Multimedia Tools and Applications

, Volume 77, Issue 17, pp 22787–22808 | Cite as

A new simple chaotic system and its application in medical image encryption

  • Jizhao Liu
  • Yide MaEmail author
  • Shouliang Li
  • Jing Lian
  • Xinguo Zhang


Today, medical imaging suffers from serious issues such as malicious tampering and privacy leakage. Encryption is an effective way to protect these images from security threats. Among the available encryption algorithms, chaos-based methods have strong cryptographic properties, because chaotic systems are sensitive to initial conditions and parameters. However, traditional chaotic systems are easy to build, analyze, predict and can be re-scaled to any desired frequency. Thus, encryption schemes using traditional chaotic systems have low security levels. In this work, we propose a new simple chaotic system that utilizes a hyperbolic sine as its nonlinearity; this nonlinearity has rarely appeared in previous studies. Furthermore, the new chaotic system uses a decorrelation operation to enhance its performance. Statistical testing verifies that the chaotic sequence has good pseudorandom characteristics. In this study, we propose a scheme for medical image encryption based on this new chaotic system. The results of tests show that this encryption method can encrypt images effectively in a single round and that the proposed scheme provides sufficient security against known attacks.


Chaos Hyperbolic sine Image encryption Medical image 



The authors would like to thank Wenlong Xin for providing knowledge of the medical images. All the medical images used are from the First Hospital affiliated with Lanzhou University and the DICOM database. This study was supported by Fundamental Research Funds for the Central Universities No. lzujbky-2016-238) and the National Natural Science Foundation of China (No. 61175012).


