Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Research Article

Research on Image Encryption Method based on the Chaotic Iteration of a Ternary Nonlinear Function

Author(s): Zeng Qinwu*, Yu Wanbo and Zeng Qingjian

Volume 17, Issue 7, 2024

Published on: 15 December, 2023

Article ID: e151223224561 Pages: 19

DOI: 10.2174/0126662558268841231123112855

Price: $65

Abstract

Objective: Considering that some image encryption algorithms have the disadvantages of complex structure and high computational cost, and there are not many commonly used chaotic systems, which are easy to crack by attacks, to solve these problems, this paper proposes an image encryption algorithm based on three-dimensional nonlinear functions to solve these problems.

Methods: The algorithm mainly combines the sinusoidal chaotic map with the ternary nonlinear function system to encrypt the image. Firstly, multiple ternary nonlinear function chaotic systems are designed. Then, the function iteration system is changed to invoke the computation of a specific expression under a random number; it is a chaotic sequence generated according to a chaotic mapping such as sine, and then the value of this chaotic sequence is used to select a ternary nonlinear function for iteration to obtain a chaotic sequence. Finally, the chaotic sequence performs the XOR and scrambling operations on the grey image.

Results: The algorithm has a simple structure, a better encryption effect, and more incredible difficulty deciphering. Moreover, through the phase diagram and bifurcation diagram, it can be seen that the system has good chaotic characteristics.

Conclusion: The method in this paper is novel; this method is a random variable order composite operation, which can not only be applied to image encryption but also can be used for fractal map generation and so on, and in some other chaotic fields will have a wide range of applications. It has essential research value.

