Skip to main content
Log in

Image encryption algorithm based on hyper-chaotic system and dynamic S-box

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Chaos based image encryption algorithm is a research hotspot in multimedia security area. In this paper, a hyper-chaos based image encryption algorithm is proposed. Firstly, a new hyper-chaotic system is constructed and its dynamic characteristics are analyzed. The proposed hyper-chaotic system has bigger Lyapunov exponent than many classical hyper-chaotic systems. Then this system is used to generate key-streams to permute and substitute the image pixels. In the encryption algorithm, a dynamic S-box is constructed to get good confusion effect. This S-box is based on the inverse operation in the algebraic structure Z 257. Moreover, this inverse operation is embedded into an affine transformation to complicate the algebraic expression of the S-box and improve its security. The analysis results show that the proposed algorithm performs well.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Adams C, Tavares S (1990) The structured design of cryptographically good S-boxes. J Cryptol 3:27–41

    Article  MathSciNet  MATH  Google Scholar 

  2. Cai GL, Tan ZM, Zhou WH, Tu WT (2007) Dynamical analysis of a new chaotic system and its chaotic control. Acta Phys Sin 56:6230–6237

    MATH  Google Scholar 

  3. Feistel H (1973) Cryptography and computer privacy. Sci Am 228(5)

  4. Huang XL, Ye GD (2014) An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed Tools Appl 72:57–70

    Article  Google Scholar 

  5. Kam JB, Davida GI (1979) Structured design and substitution permutation encryption networks. IEEE Trans Comput 28:747

    Article  MathSciNet  MATH  Google Scholar 

  6. Katz J, Lindell Y (2008) Introduction to Modern Cryptography. 1st ed. Taylor & Francis Group, pp 234–256

  7. Li SJ, Mou XQ, Cai YL (2001) Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography, INDOCRYPT, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 2247, pp 316

  8. Liao XF, Lai SY, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90:2714–2722

    Article  MATH  Google Scholar 

  9. Liao XF, Xiao D, Chen Y, Xiang T (2009) Theory and application of chaotic cryptography, 1st edn. Science Press, Beijing, pp 50–59

    Google Scholar 

  10. Lin QZ, Wong KW, Chen JY (2013) An enhanced variable-length arithmetic coding and encryption scheme using chaotic maps. J Syst Softw 86:1384–1389

    Article  Google Scholar 

  11. Liu MH, Feng JC (2010) Circuit design as implementation of four dimensional hyper-chaos and its projective synchronization. J Appl Sci 28:406–412

    Google Scholar 

  12. Liu SB, Sun J, Xu ZQ (2009) An improved image encryption algorithm based on chaotic system. J Comput 4:1091–1100

    Google Scholar 

  13. Liu Y, Tong XJ, Hu SC (2013) A family of new complex number chaotic maps based image encryption algorithm. Signal Process Image Commun 28:1548–1559

    Article  Google Scholar 

  14. Mazloom S, Eftekhari-Moghadam AM (2009) Color image encryption based on coupled nonlinear chaotic map. Chaos, Solitons Fractals 42:1745–1754

    Article  MATH  Google Scholar 

  15. Milnor J (1985) On the concept of attractor. Commun Math Phys 99:177–195

    Article  MathSciNet  MATH  Google Scholar 

  16. Qi GY, Sandra BM (2014) Hyper-chaos encryption using convolutional masking and model free unmasking. Chin Phys B 23:050507

    Article  Google Scholar 

  17. Qiu J, Wang P (2012) Encryption algorithm for compressed image based on chaotic maps. Comput Sci 39:44–46

    Google Scholar 

  18. Sang T, Wang RL, Yan YX (1998) Perturbance-based algorithm to expand cycle length of chaotic key stream. Electron Lett 34:873–874

    Article  Google Scholar 

  19. Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 92:1202–1215

    Article  Google Scholar 

  20. Tong XJ (2012) The novel bilateral-diffusion image encryption algorithm with dynamical compound chaos. J Syst Softw 85:850–858

    Article  Google Scholar 

  21. Tong XJ, Cui MG (2010) Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation. Sci China-Inf Sci 53:191–202

    Article  MathSciNet  Google Scholar 

  22. Wang JZ, Chen ZQ, Yuan ZZ (2006) The generation of a hyperchaotic system based on a three-dimensional autonomous chaotic system. Chin Phys 15:1216–1225

    Article  Google Scholar 

  23. Webster AF, Tavares SE (1985) On the design of S-boxes. Advances in cryptology-crypto 85. Lecture notes in computer science 218. Springer-Verlag New York, New York, pp 523–534

    Google Scholar 

  24. Wu XJ, Bai CX, Kan HB (2014) A new color image cryptosystem via hyperchaos synchronization. Commun Nonlinear Sci Numer Simul 19:1884–1897

    Article  Google Scholar 

  25. Zhu CX (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285:29–37

    Article  Google Scholar 

  26. Zhu HG, Zhao C, Zhang XD (2013) A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem. Signal Process Image Commun 28:670–680

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (60973162), the Natural Science Foundation of Shandong Province of China (ZR2014FM026, ZR2009GM037), the Science and Technology of Shandong Province, China (2013GGX10129, 2010GGX10132, 2012GGX10110), the Soft Science of Shandong Province, China (2012RKA10009), the National Cryptology Development Foundation of China (MMJJ201301006), the Foundation of Science and Technology on Information Assurance Laboratory (No. KJ-14-005) and the Engineering Technology and Research Center of Weihai Information Security.

Conflict of interest

The authors declare that they have no conflict of interest.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaojun Tong.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, Y., Tong, X. & Ma, J. Image encryption algorithm based on hyper-chaotic system and dynamic S-box. Multimed Tools Appl 75, 7739–7759 (2016). https://doi.org/10.1007/s11042-015-2691-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2691-5

Keywords

Navigation