Abstract
In the present work, an encryption/decryption technique, using a new bit-level scrambling and a new diffusion algorithm is presented. The proposed system uses a modified Chua’s circuit (MCC) for the chaotic number generation for the first time to our knowledge. In 2006, the MCC, which exhibited a hyper-chaotic behavior for a wide parameter regime due to its double frequency excitation feature was suggested by one of the authors of the present paper. However, it has not been used for secure communication issues. According to present technique, the generated data are transformed to the developed algorithm for the encryption and decryption purposes. Following the encryption procedure, the encrypted colored images are evaluated by a variety of tests including the analyses of secret key size, secret key sensitivity, histogram, correlation, differential attack, information entropy, and noise attack. The results prove that the suggested colored image encryption/decryption technique is satisfactory for the secure communication issues in terms of efficiency and speed.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
In the present world, the information technologies rapidly grow. That reality enforces one to apply new methodologies on the image security in many fields from companies to the public services [1, 2]. Today, secure communication becomes very important issue for industrial production departments, defense industry and private usage [3, 4]. Especially, the image ciphering concept has become a vital task to prevent the information theft for important industrial projects and military applications.
For any secret communication issue, the techniques of the cryptography have taken attention of the community. However, traditional encryption methods such as DES, AES, and IDEA have some security flaws, because there are many tools to decrypt the images, which have been ciphered with conventional techniques [4,5,6]. Among them, some tools can be mentioned as correlation, histogram and bulky data [7, 8]. In order to avoid this insecure situation, improving innovative encryption techniques is a vital task [5, 6].
Among the secure communication issues, the encryption of color images stays in a special stage. In principle, there exist two main processes [9, 10] (i.e. permutation and diffusion). These processes can be used for image encryption, but the implementation of only one of these stages at a bit or pixel level will not provide required security. Thus, the encryption procedures should be improved further than any decryption techniques to avoid from the insecure image communication. For instance, applying only the exchange procedure in the bit level can give satisfactory results in both permutation and diffusion stages [6, 11]. According to the literature, [11, 12] those characteristics meet the basic requirements of any kind of image encryption system. Many scientists and researchers used chaos-based encryption systems to design and implement novel image encryption schemes [11,12,13,14,15]. Indeed, the random numbers received from any chaotic system have a great advantage for the encryption procedure. Therefore, it is not astonishing that many chaos-based random number generators exist in literature. The main characteristics for a chaos-based system is that the output data (i.e. functions) never repeat, thereby any external source cannot have the information to decrypt the random data. Strictly speaking, the chaotic circuits transmit the related data to encrypt the image to only a well-synchronized slave system. A slave circuit system can only decrypt the image for the desired aim [16].
The progress of the technology has enabled the transmission of large data over the network. Presently, multimedia data have become an important element for the use of the network communication. Especially, the spread of color image transmission has revealed security requirements [17,18,19], but the encryption algorithms designed for gray images generally remain bulky in the color images and also traditional encryption algorithms are poor for color images. In addition to that, in some algorithms developed for the color image encryption, RGB components of the image are encrypted independently of each fact which affects the system negatively in terms of [20, 21]. Color image encryption is usually realized at pixel level [22, 23]. In recent years, there are many bit level color image cipher schemes in the literature [24,25,26]. It is clear for many systems that only the permutation operation at a bit level gives quite satisfactory results for a ciphering process [6, 11, 27], whereas, since the data size in the color image is high, the design algorithm for a bit level encryption should be as optimized as possible so that it does not give any bad results in terms of speed.
In the present work, a new chaos-based algorithm is proposed for ciphering the color images. The novel feature of the paper comes from two parts, namely the algorithm itself and the modified Chua’s circuit (MCC) in the processes of ciphering and deciphering. The proposed algorithm combines diffusion and permutation features for a bit level color image encryption. It has also been proven that the suggested system is resistant to any plain text attacks, since the key is built using the SHA-256 [28, 29] algorithm and plain image. The new system also reduces the correlation because of the mixture of three-color image components.