[1]
S. Yan, L. Li, and B. Gu, "Design of hyperchaotic system based on multi-scroll and its encryption algorithm in color image", Integration , vol. 88, pp. 203-221, 2023.
[http://dx.doi.org/10.1016/j.vlsi.2022.10.002]
[2]
Y. Pourasad, R. Ranjbarzadeh, and A. Mardani, "A new algorithm for digital image encryption based on chaos theory", Entropy , vol. 23, no. 3, p. 341, 2021.
[http://dx.doi.org/10.3390/e23030341] [PMID: 33805786]
[3]
J. Sun, "A chaotic image encryption algorithm combining 2D chaotic system and random XOR diffusion", Phys. Scr., vol. 96, no. 10, p. 105208, 2021.
[http://dx.doi.org/10.1088/1402-4896/ac0d2e]
[4]
M. Khan, S.S. Jamal, M.M. Hazzazi, K.M. Ali, I. Hussain, and M. Asif, "An efficient image encryption scheme based on double affine substitution box and chaotic system", Integration , vol. 81, pp. 108-122, 2021.
[http://dx.doi.org/10.1016/j.vlsi.2021.05.007]
[5]
Z. Hua, Z. Zhu, Y. Chen, and Y. Li, "Color image encryption using orthogonal Latin squares and a new 2D chaotic system", Nonlinear Dyn., vol. 104, no. 4, pp. 4505-4522, 2021.
[http://dx.doi.org/10.1007/s11071-021-06472-6]
[6]
X. Wang, S. Chen, and Y. Zhang, "A chaotic image encryption algorithm based on random dynamic mixing", Opt. Laser Technol., vol. 138, p. 106837, 2021.
[http://dx.doi.org/10.1016/j.optlastec.2020.106837]
[7]
H. Huang, and D. Cheng, "A secure image compression-encryption algorithm using DCT and hyperchaotic system", Multimedia Tools Appl., vol. 81, no. 22, pp. 31329-31347, 2022.
[http://dx.doi.org/10.1007/s11042-021-11796-x]
[8]
W. Yu, and Z. Zhou, "A compressible image encryption method based on nondegenerate hyperchaotic system and its implementation on ZYNQ", Int. J. Circuit Theory Appl., vol. 50, no. 10, pp. 3661-3681, 2022.
[http://dx.doi.org/10.1002/cta.3350]
[9]
M.Z. Talhaoui, X. Wang, and M.A. Midoun, "A new one-dimensional cosine polynomial chaotic map and its use in image encryption", Vis. Comput., vol. 37, no. 3, pp. 541-551, 2021.
[http://dx.doi.org/10.1007/s00371-020-01822-8]
[10]
X. Wang, Y. Su, and L. Liu, "Color image encryption algorithm based on Fisher-Yates scrambling and DNA subsequence operation", Vis. Comput., vol. 39, no. 1, pp. 43-58, 2021.
[http://dx.doi.org/10.1007/s00371-021-02311-2]
[11]
M.A. Lone, and S. Qureshi, "Encryption scheme for RGB images using chaos and affine hill cipher technique", Nonlinear Dyn., vol. 111, no. 6, pp. 5919-5939, 2023.
[http://dx.doi.org/10.1007/s11071-022-07995-2]
[12]
J. Wen, X. Xu, K. Sun, Z. Jiang, and X. Wang, "Triple-image bit-level encryption algorithm based on double cross 2D hyperchaotic map", Nonlinear Dyn., vol. 111, no. 7, pp. 6813-6838, 2023.
[http://dx.doi.org/10.1007/s11071-022-08158-z]
[13]
Y. Zhang, "A new unified image encryption algorithm based on a lifting transformation and chaos", Inf. Sci., vol. 547, pp. 307-327, 2021.
[http://dx.doi.org/10.1016/j.ins.2020.07.058]
[14]
K.K.A. Patro, and B. Acharya, "An efficient colour image encryption scheme based on 1-D chaotic maps", J. Inf. Secur. Appl., vol. 46, pp. 23-41, 2019.
[http://dx.doi.org/10.1016/j.jisa.2019.02.006]
[15]
A. Kumar, and M. Dua, "A novel chaos map based medical image encryption scheme", Imaging Sci. J., vol. 69, no. 8, pp. 219-238, 2022.
[http://dx.doi.org/10.1080/13682199.2022.2156669]
[16]
