Multimedia Tools and Applications

, Volume 78, Issue 24, pp 34773–34799 | Cite as

A novel randomized one-dimensional chaotic Chebyshev mapping for chosen plaintext attack secure image encryption with a novel chaotic breadth first traversal

  • Ali ShakibaEmail author


We construct a novel randomized chaotic image encryption algorithm based on the one-dimensional chaotic Chebyshev mappings. We first define a novel chaotic breadth-first search algorithm and then use it to apply the permutation to image pixels. We also use a novel approach to construct the diffusion matrix using a chaotic sequence. Using a one-dimensional chaotic mapping in constructing image encryption algorithm has the advantage of lower computational and space complexities compared to hyper-chaotic encryption schemes. Moreover, our design favors brute-force search attack resistance because of a sufficiently large key space, as well as providing CPA-security and robustness against noise and data loss scenarios. Finally, the security performance of our proposed method is investigated against statistical analysis, key-sensitivity analysis, and differential attack analysis which shows acceptable security.


Image encryption Chebyshev Chaotic breadth-first search Chaos 



The author gratefully acknowledges and is in debt of the helpful comments and suggestions of the reviewers, which have improved the presentation and the technicality of this paper.

Compliance with Ethical Standards

Conflict of interests

The authors declare that they have no conflict of interest.