This paper is organized as follows: in Sect. 2, some related studies on the secure communication literature have been stated. In Sect. 3, the MCC system is described with the relevant system parameters. Some samples on the hyperchaotic results and Lyapunov exponents are also presented in this section. In Sect. 4, the proposed secure communication algorithm is discussed. The experimental findings are given in Sect. 5. The security tests and performance analyses are reported in Sect. 6. Consequently, the paper is closed with a brief conclusion section.
2 Related Work
In any chaotic image encryption system, there are two main issues: First is the chaotic system, which is used as a random number generator. Second is an encryption algorithm, which has an importance in terms of efficiency and speed [7]. In the literature, many chaotic systems have been used for image encryption [30,31,32,33]. The dynamic properties of these chaotic systems affect the quality of the encryption process [34]. Conditions such as the width of the parameter space, the strength of randomness, simple and usefulness play effective roles in the selection of the chaotic generator [35]. On the one hand, the optimal adjustment of color image encryption algorithm is very important in terms of efficiency and speed [36].
In this work, an electronic circuit, namely MCC having a hyperchaotic character is used for color image encryption for the first time to our knowledge. In addition, bit-level scrambling and a new diffusion algorithm are examined as the second innovative part. The safety and performance tests prove that the system works effectively and fast enough to apply the encryption scheme.
3 Modified Chua’s Circuit and Its Hyperchaotic Feature
In this section, the formulation of the proposed modified Chua Circuit (MCC) and its hyperchaotic behavior are presented. The MCC is used as a random number generator for the encryption process in the present work. Therefore it is vital to encrypt any kind of image with a high efficiency. Initially the state equations of the MCC are shown as follows [37]:
In Eq. (1), \( a,{\text{ b, }}\phi , { }\beta , { }\omega ,f \) are the control parameters, which define the system dynamics and enable the system to produce different output data for the encryption.
The phase spaces from Eq. (1) are shown in Figs. 1 and 2 after applying the time integration by using the Runge–Kutta method in MatLab. These phase spaces prove that the MCC system can produce strange attractors with chaotic (see in Fig. 1a–d) and hyperchaotic (see in Fig. 2a–d) ones in 2D and 3D representations.
Lyapunov exponents are very important for the identification of the characteristics of a dynamic system. Indeed, one can be assure on the chaotic behavior of any dynamics system after applying the Lyapunov calculation scheme [37, 38]. The formulation of the Lyapunov exponent is given in Ref. [37]. For instance, there must be one positive exponent for a chaotic system [39]. If there would be two positive exponents, the system exhibits a hyperchaotic character, which means that the system diverges in two dimensions. The Lyapunov exponents of Fig. 1a–d are shown in Fig. 3a, b. The signs of the plots are (0, 0, −, +), which yields a chaotic nature. However, the exponents in Fig. 3c, d give two positive exponents for Fig. 2a–d with the signs of (0, 0, +, +), which denotes a hyperchaotic behavior form the relevant parameter set.
In order to show the dependence on the input parameter f, the maximal Lyapunov exponents are depicted in Fig. 4. It is obvious that the system reaches to a hyperchaotic regime beyond \( f \) = 9. By using another parameter of the system i.e. \( \beta \), a bifurcation diagram has been produced in Fig. 5. It is obvious that the chaotic nature appears for larger \( \beta \) values (i.e. 0.49). A periodic regime exists for low \( \beta \) values.
4 Chaos Based Image Encryption Scheme
4.1 Secret Key Generation
SHA-256, which is a traditionally used cryptographic hash algorithm, produces a 256-bit hash value. And this value changes completely when there is a slight change in the input of the algorithm. The function is used to generate the keys of this cryptosystem. Indeed, first of all, a 48-bit digest output which is described as PK is obtained from the plain image for input to the SHA-256 function. On the other hand, random noise RN is generated at the beginning of each encryption process using randi function of the MatLab. Subsequently, a 256-bit digest hash value SK is generated by executing SHA-256 with the PK and RN input. Thus, the secret key produced is completely unique thanks to SHA-256, even if there is a slight change in the plain image, or even no changes at all. As a result, all of this indicates that our encryption system can be resistant to against chosen-plaintext, chosen-ciphertext and known-plaintext attacks. The secret key generation is explained in detail below by pseudocodes written in MatLab.
