exhibit unique properties. Without the knowledge of its parameters, chaotic system become not deterministic. This property show that it is suitable for designing good cryptographic algorithms. For good chaotic output, we must know initial condition of supposed map. If we know initial conditions of the map, then it became deterministic for us. These chaotic properties can be utilized for different cryptosystem though substitution can be borne out very meticulously. The important property of sensitive to initial conditions ascertain ease in the implementation of cryptosystem and provide hurdle in the path for malicious person. For encounter cryptanalysis, we have proposed nonlinear system with property of confusion and diffusion. Basic flow diagram for the chaotic encryption is given in Fig. 1.

Fig. 1
figure 1

Basic schematic system model for image encryption

2.1 Basic features of chaotic systems

Chaos was witnessed in various natural systems for instance biology, ecology, physics, electronics, meteorology economics, computer science and engineering. These cases show, as stated before, show particular assets that form them unpredictable along with complex system. The chaos theory contracts with systems that exhibit a special kind of dynamical behavior in time. Usually chaos occurs in a nonlinear deterministic dynamical systems (NLDS). It is clear that chaos occurs when there is a continuous and rough-looking persistent change to the mathematician criteria. There is a set of characteristics that observed the professional in chaotic systems. The mathematical criteria for chaos are defined. The most relevant are [21]:

  • Dynamic instability

This criterion is also denoted as butterfly effect, it is the feature of sensitivity to initial conditions, where two subjectively closed initial conditions changes with significantly divergent and different trajectories.

  • Topological mixing

Topological mixing instinctively described as mixing colored dyes, it means that the system will change during time so that any known area of states is always overlaps or converted with any other known area.

  • Aperiodicity

The system in the orbit never replicate itself with the passage of time or non-periodic in nature.

  • Dense periodic orbits

Dense periodic orbits mean that the system follows some dynamics that can subjectively nearly approach every probable asymptotic state.

  • Ergodicity

Statistical measurement of variable that give analogous output irrespective of performance over space or time. The dynamics show same statistics properties when immediately observed over space and time.

  • Self-similarity

The progression of system, in space or time, show similarity at dissimilar measurement. This property makes unique system that look like auto-repetitive (repetition) at different measurement.

The connects between chaos and cryptography can be seen in Table 1 [21].

Table 1 Connection between chaos and cryptography

3 Proposed image encryption algorithm

In this section, we have presented our proposed encryption algorithm. We have used two properties of chaos that are confusion and diffusion while designing secure encryption scheme. Our proposed scheme utilized multiple one dimensional and two dimensional chaotic iterative maps in order to achieve the confusion and diffusion capabilities.

3.1 Maps for proposed cryptosystem

In this subsection, we have discussed the chaotic iterative maps which will be helpful for the construction of our image encryption technique.

3.1.1 Henon chaotic map

Two-dimensional discrete time dynamical map having good chaotic behavior. This map take points (xn, yn) and maps to a new point. Mathematically it can expressed as follows [21]:

$$ {x}_{n+1}=1-a{x}_n+{y}_n, $$
(1)
$$ {y}_{n+1}=b{x}_n, $$
(2)

where x0 and y0 are initial conditions of the map. This system performs chaos when setting parameters to x0 = 1.61001, y0 = 2.9996, a = 1.7085, b = 0.32032.

3.1.2 Rand block function

Rand block is use to generate blocks of image to randomize values of internal cell. This command help us in better permutation during image encryption.

3.1.3 Circle chaotic map

Circle map is one dimensional map and exhibit very good chaotic behavior when apply to any data. The mathematical form can be expressed as:

$$ {\theta}_{n+1}=\operatorname{mod}\left({\theta}_n+\varOmega -\frac{K}{2\pi}\sin \left(2\pi \left({\theta}_n\right)\right),1\right), $$
(3)

where θ0 = 0.4, Ω = 0.5 and θn + 1 is computed as mod 1 and K is constant. This map has basically two important parameters Ω and K, where Ω can be frequency that is being applied externally and K is spring constant.