J. Chen, Z. Zhu, L. Zhang, Y. Zhang, and B. Yang, "Exploiting self-adaptive permutation–diffusion and DNA random encoding for secure and efficient image encryption", Signal Process., vol. 142, pp. 340-353, 2018.
[http://dx.doi.org/10.1016/j.sigpro.2017.07.034]
[17]
L. Teng, X. Wang, F. Yang, and Y. Xian, "Color image encryption based on cross 2D hyperchaotic map using combined cycle shift scrambling and selecting diffusion", Nonlinear Dyn., vol. 105, no. 2, pp. 1859-1876, 2021.
[http://dx.doi.org/10.1007/s11071-021-06663-1]
[18]
N. Khalil, A. Sarhan, and M.A.M. Alshewimy, "An efficient color/grayscale image encryption scheme based on hybrid chaotic maps", Opt. Laser Technol., vol. 143, p. 107326, 2021.
[http://dx.doi.org/10.1016/j.optlastec.2021.107326]
[19]
Y. Sun, H. Zhang, X. Wang, and M. Wang, "Bit-level color image encryption algorithm based on coarse-grained logistic map and fractional chaos", Multimedia Tools Appl., vol. 80, no. 8, pp. 12155-12173, 2021.
[http://dx.doi.org/10.1007/s11042-020-10373-y]
[20]
W. Zhou, X. Wang, M. Wang, and D. Li, "A new combination chaotic system and its application in a new Bit-level image encryption scheme", Opt. Lasers Eng., vol. 149, p. 106782, 2022.
[http://dx.doi.org/10.1016/j.optlaseng.2021.106782]
[21]
Z. Hua, Y. Zhou, and H. Huang, "Cosine-transform-based chaotic system for image encryption", Inf. Sci., vol. 480, pp. 403-419, 2019.
[http://dx.doi.org/10.1016/j.ins.2018.12.048]
[22]
M. Akraam, T. Rashid, and S. Zafar, A novel and secure image encryption scheme based on two-dimensional logistic and Arnold Cat map , Cluster Comput., vol. 2023, 2023.
[http://dx.doi.org/10.1007/s10586-023-04084-w]
[23]
Y. Dong, X. Huang, and G. Ye, "Visually meaningful image encryption scheme based on DWT and schur decomposition", Secur. Commun. Netw., vol. 2021, pp. 1-16, 2021.
[http://dx.doi.org/10.1155/2021/6677325]
[24]
Y. Niu, and X. Zhang, "A novel plaintext-related image encryption scheme based on chaotic system and pixel permutation", IEEE Access, vol. 8, pp. 22082-22093, 2020.
[http://dx.doi.org/10.1109/ACCESS.2020.2970103]
[25]
J. Wu, J. Shi, and T. Li, "A novel image encryption approach based on a hyperchaotic system, pixel-level filtering with variable kernels, and DNA-level diffusion", Entropy , vol. 22, no. 1, p. 5, 2019.
[http://dx.doi.org/10.3390/e22010005] [PMID: 33285780]
[26]
S.F. Raza, and V. Satpute, "A novel bit permutation-based image encryption algorithm", Nonlinear Dyn., vol. 95, no. 2, pp. 859-873, 2019.
[http://dx.doi.org/10.1007/s11071-018-4600-8]
[27]
S. Noshadian, A. Ebrahimzade, and S.J. Kazemitabar, "Optimizing chaos based image encryption", Multimedia Tools Appl., vol. 77, no. 19, pp. 25569-25590, 2018.
[http://dx.doi.org/10.1007/s11042-018-5807-x]
[28]
O.M. Al-Hazaimeh, M.F. Al-Jamal, N. Alhindawi, and A. Omari, "Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys", Neural Comput. Appl., vol. 31, no. 7, pp. 2395-2405, 2019.
[http://dx.doi.org/10.1007/s00521-017-3195-1]
[29]
X. Wang, and L. Teng, "An image blocks encryption algorithm based on spatiotemporal chaos", Nonlinear Dyn., vol. 67, no. 1, pp. 365-371, 2012.
[http://dx.doi.org/10.1007/s11071-011-9984-7]
[30]
B. Bouteghrine, C. Tanougast, and S. Sadoudi, "Novel image encryption algorithm based on new 3-d chaos map", Multimedia Tools Appl., vol. 80, no. 17, pp. 25583-25605, 2021.
[http://dx.doi.org/10.1007/s11042-021-10773-8]
[31]