ImgA plain color image is presented as input to the following algorithms:
Supposing that a hexadecimal number as \( h_{i} \), secret key SK can be defined as the hexadecimal number array as follows:
4.2 Obtaining the Initial Values of the Chaotic Equation from the Secret Key
The fact that chaotic systems are sensitive to initial values makes these systems very important for encryption systems. In this study, we have tried to reflect the slightest change in the secret key to the initial values. So, we get the values \( a_{1} ,a_{2} ,b_{1} \) and \( b_{2} \) to make sure that the slightest change in secret key causes changes in all initial values.
The initial values \( x_{1} ,y_{1} ,z_{1} ,v_{1} \) and the initial parameter \( f \) for Eq. (1) can be derived as follows:
Here \( hex2de\left( . \right) \) function converts the secret key from hexadecimal number to a decimal number, \( subset\left( {i,j,K} \right) \) returns elements between the ith index and jth index of the K 1-D array.
In Eq. (3), we determine the multiplications \( 10^{11} \) and \( 10^{14} \) in order to adjust the relevant decimals of the \( x_{1} ,y_{1} ,z_{1} \) and \( v_{1} \).
The values of \( a_{1} ,a_{2} ,b_{1} \) and \( b_{2} \) are calculated according to the program schemes in Figs. 6 and 7 using \( subset \), \( concat \), \( roundD \), \( hex2de \) and \( sum \) functions. The \( subset \) and \( hex2de \) functions are mentioned above. The \( concat\left( {./.} \right) \) function concatenate the values given into it. The \( roundD\left( . \right) \) returns the decimal portion of the given decimal number and \( sum\left( . \right) \) is aggregate function.
where the number 9.1 refers to the lower chaotic parameter for f. Since \( a_{1,2} \) and \( b_{1,2} \) refers to the numbers lower than 1, we make the multiplication higher by using the term \( \left( {2 - \left( {a,b} \right)_{1,2} } \right) \).
4.3 Encryption Algorithm
Figure 8 represents the overall flow chart of the encryption procedure. The steps of the flow chart are explained as the following:
Input: Plain image P, secret key SK
Output: Cipher image C
If we assume that the horizontal and vertical magnitudes are W and H respectively, the size of the color plain image is \( W \times H \times 3 \). Then the total size of the colored image is as follows:
Step 1. Take the initial values \( \left( {x_{1} ,y_{1} ,z_{1} ,v_{1} } \right) \) and the initial parameter f of the chaotic system using Eqs. (3, 4).
Step 2. With the help of the iteration method, generate chaotic numbers array CN whose size are \( \left( {s \times 4} \right) + 5000 \) by solving this time-continuously chaotic system. And then, remove the first thousand chaotic values that could adversely affect the encryption system.
Step 3. With the help of these numbers CN produced by chaotic generator, generate the key matrix KM to be applied in the diffusion and scrambling stages.
Here, \( CN\left( i \right) \) means that the ith element of CN, which is a 1-D array. The round function rounds the entered decimal number to the nearest number. The second parameter of the function determines the decimal point of the number to be rounded. The abs function takes the absolute value of the entered number. ‘^’ is the exponent operator that we know.
The unique function deletes repetitive elements of an array. The sort function returns the new index numbers of the array by sorting the array from small to large. The \( subset\left( {i,j,K} \right) \) returns elements between the ith index and jth index of the K. As a result, we can define the KM matrix as follows:
Step 4. Resize the plain image P for each pixel by starting from component R sequentially from upper point to bottom point, then left to right, with components G and B. After that, convert each pixel into a 8-digit binary format. As a result, a matrix of s rows and 8 columns is obtained. The \( getBinimage \) function applies all these operations to give the PB matrix.
The first column of the PB matrix corresponds to the first bit in the binary format of the decimal values corresponding to each row in this matrix. The same logic is used from 1th column to the 8th column.
Separate the first 4 columns and the last 4 columns of the binary matrix. Indeed, vertically divide the matrix PB in half. The matrix containing the first four columns of PB is \( PB_{1} \), the other matrix is called \( PB_{2} \).