  1. 1.
    Collen MF, Ball MJ (eds) (2015) The history of medical informatics in the United States. Springer, BerlinGoogle Scholar
  2. 2.
    Cui J, Liu Y, Xu Y, Zhao H, Zha H (2013) Tracking generic human motion via fusion of low- and high-dimensional approaches. IEEE Transactions on Systems Man & Cybernetics Systems 43(4):996–1002CrossRefGoogle Scholar
  3. 3.
    Gutub AAA, Tabakh AA, Al-Qahtani A, Amin A (2013) Serial vs. parallel elliptic curve crypto processor designs. In IADIS International Conference: Applied Computing, pp 67–74Google Scholar
  4. 4.
    Hamza R (2017) A novel pseudo random sequence generator for image-cryptographic applications. J Inf Secur Appl 35:119–127Google Scholar
  5. 5.
    Hamza R, Titouna F (2016) A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. Information Security Journal: A Global Perspective 25(4–6):162–179Google Scholar
  6. 6.
    Hamza R, Muhammad K, Lv Z, Titouna F (2017) Secure video summarization framework for personalized wireless capsule endoscopy. Pervasive Mob Comput 41:436–450CrossRefGoogle Scholar
  7. 7.
    Hu HP, Liu LF, Ding ND (2013) Pseudorandom sequence generator based on the chen chaotic system. Comput Phys Commun 184(3):765–768MathSciNetCrossRefGoogle Scholar
  8. 8.
    Jiunn-Woei L, Yen DC, Wang Y-T (2014) An exploratory study to understand the critical factors affecting the decision to adopt cloud computing in Taiwan hospital. Int J Inf Manag 34(1):28–36CrossRefGoogle Scholar
  9. 9.
    Kumar S, Sharma RK (2017) Securing color images using two-square cipher associated with Arnold map. Multimed Tools Appl 76(6):8757–8779CrossRefGoogle Scholar
  10. 10.
    Li C, Sprott JC (2014) Coexisting hidden attractors in a 4-D simplified Lorenz system. Int J Bifurcation Chaos 24(03):1450034MathSciNetCrossRefzbMATHGoogle Scholar
  11. 11.
    Li C, Sprott JC (2014) Finding coexisting attractors using amplitude control. Nonlinear Dynam 78(3):2059–2064MathSciNetCrossRefGoogle Scholar
  12. 12.
    Lima JB, Madeiro F, Sales FJR (2015) Encryption of medical images based on the cosine number transform. Signal Process Image Commun 35:1–8CrossRefGoogle Scholar
  13. 13.
    Liu Y, Luo Y, Song S, Cao L, Liu J, Harkin J (2017) Counteracting dynamical degradation of digital chaotic Chebyshev map via perturbation. Int J Bifurcation Chaos 27(03):1750033MathSciNetCrossRefzbMATHGoogle Scholar
  14. 14.
    Liu J, Sprott JC, Wang S, Ma Y (2018) Simplest chaotic system with a hyperbolic sine and its applications in DCSK Scheme. IET Communications.
  15. 15.
    Mantos PL, Maglogiannis I (2016) Sensitive patient data hiding using a ROI reversible steganography scheme for DICOM images. J Med Syst 40(6):156CrossRefGoogle Scholar
  16. 16.
    Munmuangsaen B, Srisuchinwong B, Sprott JC (2011) Generalization of the simplest autonomous chaotic system. Phys Lett A 375(12):1445–1450CrossRefzbMATHGoogle Scholar
  17. 17.
    Pan SM, Wen RH, Zhou ZH, Zhou NR (2017) Optical multi-image encryption scheme based on discrete cosine transform and nonlinear fractional Mellin transform. Multimed Tools Appl 76(2):2933–2953CrossRefGoogle Scholar
  18. 18.
    Parvees MM, Samath JA, Bose BP (2016) Secured medical images-a chaotic pixel scrambling approach. J Med Syst 40(11):232CrossRefGoogle Scholar
  19. 19.
    Parvez MT, Gutub AAA (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait J Sci Eng 38(1B):127–142Google Scholar
  20. 20.
    Pham VT, Volos C, Jafari S, Kapitaniak T (2017) A novel cubic–equilibrium chaotic system with coexisting hidden attractors: analysis, and circuit implementation. J Circuits Syst Comput 27(04):1850066.
  21. 21.
    Piper JR, Sprott JC (2010) Simple autonomous chaotic circuits. IEEE Trans Circuits Syst II Express Briefs. 57(9):730–734CrossRefGoogle Scholar
  22. 22.
    Sajjad M, Muhammad K, Baik SW, Rho S, Jan Z, Yeo SS, Mehmood I (2017) Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices. Multimed Tools Appl 76(3):3519–3536CrossRefGoogle Scholar
  23. 23.
    Sprott JC (2011) A new chaotic jerk circuit. IEEE Trans Circuits Syst II Express Briefs 58(4):240–243CrossRefGoogle Scholar
  24. 24.
    Sun XH (2013) Image encryption algorithms and practices with implementations in C#. Sciencepress, BeijingGoogle Scholar
  25. 25.
    Wang X, Vaidyanathan S, Volos C, Pham VT, Kapitaniak T (2017) Dynamics, circuit realization, control and synchronization of a hyperchaotic hyperjerk system with coexisting attractors. Nonlinear Dynam 89(3):1673–1687Google Scholar
  26. 26.
    Weaver CA, Ball MJ, Kim GR, Kiel JM (2016) Healthcare information management systems. Springer International Publishing, ChamCrossRefGoogle Scholar
  27. 27.
    Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. Journal of Selected Areas in Telecommunications (JSAT) 2:31–38Google Scholar
  28. 28.
    Xu Y, Wang H, Li Y, Pei B (2014) Image encryption based on synchronization of fractional chaotic systems. Commun Nonlinear Sci Numer Simul 19(10):3735–3744MathSciNetCrossRefGoogle Scholar
  29. 29.
    Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf Sci 273(8):329–351CrossRefGoogle Scholar
  30. 30.
    Zhang Y, Qiu M, Tsai CW, Hassan MM, Alamri A (2015) Health-CPS: healthcare cyber-physical system assisted by cloud and big data. IEEE Syst J 11(1):88–95Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of Information Science and EngineeringLanzhou UniversityLanzhouChina

Personalised recommendations