M. Kumari, and S. Gupta, "Performance comparison between Chaos and quantum-chaos based image encryption techniques", Multimedia Tools Appl., vol. 80, no. 24, pp. 33213-33255, 2021.
[http://dx.doi.org/10.1007/s11042-021-11178-3] [PMID: 34413701]
[32]
Y. Zheng, and J. Jin, "A novel image encryption scheme based on Hénon map and compound spatiotemporal chaos", Multimedia Tools Appl., vol. 74, no. 18, pp. 7803-7820, 2015.
[http://dx.doi.org/10.1007/s11042-014-2024-0]
[33]
A. Arab, M.J. Rostami, and B. Ghavami, "An image encryption method based on chaos system and AES algorithm", J. Supercomput., vol. 75, no. 10, pp. 6663-6682, 2019.
[http://dx.doi.org/10.1007/s11227-019-02878-7]
[34]
S. Anwar, and S. Meghana, "A pixel permutation based image encryption technique using chaotic map", Multimedia Tools Appl., vol. 78, no. 19, pp. 27569-27590, 2019.
[http://dx.doi.org/10.1007/s11042-019-07852-2]
[35]
H. Wang, H.F. Liang, and Z.H. Miao, "A new color image encryption scheme based on chaos synchronization of time-delay Lorenz system", Adv. Manuf., vol. 4, no. 4, pp. 348-354, 2016.
[http://dx.doi.org/10.1007/s40436-016-0159-0]
[36]
M. Zhang, X-J. Tong, J. Liu, Z. Wang, J. Liu, B. Liu, and J. Ma, "Image compression and encryption scheme based on compressive sensing and fourier transform", IEEE Access, vol. 8, pp. 40838-40849, 2020.
[http://dx.doi.org/10.1109/ACCESS.2020.2976798]
[37]
R. Guesmi, M.A. Ben Farah, A. Kachouri, and M. Samet, "Hash key-based image encryption using crossover operator and chaos", Multimedia Tools Appl., vol. 75, no. 8, pp. 4753-4769, 2016.
[http://dx.doi.org/10.1007/s11042-015-2501-0]
[38]
H. Omranpour, Z. Mohammadi Ledari, and M. Taheri, "Presentation of encryption method for RGB images based on an evolutionary algorithm using chaos functions and hash tables", Multimedia Tools Appl., vol. 82, no. 6, pp. 9343-9360, 2023.
[http://dx.doi.org/10.1007/s11042-022-13734-x]
[39]
I.A. Hamadi, R.K. Jamal, and S.K. Mousa, "Image encryption based on computer generated hologram and Rossler chaotic system", Opt. Quantum Electron., vol. 54, no. 1, p. 33, 2022.
[http://dx.doi.org/10.1007/s11082-021-03406-9]
[40]
H. Liu, A. Kadir, X. Sun, and Y. Li, "Chaos based adaptive double-image encryption scheme using hash function and S-boxes", Multimedia Tools Appl., vol. 77, no. 1, pp. 1391-1407, 2018.
[http://dx.doi.org/10.1007/s11042-016-4288-z]
[41]
M.Z. Talhaoui, X. Wang, and A. Talhaoui, "A new one-dimensional chaotic map and its application in a novel permutation-less image encryption scheme", Vis. Comput., vol. 37, no. 7, pp. 1757-1768, 2021.
[http://dx.doi.org/10.1007/s00371-020-01936-z]
[42]
J. Zhang, C. Feng, M. Zhang, and Y. Liu, "One-time pad image encryption based on physical random numbers from chaotic laser", Opt. Rev., vol. 25, no. 5, pp. 540-548, 2018.
[http://dx.doi.org/10.1007/s10043-018-0445-0]
[43]
Z. Zhu, Y. Song, W. Zhang, H. Yu, and Y. Zhao, "A novel compressive sensing-based framework for image compression-encryption with S-box", Multimedia Tools Appl., vol. 79, no. 35-36, pp. 25497-25533, 2020.
[http://dx.doi.org/10.1007/s11042-020-09193-x]
[44]
X. Wang, and H. Zhao, "Fast image encryption algorithm based on parallel permutation-and-diffusion strategy", Multimedia Tools Appl., vol. 79, no. 27-28, pp. 19005-19024, 2020.
[http://dx.doi.org/10.1007/s11042-020-08810-z]
[45]
L. Zhang, and X. Zhang, "Multiple-image encryption algorithm based on bit planes and chaos", Multimedia Tools Appl., vol. 79, no. 29-30, pp. 20753-20771, 2020.