Step 5. Perform the mapping method to the matrix \( PB_{2} \) by using the KM key matrix.
Here, reshape resizes any matrix according to the values given. The \( PB_{2}^{\prime } \left( {KM} \right) \) operation scrambles the values in \( PB_{2}^{\prime } \) to different positions according to KM. Indeed, the operation can be explained as follows:
Let’s assume A is an array. In that case, when I is a subset of the positive integers,\( A\left( I \right) \) is a subset of the \( A \). We define it as follows:
Step 6. Perform diffusion method to matrices \( PB_{1} \) and \( PB_{2} \) by using the key matrix KM.
Here, while the function \( bitxor \) applies bitwise xor logical operation, the \( bi2de \) function converts the number from the binary format to decimal one. The \( de2bi \) is the opposite \( bi2de \) and the mod function is the standard modulus operator. \( KM^{\prime}\left( {i,j} \right) \) denotes the element of ith row and jth column in the \( KM^{\prime} \) matrix.
Step 7. In contrast to the separation in step 4, combine the matrices \( CB_{1} \) and \( \, CB_{2} \). Convert binary matrix to decimal matrix. Finally, get the encrypted image by converting this matrix to the original dimensions of the image.
It will be shown that the algorithm above has certain superiorities on the other algorithms in the literature. Initially, the present algorithm gives good results for all security tests. It is not time-consuming and complicated. Indeed, it uses the image in 2 half parts, which are regarded as important and unimportant parts as in Fig. 8.
4.4 Decryption Algorithm
The cipher image C is the input data for this process and the deciphered P is denoted as “output”, as the inverse of the encryption process.
Step 1. Obtain the key matrix KM by applying steps 1, 2 and 3 of the above encryption process exactly.
Step 2. Similar to step 5 in the encryption scheme, obtain the \( CB_{1} \) and \( CB_{2} \) matrices using the encrypted image instead of the plain image this time.
Step 3. Perform diffusion method to \( CB_{1} \) and \( CB_{2} \) matrices using KM matrix.
The functions used here are defined in the encryption process in the previous section.
Step 4. Perform mapping method to the \( CB_{2} \) matrix using the KM key matrix.
Step 5. Obtain the decoded P matrix from the \( PB_{1} \) and \( PB_{2} \) matrices, similar to step 7 in the encryption algorithm.
5 Experimental Results
For the experiments, many parameter sets can be used. As a sample parameter set, we have considered the parameters of the chaotic circuit as \( a = - 2.91 \),\( b = - 0.56 \),\( \beta = 0.55 \),\( \phi = - 0.13 \) and \( \omega = 1.29 \). Because, the dynamic system exhibits a hyperchaotic behavior with these first parameters for \( f \ge 9.1 \). Along with plain image and random noise, the secret key produced with the help of the SHA-256 function is 2A8649DDF54B044DC1A50329C54B4960010066BA8FD005D4392B536545B04ECE. Then, the initial state variables and driving amplitude \( f \) of MCC are obtained from this secret key.
The sizes of plain images are \( 456 \times 408 \), \( 512 \times 512 \), \( 512 \times 512 \), and \( 256 \times 256 \) for the Vikings, Baboon, Airplane and Lena plain images, respectively (Fig. 9a–d). The encrypted versions of these images are given in Fig. 9e–h, respectively.
6 Security and Performance Analyses
6.1 Key Space Analysis
All the chaotic systems have a common feature: They are very dependent on the initial values. In other words, if any slight change occurs in the initial values of the functions, the functions produce entirely different result after sufficiently large time duration. The key space should be capable of neutralizing brute-force attacks for the encryption algorithm designs with a sufficient reliability. The encryption system key includes the initial values (\( x_{1} , \, y_{1} , \, z_{1} , \, v_{1} \)) and initial parameter of \( f \). In general, for systems with chaotic features, the precision of the initial conditions should be as high as possible such as 14 or 15 digits after the comma [5], so that the key space can reach at \( 10^{70} \). The key space is \( S = 10^{70} \cong 2^{232} > 2^{100} \) [40], so that the cryptosystem can resist to brute-force attacks.