  1. 1.
    Bergamo P, D’Arco P, De Santis A, Kocarev L (2005) Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans Circuits Syst Regul Pap 52(7):1382–1393MathSciNetzbMATHGoogle Scholar
  2. 2.
    Briggs K (1990) An improved method for estimating liapunov exponents of chaotic time series. Phys Lett A 151(1-2):27–32MathSciNetGoogle Scholar
  3. 3.
    Cao C, Sun K, Liu W (2018) A novel bit-level image encryption algorithm based on 2d-licm hyperchaotic map. Signal Process 143:122–133Google Scholar
  4. 4.
    Chai X, Gan Z, Chen Y, Zhang Y (2017) A visually secure image encryption scheme based on compressive sensing. Signal Process 134:35–51Google Scholar
  5. 5.
    Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos, Solitons & Fractals 21(3):749–761MathSciNetzbMATHGoogle Scholar
  6. 6.
    Cheng P, Yang H, Wei P, Zhang W (2015) A fast image encryption algorithm based on chaotic map and lookup table. Nonlinear Dyn 79(3):2121–2131Google Scholar
  7. 7.
    Cormen TH, Leiserson CE, Rivest RL, Stein C (2009) Introduction to algorithms. MIT Press, CambridgezbMATHGoogle Scholar
  8. 8.
    Daemen J, Rijmen V (2013) The design of rijndael: AES-the advanced encryption standard. Springer Science & Business Media, BerlinzbMATHGoogle Scholar
  9. 9.
    Eslami Z, Bakhshandeh A (2013) An improvement over an image encryption method based on total shuffling. Opt Commun 286:51–55Google Scholar
  10. 10.
    Gupta K, Silakari S (2012) Novel approach for fast compressed hybrid color image cryptosystem. Adv Eng Softw 49:29–42Google Scholar
  11. 11.
    Hermassi H, Rhouma R, Belghith S (2013) Improvement of an image encryption algorithm based on hyper-chaos. Telecommun Syst 52(2):539–549Google Scholar
  12. 12.
    Hu T, Liu Y, Gong LH, Guo SF, Yuan HM (2017) Chaotic image cryptosystem using DNA deletion and DNA insertion. Signal Process 134:234–243Google Scholar
  13. 13.
    Hua Z, Jin F, Xu B, Huang H (2018) 2d logistic-sine-coupling map for image encryption. Signal Process 149:148–161Google Scholar
  14. 14.
    Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 144:134–144Google Scholar
  15. 15.
    Huang C, Nien H (2009) Multi chaotic systems based pixel shuffle for image encryption. Opt Commun 282(11):2123–2127Google Scholar
  16. 16.
    Huang X (2012) Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn 67(4):2411–2417MathSciNetGoogle Scholar
  17. 17.
    Kadir A, Hamdulla A, Guo WQ (2014) Color image encryption using skew tent map and hyper chaotic system of 6th-order cnn. Optik-International Journal for Light and Electron Optics 125(5):1671–1675Google Scholar
  18. 18.
    Khan M (2015) A novel image encryption scheme based on multiple chaotic s-boxes. Nonlinear Dyn 82(1-2):527–533MathSciNetGoogle Scholar
  19. 19.
    Kocarev L, Tasev Z (2003) Public-key encryption based on Chebyshev maps. In: Proceedings of the 2003 international symposium on circuits and systems, 2003. ISCAS’03, vol 3. IEEE, pp III–IIIGoogle Scholar
  20. 20.
    Li S, Chen G, Cheung A, Bhargava B, Lo KT (2007) On the design of perceptual mpeg-video encryption algorithms. IEEE Trans Circuits Syst Video Technol 17(2):214–223Google Scholar
  21. 21.
    Li XW, Lee IK (2015) Robust copyright protection using multiple ownership watermarks. Opt Express 23(3):3035–3046MathSciNetGoogle Scholar
  22. 22.
    Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76 (20):20,739–20,753Google Scholar
  23. 23.
    Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146–156Google Scholar
  24. 24.
    Liao X, Yin J (2018) Two embedding strategies for payload distribution in multiple images steganography. In: 2018 IEEE International conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 1982–1986Google Scholar
  25. 25.
    Lindell Y, Katz J (2014) Introduction to modern cryptography. Chapman and Hall/CRC, LondonzbMATHGoogle Scholar
  26. 26.
    Liu H, Wang X, Kadir A (2013) Color image encryption using choquet fuzzy integral and hyper chaotic system. Optik-International Journal for Light and Electron Optics 124(18):3527–3533Google Scholar
  27. 27.
    Liu H, Wang X, et al. (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466Google Scholar
  28. 28.
    Liu HS, Xin XJ, Yin XL, Yu CX, Zhang Q (2009) An optimization scheme for generating of Chebyshev optical chaotic sequence. Acta Phys Sin 58(4):2231–2234Google Scholar
  29. 29.
    Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26–36Google Scholar
  30. 30.
    Mao Y, Chen G, Lian S (2004) A novel fast image encryption scheme based on 3d chaotic baker maps. Int J Bifurcation Chaos 14(10):3613–3624MathSciNetzbMATHGoogle Scholar
  31. 31.
    Mason J, Handscomb D (2003) Chebyshev polynomials. CRC Press Company, Boca RatonzbMATHGoogle Scholar
  32. 32.
    Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71(3):1469–1497Google Scholar
  33. 33.
    Pak C, Huang L (2017) A new color image encryption using combination of the 1d chaotic map. Signal Process 138:129–137Google Scholar
  34. 34.