[http://dx.doi.org/10.1007/s11042-020-08835-4]
[46]
X. Zhang, and Z. Zhao, "Chaos-based image encryption with total shuffling and bidirectional diffusion", Nonlinear Dyn., vol. 75, no. 1-2, pp. 319-330, 2014.
[http://dx.doi.org/10.1007/s11071-013-1068-4]
[47]
A. Ullah, S.S. Jamal, and T. Shah, "A novel scheme for image encryption using substitution box and chaotic system", Nonlinear Dyn., vol. 91, no. 1, pp. 359-370, 2018.
[http://dx.doi.org/10.1007/s11071-017-3874-6]
[48]
C. Pak, K. An, P. Jang, J. Kim, and S. Kim, "A novel bit-level color image encryption using improved 1D chaotic map", Multimedia Tools Appl., vol. 78, no. 9, pp. 12027-12042, 2019.
[http://dx.doi.org/10.1007/s11042-018-6739-1]
[49]
Y.R. Bai, D. Baleanu, and G.C. Wu, "A novel shuffling technique based on fractional chaotic maps", Optik , vol. 168, pp. 553-562, 2018.
[http://dx.doi.org/10.1016/j.ijleo.2018.04.054]
[50]
A.N. Kengnou Telem, H.B. Fotsin, and J. Kengne, "Image encryption algorithm based on dynamic DNA coding operations and 3D chaotic systems", Multimedia Tools Appl., vol. 80, no. 12, pp. 19011-19041, 2021.
[http://dx.doi.org/10.1007/s11042-021-10549-0]
[51]
X. Wang, and S. Chen, "An image encryption algorithm based on pixel bit operation and nonlinear chaotic system", Vis. Comput., vol. 39, pp. 3123-3144, 2022.
[http://dx.doi.org/10.1007/s00371-022-02517-y]
[52]
C. Han, "An image encryption algorithm based on modified logistic chaotic map", Optik , vol. 181, pp. 779-785, 2019.
[http://dx.doi.org/10.1016/j.ijleo.2018.12.178]
[53]
Z. Xiong, Y. Wu, C. Ye, X. Zhang, and F. Xu, "Color image chaos encryption algorithm combining CRC and nine palace map", Multimedia Tools Appl., vol. 78, no. 22, pp. 31035-31055, 2019.
[http://dx.doi.org/10.1007/s11042-018-7081-3]
[54]
L. Liu, and S. Miao, "A new simple one-dimensional chaotic map and its application for image encryption", Multimedia Tools Appl., vol. 77, no. 16, pp. 21445-21462, 2018.
[http://dx.doi.org/10.1007/s11042-017-5594-9]
[55]
H. Liu, and X. Wang, "Color image encryption based on one-time keys and robust chaotic maps", Comput. Math. Appl., vol. 59, no. 10, pp. 3320-3327, 2010.
[http://dx.doi.org/10.1016/j.camwa.2010.03.017]
[56]
S. Behnia, A. Akhshani, H. Mahmodi, and A. Akhavan, "A novel algorithm for image encryption based on mixture of chaotic maps", Chaos Solitons Fractals, vol. 35, no. 2, pp. 408-419, 2008.
[http://dx.doi.org/10.1016/j.chaos.2006.05.011]
[57]
D. Arroyo, R. Rhouma, G. Alvarez, S. Li, and V. Fernandez, "On the security of a new image encryption scheme based on chaotic map lattices", Chaos, vol. 18, no. 3, p. 033112, 2008.
[58]
L. Cong, W. Xiaofu, and S. Songgeng, "A general efficient method for chaotic signal estimation", IEEE Trans. Signal Process., vol. 47, no. 5, pp. 1424-1428, 1999.
[http://dx.doi.org/10.1109/78.757236]
[59]
X. Wu, H. Hu, and B. Zhang, "Parameter estimation only from the symbolic sequences generated by chaos system", Chaos Solit. Fractals, vol. 22, no. 2, pp. 359-366, 2004.
[http://dx.doi.org/10.1016/j.chaos.2004.02.008]
[60]
X. Wang, L. Teng, and X. Qin, "A novel colour image encryption algorithm based on chaos", Signal Processing, vol. 92, no. 4, pp. 1101-1108, 2012.
[http://dx.doi.org/10.1016/j.sigpro.2011.10.023]
[61]
D. Arroyo, and J. Diaz, "Cryptanalysis of a one round chaos-based substitution permutation network", Signal Process., vol. 93, no. 5, pp. 1358-1364, 2013.