3.1.4 Duffing chaotic map

The duffing map is two dimensional discrete time dynamical system that exhibit chaotic behavior. It take points (xn, yn) and give its output. Duffing map equation can be expressed in Eqs. (4)–(5) respectively:

$$ {x}_{n+1}={y}_n, $$
(4)
$$ {y}_{n+1}=-b{x}_n+a{y}_n-{y_n}^3, $$
(5)

where x0 =  − 1.5, y0 = 1.5, a = 2.738, b = 0.1534.

Steps involved in image encryption stage

  1. 1.

    Read an image of size 256 × 256 × 3 and transform into three channels (R, G, B).

  2. 2.

    In first phase (R, G, B) channels are divided into blocks of 32 × 32 cells, each cell having size of 8 × 8.

  3. 3.

    In second phase pixels are shuffled within blocks using two dimensional Henon chaotic map for each channel.

  4. 4.

    In third phase blocks are permuted of each respective channel.

  5. 5.

    In fourth phase pixels are distorted using one dimensional circle map.

  6. 6.

    Finally for better confusion, again bitwise XOR for each channel respectively using two dimensional discrete time duffing map.

Steps involved in image decryption stage

  1. 1.

    In first phase two dimensional duffing chaotic map is bitwise XOR for each channel with the output of step 5 in encryption stage.

  2. 2.

    In second phase reverse process bitwise XOR for each channel with circle map to get back random blocks of each channel.

  3. 3.

    In third phase inverse randblock is use to get uniform blocks with shuffled pixels as done in encryption stage step 3.

  4. 4.

    In fourth phase inverse Henon chaotic map is treated with the output of third phase to get unshuffled pixels.

  5. 5.

    In fifth phase output of fourth phase is retreated with inverse of first phase in encryption stage.

  6. 6.

    Finally image is treated with cat command to get back into decrypted plain image (Fig. 2).

Fig. 2
figure 2

Flow diagram for proposed encryption

4 Security analysis

Security analysis play an important role in reliability of encryption algorithms. The weakness of encryption algorithm make is possible for unauthorized person to examine secret information and try to use of different combination to get plaintext. We have examined our suggested encryption scheme against different statistical analysis that includes histogram analysis, mean square error (MSE), correlation coefficient test, peak signal to noise ratio (PSNR), entropy, plaintext sensitivity analysis.

4.1 Histogram analysis

Histogram is the way to represent pixel occurrences in digital images. In order to deceive the eavesdropper, the encryption algorithm must have a strong converge towards uniformity after successful application of enciphering scheme. Uniformity is one of the aspect of encrypted images to hide the actual content of digital images. We took standard Lena image of size 256 × 256 × 3 and divided into three respective channels (RGB). The histograms of each channel at plain level comprises sharp peaks whereas histograms of cipher images are distributed equally over the entire region with no sharp peaks (see Figs. 3, 4, 5, 6, 7 and 8). The investigation of histograms of encrypted images clearly reveals that projected algorithm does not provide any clue to passive and active eavesdropper to get any secret information easily due to uniformity of histograms.

Fig. 3
figure 3

a Lena image red channel; b Lena image green channel; c Lena image blue channel

Fig. 4
figure 4

a Lena red channel histogram; b Lena green channel histogram; c Lena blue channel histogram

Fig. 5
figure 5

a Encrypted red channel after circle map; b Encrypted green channel after circle map; c Encrypted blue channel after circle map

Fig. 6
figure 6

a Encrypted red channel histogram after circle map; b Encrypted green channel histogram after circle map; c Encrypted blue channel histogram after circle map

Fig. 7
figure 7

a Red encrypted channel after circle and duffing map; b Green channel encrypted after circle and duffing map; c Blue encrypted channel after circle and duffing map

Fig. 8
figure 8

a Encrypted red channel histogram after circle and duffing map; b Encrypted green channel histogram after circle and duffing map; c Encrypted blue channel histogram after circle and duffing