6.2 Key and Plain Image Sensitivity Analyses
It should be pointed out that any small modification at the initial values of the chaotic system would yield entirely different outputs. The key of the Modified Chua crypto system is a ‘nonce’, based on the hash value generated by the plain image and a random sequence. Thus, if the startup conditions are changed slightly, this would cause to generate different encrypted images. In the MCC system, it is observed that the algorithm is very delicate to the slightest variation in the key after applying the experiments.
Figure 10a is a one bit modified version of the Lena image and its encrypted state is given in Fig. 10b. The differences between Figs. 9h and 10b is also given in Fig. 10c. From this point of view, results of the encryptions are also divergent from each other.
6.3 Resistance to Known Plaintext and Chosen Plaintext Attacks
According to the proposed algorithm, the key strongly depends on the hash value of the original image. Therefore, different keys would be produced for different kind of images. Any attacker cannot decipher a particular image with a key used from another image. To conclude, the implemented software may be resistant to both the known—plaintext and chosen—plaintext attacks.
6.4 Differential Attacks
Typically, in an image encryption unit, it is considered that the encrypted media should differ from its unencrypted version. To determine such a difference between the versions, the criteria NPCR [41] and UACI [42] are generally used in the literature.
In other words, the crypto system, which is recommended here should guarantee that the encrypted versions of two images become different to each other, when one bit modification is made into one of them. Tables 1 and 2 show the NPCR and UACI test findings for 1500 randomly selected pairs. The findings are satisfactory and the software is found to be robust against differential attacks.
6.5 Information Entropy Analysis
Information entropy is used for the measurement of an arbitrary distribution in a media file. The formulation of this operation is presented as follows [43]:
The information entropy for an encrypted version should be as high as possible, indeed it should be 8 for ideal results as in Ref. [44]. That makes the information difficult to expose. Here, Table 3 gives the information entropy results of three pieces of the encrypted image by using the Eq. (16). It is found that the results are close to 8.
6.6 Correlation Coefficient Analysis
There exists a relationship between neighboring pixels in any original image. In order to counteract statistical attacks for this relationship, the correlation on the neighboring pixels in an encrypted image should be minimal. The following formulation can be applied to calculate this correlation value between two adjacent pixels [48].
Figure 11 shows the correlation distributions of two horizontally, vertically and diagonal adjacent pixels in the plain and ciphered Lena images. It is clear that the correlation between the neighboring pixels decreases substantially.
Table 4 gives the correlation values between the plain images and their encrypted versions. The test results prove that the correlation between the adjacent pixels of the encoded image version is very low, whereas the correlation between the plain images exists quite high. This ensures that the encryption performed here is effective.
6.7 Histogram Analysis
The histogram of an image provides information about the distribution of its pixel values and represents this image. As seen in Fig. 12, the histogram of the original image has several peaks while the encrypted image has a nearly constant distribution.
6.8 Resisting Noise Attack Analysis
The encoded image version is inevitably exposed to different types of noises, when the data passes through a real communication channel. This noise can cause problems during the acquisition of the original image. Therefore, the algorithm should be noise resistant, so that the encryption scheme can be valid. The Peak Signal-to-Noise Ratio (PSNR) is used to measure the quality of the decoded image after the attacks. For the image components, PSNR can be obtained by the following formulation [49]:
MSE is the mean square error between the original and recovered images and is represented as \( I_{1} \left( {i,j} \right) \) and \( I_{2} \left( {i,j} \right) \) respectively, with the size of mxn. Figure 13 shows the encrypted image Lena exposed to the Salt Pepper noise with different density of this and its deciphered ones. The MSE and PSNR of these decoded images are shown in Table 5. From this Table 5 and Fig. 13, we can understand that the original image is entirely obtained again, which is noticeable, the PSNR value is about 30 dB, and the decoded images are highly correlated. This means that the decoded images are very close to the original image. Thus, it can be said that the proposed algorithm is resistant to resisting noise attacks to some degree.