    Rhouma R, Meherzi S, Belghith S (2009) Ocml-based colour image encryption. Chaos, Solitons & Fractals 40(1):309–318zbMATHGoogle Scholar
  35. 35.
    Rostami MJ, Shahba A, Saryazdi S, Nezamabadi-pour H (2017) A novel parallel image encryption with chaotic windows based on logistic map. Comput Electr Eng 62:384–400Google Scholar
  36. 36.
    Shakiba A (2019) A randomized CPA-secure asymmetric-key chaotic color image encryption scheme based on the Chebyshev mappings and one-time pad. Journal of King Saud University-Computer and Information SciencesGoogle Scholar
  37. 37.
    Shakiba A, Hooshmandasl MR, Meybodi MA (2016) Cryptanalysis of multiplicative coupled cryptosystems based on the Chebyshev polynomials. Int J Bifurcation Chaos 26(07):1650,112MathSciNetzbMATHGoogle Scholar
  38. 38.
    Song CY, Qiao YL, Zhang XZ (2013) An image encryption scheme based on new spatiotemporal chaos. Optik-International Journal for Light and Electron Optics 124(18):3329–3334Google Scholar
  39. 39.
    Souyah A, Faraoun KM (2016) An image encryption scheme combining chaos-memory cellular automata and weighted histogram. Nonlinear Dyn 86(1):639–653MathSciNetGoogle Scholar
  40. 40.
    Stallings W (2017) Cryptography and network security: principles and practice. Pearson, Upper Saddle RiverGoogle Scholar
  41. 41.
    Wang W, Si M, Pang Y, Ran P, Wang H, Jiang X, Liu Y, Wu J, Wu W, Chilamkurti N, et al. (2018) An encryption algorithm based on combined chaos in body area networks. Comput Electr Eng 65:282–291Google Scholar
  42. 42.
    Wang W, Tan H, Pang Y, Li Z, Ran P, Wu J (2016) A novel encryption algorithm based on dwt and multichaos mapping. Journal of Sensors 2016Google Scholar
  43. 43.
    Wang X, Luan D, Bao X (2014) Cryptanalysis of an image encryption algorithm using Chebyshev generator. Digital Signal Process 25:244–247Google Scholar
  44. 44.
    Wang X, Wang Q, Zhang Y (2015) A fast image algorithm based on rows and columns switch. Nonlinear Dyn 79(2):1141–1149MathSciNetGoogle Scholar
  45. 45.
    Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290–299Google Scholar
  46. 46.
    Wong K. w. (2002) A fast chaotic cryptographic scheme with dynamic look-up table. Phys Lett A 298(4):238–242MathSciNetzbMATHGoogle Scholar
  47. 47.
    Wu J, Liao X, Yang B (2018) Image encryption using 2d hénon-sine map and DNA approach. Signal Process 153:11–23Google Scholar
  48. 48.
    Wu X, Hu H, Zhang B (2004) Parameter estimation only from the symbolic sequences generated by chaos system. Chaos, Solitons & Fractals 22(2):359–366zbMATHGoogle Scholar
  49. 49.
    Wu X, Wang D, Kurths J, Kan H (2016) A novel lossless color image encryption scheme using 2d dwt and 6d hyperchaotic system. Inf Sci 349:137–153Google Scholar
  50. 50.
    Wu X, Wang K, Wang X, Kan H (2017) Lossless chaotic color image cryptosystem based on DNA encryption and entropy. Nonlinear Dyn 90(2):855–875MathSciNetzbMATHGoogle Scholar
  51. 51.
    Wu Y, Zhou Y, Noonan JP, Agaian S (2014) Design of image cipher using latin squares. Inf Sci 264:317–339MathSciNetzbMATHGoogle Scholar
  52. 52.
    Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25Google Scholar
  53. 53.
    Yang YG, Tian J, Lei H, Zhou Y, Shi WM (2016) Novel quantum image encryption using one-dimensional quantum cellular automata. Inf Sci 345:257–270Google Scholar
  54. 54.
    Ye G, Pan C, Huang X, Zhao Z, He J (2018) A chaotic image encryption algorithm based on information entropy. Int J Bifurcation Chaos 28(01):1850,010MathSciNetzbMATHGoogle Scholar
  55. 55.
    Ye G, Wong KW (2012) An efficient chaotic image encryption algorithm based on a generalized arnold map. Nonlinear Dyn 69(4):2079–2087MathSciNetGoogle Scholar
  56. 56.
    Yin Q, Wang C (2018) A new chaotic image encryption scheme using breadth-first search and dynamic diffusion. Int J Bifurcation Chaos 28(04):1850,047MathSciNetGoogle Scholar
  57. 57.
    Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic s-box. Inf Sci 450:361–377MathSciNetGoogle Scholar
  58. 58.
    Zhang Y, Xiao D (2014) An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simul 19 (1):74–82zbMATHGoogle Scholar
  59. 59.
    Zhang Y, Zhang LY, Zhou J, Liu L, Chen F, He X (2016) A review of compressive sensing in information security field. IEEE Access 4:2507–2519Google Scholar
  60. 60.
    Zhen P, Zhao G, Min L, Jin X (2016) Chaos-based image encryption scheme combining dna coding and entropy. Multimed Tools Appl 75(11):6303–6319Google Scholar
  61. 61.
    Zhou Y, Bao L, Chen CP (2013) Image encryption using a new parametric switching chaotic system. Signal Process 93(11):3039–3052Google Scholar
  62. 62.
    Zhou Y, Bao L, Chen CP (2014) A new 1d chaotic system for image encryption. Signal Process 97:172–182Google Scholar
  63. 63.
    Zhou Y, Hua Z, Pun CM, Chen CP (2015) Cascade chaotic system with applications. IEEE Transactions on Cybernetics 45(9):2001–2012Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Computer ScienceVali-e-Asr University of RafsanjanRafsanjanIran

Personalised recommendations