4.2 Correlation

In this segment, we have analyzed correlation between adjacent pixels which means similarity between pixels of image in three different directions i.e. vertical, horizontal and diagonal. The value of correlation coefficient (CC) lies within the interval [−1,1]. For totally uncorrelated image the value of CC quite closed to zero, whereas −1 corresponds to negative correlation and 1 belong to positive correlation. For cryptographically secure encryption algorithms CC remains closed to zero. We have added tables for three cases to examined the relation of adjacent pixels in three different directions i.e. vertically, horizontally and diagonally (see Figs. 9, 10, 11, 12, 13, 14, 15 and 16, Tables 2, 3 and 4). The mathematically expressions for correlation coefficient are given by:

$$ {\gamma}_{XY}=\frac{\delta_{XY}}{\sqrt{\delta_X^2{\delta}_Y^2}}, $$
(6)

where δXY is known as covariance of random variables X and Y, μX and μY are expected values of random variables and \( {\delta}_X^2 \) and \( {\delta}_Y^2 \) are variances respectively given below:

$$ {\delta}_{XY}=\sum \limits_{j=1}^N\frac{\left({X}_j-{\mu}_j\right)\left({Y}_j-{\mu}_Y\right)}{N},{\delta}_X^2=\sum \limits_{j=1}^N\frac{\left({X}_j-E{(X)}^2\right)}{N},{\delta}_Y^2=\sum \limits_{j=1}^N\frac{\left({Y}_j-E{(Y)}^2\right)}{N}. $$
(7)
Fig. 9
figure 9

a Plain image; b Horizontal correlation of plain image; c Diagonal correlation of plain image; d Vertical correlation of plain image

Fig. 10
figure 10

a Encrypted image; b Horizontal correlation of encrypted image; c Diagonal correlation of encrypted image; d Vertical correlation of encrypted image

Fig. 11
figure 11

a Red channel horizontal correlation of plain image; b Red channel diagonal correlation of plain image; c Red channel vertical correlation of plain image

Fig. 12
figure 12

a Red channel horizontal correlation of encrypted image; b Red channel diagonal correlation of encrypted image; c Red channel vertical correlation of encrypted image

Fig. 13
figure 13

a Green channel horizontal correlation of plain image; b Green channel diagonal correlation of plain image; c Green channel vertical correlation of plain image

Fig. 14
figure 14

a Green channel horizontal correlation of encrypted image; b Green channel diagonal correlation of encrypted image; c Green channel vertical correlation of encrypted image

Fig. 15
figure 15

a Blue channel horizontal correlation of plain image; b Blue channel diagonal correlation of plain image; c Blue channel vertical correlation of plain image

Fig. 16
figure 16

a Blue channel horizontal correlation of encrypted image b Blue channel diagonal correlation of encrypted image c Blue channel vertical correlation of encrypted image

Table 2 Correlation coefficient of various plain and encrypted images
Table 3 Correlation coefficient of red, green and blue channels for various images
Table 4 Comparison of correlation coefficient different direction

The linear relationship can be observed among the pixels of plain image (see Figs. 9, 11, 13, 15) and corresponding numerical value of CC is closed to unity (see Tables 2, 3 and 4). The application of our proposed image encryption scheme make it possible to break the neighboring relation among pixels. The value of CC reduces to zero which shows the strength of our anticipated technique (see Figs. 10, 12, 14, 16 and Tables 2, 3 and 4).

4.3 Mean square error

For authenticity we evaluated mean square error (MSE) for Lena plain and encrypted image which showed reliability of the proposed algorithm. (MSE) can be calculated as in Eq. (8):

$$ MSE=\frac{1}{M\times N}{\sum}_{i=1}^M{\sum}_{j=1}^N\left({A}_{\left(i,j\right)}-{Q}_{\left(i,j\right)}\right), $$
(8)

where Ai, j and Qi, j show pixels are positioned at ith row and jth column, M × N is the overall extent (size) of image of original and enciphered image respectively, MSE value must be large enough to provide robust security against different cryptographic attakcs (see Tables 5 and 6).