6.9 Speed Analysis
The encryption speed is one of the key issues for the secure communication. Some precautions have been taken in order to speed up the encryption/decryption in the system. Initially, time-consuming operations were not used in the algorithm. For instance xor operation has been used to save computer time. Besides, the data obtained from the chaotic system is used for both diffusion and penetration process, thereby time is saved for the data production scheme, too. For instance, when Matlab R2017b is used in a PC with Intel Core i7-6700 CPU @3.4GHZ, 8 GB memory operating under Windows 10, the averaged time for the encryption of Lena image is 0.14 s, which is a sufficient value.
7 Conclusions
An original encryption/decryption algorithm has been developed for the encryption and the decryption of the images by using the modified Chua’s circuit (MCC) system, which exhibits a hyperchaotic behavior for a large parameter regime due to the double frequency dependent nature. The Lyapunov spectrum has been found to characterize the hyperchaotic regime of the data. To our knowledge, the MCC system has been used for the first time for such an encryption study. Besides, the scrambling feature, which is implemented at a bit level and novel diffusion system using the MCC has been applied in the algorithm.
Following the encryption procedure, the encrypted colored image has been tested by a variety of tests including the secret key size and secret key sensitivity, histogram analysis, correlation analysis, differential analysis and information entropy analysis. The results of the analysis prove that the proposed algorithm is quite effective and provides an efficient technique for the color image encryption/decryption in the area of secure communication. The hyperchaotic MCC data give sufficient input to the algorithm to fulfill the security requirements. In addition to the security test results, the speed analyses give sufficient results. For instance, it gives 0.14 s for the encryption of colored image Lena.
References
Gan Z, Chai X, Zhang M, Lu Y (2018) A double color image encryption scheme based on three-dimensional brownian motion. Multimed Tools Appl 77(21):27919–27953
Sahari ML, Boukemara I (2018) A pseudo-random numbers generator based on a novel 3D chaotic map with an application to color image encryption. Nonlinear Dyn 94(1):723–744
Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos 16(08):2129–2151
Liu H, Kadir A, Niu Y (2014) Chaos-based color image block encryption scheme using S-box. AEU Int J Electron Commun 68(7):676–686
Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8(06):1259–1284
Kiraz MS, Uzunkol O (2016) Efficient and verifiable algorithms for secure outsourcing of cryptographic computations. Int J Inf Secur 15(5):519–537
Stinson DR (2005) Cryptography: theory and practice. CRC Press, Boca Raton
Fu C, Lin BB, Miao YS, Liu X, Chen JJ (2011) A novel chaos-based bit-level permutation scheme for digital image encryption. Opt Commun 284(23):5415–5423
Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171–1186
Guan ZH, Huang F, Guan W (2005) Chaos-based image encryption algorithm. Phys Lett A 346(1–3):153–157
Xiao D, Liao X, Wei P (2009) Analysis and improvement of a chaos-based image encryption algorithm. Chaos Solitons Fractals 40(5):2191–2199
Wang Y, Wong KW, Liao X, Xiang T, Chen G (2009) A chaos-based image encryption algorithm with variable control parameters. Chaos Solitons Fractals 41(4):1773–1783
Celik K, Kurt E (2016) A new image encryption algorithm based on lorenz system. In: IEEE 8th international conference on electronics, computers and artificial intelligence (ECAI). Ploiesti, Romania, pp 1–6. https://doi.org/10.1109/ECAI.2016.7861097
Celík K, Kurt E, Stork M (2017) Can non-identical josephson junctions be synchronized? In: IEEE 58th international scientific conference on power and electrical engineering of Riga Technical University (RTUCON). Riga, Latvia, pp 1–5. https://doi.org/10.1109/RTUCON.2017.8124771
Abuturab MR (2012) Color image security system using double random-structured phase encoding in gyrator transform domain. Appl Opt 51(15):3006–3016
Lian S, Sun J, Wang Z (2005) Security analysis of a chaos-based image encryption algorithm. Phys A 351(2–4):645–661
Li C, Li S, Chen G, Halang WA (2009) Cryptanalysis of an image encryption scheme based on a compound chaotic sequence. Image Vis Comput 27(8):1035–1039
Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320–3327
Mazloom S, Eftekhari-Moghadam AM (2009) Color image encryption based on coupled nonlinear chaotic map. Chaos Solitons Fractals 42(3):1745–1754
Huang CK, Nien HH (2009) Multi chaotic systems based pixel shuffle for image encryption. Opt Commun 282(11):2123–2127
Chen L, Zhao D (2006) Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms. Opt Express 14(19):8552–8560
Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16–17):3895–3903
Zhang W, Wong KW, Yu H, Zhu ZL (2013) A symmetric color image encryption algorithm using the intrinsic features of bit distributions. Commun Nonlinear Sci Numer Simul 18(3):584–600
Zhou Y, Bao L, Chen CP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182
Zhang Y, Xiao D (2014) An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simul 19(1):74–82
https://en.wikipedia.org/wiki/SHA-2. Accessed 15 Mar 2019
https://www.movable-type.co.uk/scripts/sha256.html. Accessed 15 Mar 2019
Kurt E (2006) Nonlinearities from a non-autonomous chaotic circuit with a non-autonomous model of Chua’s diode. Phys Scr 74(1):22
Liu H, Wang X, Kadir A (2014) Chaos-based color image encryption using one-time keys and Choquet fuzzy integral. Int J Nonlinear Sci Numer Simul 15(1):1–10
Volos CK (2013) Image encryption scheme based on coupled chaotic systems. J Appl Math Bioinform 3(1):123
Yalcin ME, Suykens JA, Vandewalle J (2004) True random bit generation from a double-scroll attractor. IEEE Trans Circuits Syst I Regul Pap 51(7):1395–1404
Volos CK, Kyprianidis IM, Stouboulos IN (2009) Image encryption process based on a chaotic true random bit generator. IEEE 16th international conference on digital signal processing. Santorini-Hellas, Greece, pp 1–4. https://doi.org/10.1109/ICDSP.2009.5201107
Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn 67(1):557–566
Rhouma R, Meherzi S, Belghith S (2009) OCML-based colour image encryption. Chaos Solitons Fractals 40(1):309–318
Chai X, Gan Z, Zhang M (2017) A fast chaos-based image encryption scheme with a novel plain image-related swapping block permutation and block diffusion. Multimed Tools Appl 76(14):15561–15585
Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3):749–761
Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934
Li C, Luo G, Qin K, Li C (2017) An image encryption scheme based on chaotic tent map. Nonlinear Dyn 87(1):127–133
Peng G, Min F (2017) Multistability analysis, circuit implementations and application in image encryption of a novel memristive chaotic circuit. Nonlinear Dyn 90(3):1607–1625
Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26–36
Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238–246
El Assad S, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144–157
Vaidyanathan S, Akgul A, Kaçar S, Çavuşoğlu U (2018) A new 4-D chaotic hyperjerk system, its synchronization, circuit design and applications in RNG, image encryption and chaos-based steganography. Eur Phys J Plus 133(2):46
Akgul A, Pehlivan I (2016) A new three-dimensional chaotic system without equilibrium points, its dynamical analyses and electronic circuit application. Tech Gaz 23(1):209–214
Liu H, Wen F, Kadir A (2019) Construction of a new 2D Chebyshev-Sine map and its application to color image encryption. Multimed Tools Appl 78(12):15997–16010
Wang X, Guo K (2014) A new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn 76(4):1943–1950
El-Latif AAA, Li L, Zhang T, Wang N, Song X, Niu X (2012) Digital image encryption scheme based on multiple chaotic systems. Sens Imaging Int J 13(2):67–88
Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2015) A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed Tools Appl 74(3):781–811
Salleh M, Ibrahim S, Isnin IF (2003) Image encryption algorithm based on chaotic mapping. Jurnal Teknologi 39(1):1–12
Acknowledgements
This paper has been devoted to the brave students and lecturers, who protect their labs and classrooms on 4th Oct. 2019 against the Gazi University Rectorship, which has decided to apply a unilateral decision on Gazi University Technology Faculty buildings.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Arpacı, B., Kurt, E., Çelik, K. et al. Colored Image Encryption and Decryption with a New Algorithm and a Hyperchaotic Electrical Circuit. J. Electr. Eng. Technol. 15, 1413–1429 (2020). https://doi.org/10.1007/s42835-020-00393-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s42835-020-00393-x