[http://dx.doi.org/10.1016/j.sigpro.2012.11.019]
[62]
C. Li, L.Y. Zhang, R. Ou, K-W. Wong, and S. Shu, "Breaking a novel colour image encryption algorithm based on chaos", Nonlinear Dyn., vol. 70, no. 4, pp. 2383-2388, 2012.
[http://dx.doi.org/10.1007/s11071-012-0626-5]
[63]
J. Xin, H. Hu, and J. Zheng, "3D variable-structure chaotic system and its application in color image encryption with new Rubik’s Cube-like permutation", Nonlinear Dyn., vol. 111, no. 8, pp. 7859-7882, 2023.
[http://dx.doi.org/10.1007/s11071-023-08230-2]
[64]
Z. Liang, Q. Qin, C. Zhou, and S. Xu, "Color image encryption algorithm based on four-dimensional multi-stable hyper chaotic system and DNA strand displacement", J. Electr. Eng. Technol., vol. 18, no. 1, pp. 539-559, 2023.
[http://dx.doi.org/10.1007/s42835-022-01157-5]
[65]
J. Zheng, and L. Liu, "Novel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine map", IET Image Process., vol. 14, no. 11, pp. 2310-2320, 2020.
[http://dx.doi.org/10.1049/iet-ipr.2019.1340]
[66]
D. Li, J. Li, X. Di, and B. Li, "Design of cross-plane colour image encryption based on a new 2D chaotic map and combination of ECIES framework", Nonlinear Dyn., vol. 111, no. 3, pp. 2917-2942, 2023.
[http://dx.doi.org/10.1007/s11071-022-07949-8]
[67]
F. Yang, J. Mou, C. Ma, and Y. Cao, "Dynamic analysis of an improper fractional-order laser chaotic system and its image encryption application", Opt. Lasers Eng., vol. 129, p. 106031, 2020.
[http://dx.doi.org/10.1016/j.optlaseng.2020.106031]
[68]
D.S. Malik, and T. Shah, "Color multiple image encryption scheme based on 3D-chaotic maps", Math. Comput. Simul., vol. 178, pp. 646-666, 2020.
[http://dx.doi.org/10.1016/j.matcom.2020.07.007]
[69]
Y. Liu, Z. Jiang, X. Xu, F. Zhang, and J. Xu, "Optical image encryption algorithm based on hyper-chaos and public-key cryptography", Opt. Laser Technol., vol. 127, p. 106171, 2020.
[http://dx.doi.org/10.1016/j.optlastec.2020.106171]
[70]
F. Yu, S. Xu, X. Xiao, W. Yao, Y. Huang, S. Cai, B. Yin, and Y. Li, "Dynamics analysis, FPGA realization and image encryption application of a 5D memristive exponential hyperchaotic system", Integration , vol. 90, pp. 58-70, 2023.
[http://dx.doi.org/10.1016/j.vlsi.2023.01.006]
[71]
F. Yu, H. Shen, Z. Zhang, Y. Huang, S. Cai, and S. Du, "A new multi-scroll Chua’s circuit with composite hyperbolic tangent-cubic nonlinearity: Complex dynamics, Hardware implementation and Image encryption application", Integration , vol. 81, pp. 71-83, 2021.
[http://dx.doi.org/10.1016/j.vlsi.2021.05.011]
[72]
W. Yu, and Y. Wang, "Construction of linear piecewise chaotic map and its application in image encryption", Comp. Eng. Desig., vol. 44, no. 03, pp. 707-713, 2023.
[http://dx.doi.org/10.16208/j.issn1000-7024.2023.010]
[73]
W. Yu, R. Huang, and W. Wang, "Three-dimensional composite chaotic system and its application in image encryption", Comput. Eng. Appl., vol. 2023, pp. 1-11, 2023.
[74]
W. Yu, and Z. Hu, "Image encryption based on enhanced product trigonometric chaotic sequences", Mod. Phys. Lett. B, vol. 36, no. 13, p. 2250063, 2022.
[http://dx.doi.org/10.1142/S0217984922500634]
[75]
Y. Gao, Research on image encryption based on chaotic linear iterated function system.Dalian University, . 2023

Rights & Permissions Print Cite
© 2025 Bentham Science Publishers | Privacy Policy