Table 5 MSE and PSNR values of red, green and blue channels for various images
Table 6 Comparison of average MSE and PSNR values with existing values of various images

4.4 Peak signal to noise ratio

Peak signal to noise ratio (PSNR) can be used to assess the quality of encryption technique. It is a measurement which indicates the changes in pixel values between the plaintext image and the ciphertext image [31]. The mathematical expression for PSNR is given in Eq. (9):

$$ PSNR=10{\log}_2\frac{{I^2}_{\mathrm{max}}}{MSE}, $$
(9)

where Imaxis maximum value of image, for better security the value for PSNR should be low enough to comply with good security (see Tables 5 and 6).

4.5 Entropy

Entropy analysis is measurable quantity which measure randomness in the information content of the test image. The entropy can be represented by the following expression:

$$ H=-{\sum}_{J=0}^{N-1}p\left({x}_j\right){\log}_bp\left({x}_j\right), $$
(10)

where p(xj) represent occurrence of probability of symbol xj. The theoretical value of entropy is 8 for 8-bit image and practical values through our offered scheme is 7.999, which is quite close to ideal value [23, 26, 31, 39, 42] (see Tables 7, 8, 9 and 10). This reveals that, our suggested encryption scheme based on multiple chaotic iterative maps is considerably increases the randomness among the pixel’s distribution of original image. The histogram of encrypted image is uniform and contain no similarity of plain image which makes it impossible for eavesdropper to extract any information.

Table 7 Entropy values of red, green and blue channels for various images
Table 8 Comparison of Entropy value for red, green and blue channels of Lena image
Table 9 Entropy values for various test images
Table 10 Comparison of proposed entropy value with existing values

4.6 Mean absolute error

Mean absolute error (MAE) is criterion (model) to inspect pursuance of resisting against differential aggression. We calculated mean absolute error (MAE) between original and encrypted images. MAE value must be large enough to ensure the robustness of cryptosystem. We evaluated our proposed scheme for the size of 256 × 256 × 3 test images. Let Ei, j and Fi, j be two grey level pixels at ith row and jth column of an image extent (size) M × N for both plain and enciphered image then Eq. (11) for two respectively images can be written as:

$$ MAE=\frac{1}{M\times N}{\sum}_{i=0}^{M-1}\sum \limits_{J=0}^{N-1}\mid \left({E}_{\left(i,j\right)}-{F}_{\left(i,j\right)}\right)\mid . $$
(11)

Table 11 show for both plain and cipher image grey level pixels at E(i, j)and F(i, j) respectively.

Table 11 MAE test analysis for Lena, Baboon and Pepper images

The MAE values of our offered chaos based algorithm is high as compared to other outcomes available in literature [23]. The clearly reveals that our anticipated algorithm is one of the best candidate for chaos based image encryption schemes.

4.7 Differential attacks analysis

Differential attack analysis is fundamentally fall into the chosen-plaintext attacks category [23]. The capability of battling against differential attacks is measured by comparing the differences between two ciphers images i-e., minor change in plain image results completely change in cipher image. Thus, much difference between encrypted forms is expected in order to keep high security. Number of pixels changing rate (NPCR) and unified average change intensity (UACI) become two widely used security analyses in the image encryption community for differential attacks. NPCR concentrates on the absolute number of pixels which changes value in differential attacks while the UACI focuses on the averaged difference between two paired cipher images [40].

4.7.1 Number of pixels changing rate

Number of pixels changing rate (NPCR) actually finds rate of change of pixels’ location amid plain and encrypted image. Here we take two encrypted images for NPCR test and had difference of only pixel, we represented cipher image with E1(i, j)and E2(i, j) whose analogous plain image have only pixel difference. An array V(i, j) can be calculated using E1(i, j)and E2(i, j) respectively though NPCR can be evaluated as in Eq. (12):

$$ NPCR=\frac{\left({\sum}_{i,j}{V}_{i,j}\right)}{W\times H}\times 100, $$
(12)

where Vi, j in above equation can be construe as:

$$ {V}_{i.j}=\Big\{{\displaystyle \begin{array}{l}0\kern1.5em {E}_{1\left(i,j\right)}={E}_{2\left(i,j\right)}\ \\ {}1\kern1.5em {E}_{1\left(i,j\right)}\ne \kern0.5em {E}_{2\left(i,j\right)}\end{array}} $$

4.7.2 Unified average change intensity

The unified average changing intensity (UACI) measures the average intensity of differences between the plain image and ciphered image and expression for UACI is given below:

$$ UACI=\frac{1}{W\times H}{\sum}_{i,j}\frac{\left[{E}_{1\left(i,j\right)}-{E}_{2\left(i,j\right)}\right]}{255}. $$
(13)

We have tested Lena image of size 256 × 256 × 3 as a test image for our proposed algorithm. We examined that larger unified average changing rate means our encryption algorithms is quite excellent and mark i.e. encryption performance increases. We showed input image one-pixel difference between two source images, the change that is made were almost 0.01% at input side of images for respected ciphered images. Results are tabulated in Tables 12 and 13.

Table 12 Channel wise NPCR and UACI test analysis
Table 13 Comparison of NPCR and UACI values

It is clear from Table 13 that the value of NPCR is greater 99.60% and that of UACI is greater than 33.35% which means that slight variation in a particular pixel of the original image consequences in a major modification of all the pixels of the encrypted image.

4.8 NIST analysis

NIST abbreviated as National Institute of Standards and Technology issued special publication (SP 800–22) of statistical tests i. e. random and pseudo random numbers for cryptography. This is one the most substantial observation and inspection. This test is basically applying on binary sequences main reason is that the encrypted (cipher) image at the output can be estimated as binary data stream file. The tests result of the cipher image Lena is given in Table 14.

Table 14 NIST test analysis for different layers of encrypted Lena image

The consequences of data entropy examination for the total arrangement of test pictures are recorded and compared in Tables 6, 7 and 8. These outcomes show that the proposed scheme gets ciphertext images whose entropy scores substantially nearer to the entropy upper bound than those encoded by different procedures. The more like zero the correlation coefficient is the weaker connection between the pixel succession and its adjoining pixel arrangement. Since the adjoining pixel succession is evidently removed from the horizontal, vertical and diagonal directions.

Figures 9, 10, 11, 12, 13, 14, 15 and 16, demonstrates the adjacent pixel correlation plots of the arbitrarily chosen 10,000 sets of nearby pixels along the horizontal, vertical and diagonal orders. The pixel distributions are stick towards the main diagonal which shows that the pixels of the original image are linearly correlated. But in case of encrypted images, the pixel’s linear relation is break with the application of proposed encryption scheme and consequently, we have scattered pixels’ distribution.

The adjacent pixel correlation results for different images are placed in Tables 2 and 3 and compassion of suggested techniques with already existing are available in Table 4. The results of the numerical values of correlation coefficient suggested that our proposed scheme is capable of adding confusion and removing pixels neighboring relation. The suggested technique dissociates nearby pixels in the plaintext picture after the encryption procedure. It beats the recorded encryption schemes [24, 35].

Tables 12 and 13 shows the values of NPCR (>99%) and UACI (≈33%) for each digital color image component for three commonly diverse standard images. By investigating obtained results clearly reflects that the estimated values of NPCR and UACI are very close to the theoretical values, which justify the validity of theoretical values. Therefore, the suggested enciphering technique is resistant against differential attacks.

The NIST suit is tested for the proposed image encryption technique. The NIST suit fundamentally consist of number of randomness tests used to examine the degree of randomness in any digital content for instance text, image, audio and video files. The results of NIST suit for our offered encryption scheme suggest that our scheme combat against different cryptographic attacks. The true values for each component in NIST suit must be greater than 0.01 in order to pass each tests. The results of NIST for encrypted digital image of Lena is calculated in Table 14. The closed investigation of Table 14, we can simply draw a conclusion that our proposed scheme clearly satisfies each tests of randomness.

5 Conclusion

In this paper we have introduced an encryption algorithm based on multiple chaotic maps with minimum rounds of encryption. The multiple chaotic map added confusion and diffusion capability projected encryption scheme. The suggested scheme is further tested against different encryption quality measures in order to gauge the strength of encryption technique. The results of performance suggested that the proposed scheme show better resistance against different attacks. The method can be extended to other multimedia contents such as audio and video files. All of the cryptographic strengths characteristics indicated that our suggested technique is appropriate for digital image encryption.