Multimedia Tools and Applications

, Volume 77, Issue 19, pp 25569–25590 | Cite as

Optimizing chaos based image encryption

  • Saeed Noshadian
  • Ata Ebrahimzade
  • Seyed Javad Kazemitabar


Due to its inherent properties such as sensitivity to initial condition, ergodicity and systematic parametrization chaos systems have been extensively used in image encryption. However, one needs to optimize the chaos for each image being encrypted to provide high quality encryption. Features such as high entropy or low pixel correlation are measures of interest in image encryption. In this paper, we propose a novel technique to optimize a chaos based image encryption algorithm. The image is confused using logistic map as chaos function and diffused by modified Knuth shuffling algorithm. We use the logistic map parameters as encryption key. We then harness TLBO and GSA evolutionary algorithms to speed up the optimization process of these parameters. The optimization method yields parameters that lead to lowest correlation among adjacent pixels or highest entropy. We compare the quality and security of our cryptosystem with some famous image encryption methods in the literature.


Image encryption Logistic map TLBO algorithm GSA Knuth shuffle 


  1. 1.
    Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU Int J Electron Commun 66(10):806–816CrossRefGoogle Scholar
  2. 2.
    Alligood KT, Sauer TD, Yorke JA (1997) Chaos. In: Chaos. Springer, Berlin, pp 105–147Google Scholar
  3. 3.
    Bani Younes MA, Jantan A (2008) Image encrytion using block based transformation algorithm. IAENG Int J Comput Sci 35:1Google Scholar
  4. 4.
    Belkhouche F, Qidwai U (2003) Binary image encoding using 1D chaotic maps. In: 2003 Annual technical conference on IEEE region 5. IEEE, pp 39–43Google Scholar
  5. 5.
    Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749–761MathSciNetCrossRefzbMATHGoogle Scholar
  6. 6.
    Enayatifar R (2011) Image encryption via logistic map function and heap tree. Int J Phys Sci 6(2):221–228Google Scholar
  7. 7.
    Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93CrossRefGoogle Scholar
  8. 8.
    Fard EB, Atani RE (2013) A novel image encryption method based on chaotic maps. In: 2013 3th international conference on computer and knowledge engineering (ICCKE). IEEE, pp 190–195Google Scholar
  9. 9.
    Guan ZH, Huang F, Guan W (2005) Chaos-based image encryption algorithm. Phys Lett A 346(1):153–157CrossRefzbMATHGoogle Scholar
  10. 10.
    Jolfaei A, Mirghadri A (2010) A new approach to measure quality of image encryption. Int J Comput Netw Secur 2(8):38–44Google Scholar
  11. 11.
    Kamali SH, Shakerian R, Hedayati M, Rahmani M (2010) A new modified version of advanced encryption standard based algorithm for image encryption. In: 2010 International conference on electronics and information engineering (ICEIE), vol 1. IEEE, pp V1-141Google Scholar
  12. 12.
    Khan J, Ahmad J, Hwang SO (2015) An efficient image encryption scheme based on: Henon map, skew tent map and S-Box. In: 2015 6th international conference on modeling, simulation, and applied optimization (ICMSAO). IEEE, pp 1–6Google Scholar
  13. 13.
    Knuth DE (1998) The art of computer programming: sorting and searching, vol. 3. Pearson Education, LondonzbMATHGoogle Scholar
  14. 14.
    Lafe O (1996) Data compression and encryption using cellular automata transforms. In: IEEE international joint symposia on intelligence and systems, 1996. IEEE, pp 234–241Google Scholar
  15. 15.
    Li C, Li S, Chen G, Chen G, Hu L (2005) Cryptanalysis of a new signal security system for multimedia data transmission. EURASIP J Adv Signal Process 2005 (8):1–12MathSciNetCrossRefzbMATHGoogle Scholar
  16. 16.
    Lian S, Sun J, Wang Z (2005) A block cipher based on a suitable use of the chaotic standard map. Chaos, Solitons Fractals 26(1):117–129CrossRefzbMATHGoogle Scholar
  17. 17.
    Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90(9):2714–2722CrossRefzbMATHGoogle Scholar
  18. 18.
    Maniccam SS, Bourbakis NG (2004) Image and video encryption using SCAN patterns. Pattern Recogn 37(4):725–737CrossRefGoogle Scholar
  19. 19.
    Mitra A, Rao YS, Prasanna SRM (2006) A new image encryption approach using combinational permutation techniques. Int J Comput Sci 1(2):127–131Google Scholar
  20. 20.
    Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimedia Tools Appl 71(3):1469–1497CrossRefGoogle Scholar
  21. 21.
    Rao RV, Savsani VJ, Vakharia DP (2011) Teaching–learning-based optimization: a novel method for constrained mechanical design optimization problems. Comput Aided Des 43(3):303–315CrossRefGoogle Scholar
  22. 22.
    Rao RV, Savsani VJ, Vakharia DP (2012) Teaching–learning-based optimization: an optimization method for continuous non-linear large scale problems. Inf Sci 183 (1):1–15MathSciNetCrossRefGoogle Scholar
  23. 23.
    Rashedi E, Nezamabadi-Pour H, Saryazdi S (2009) GSA: a gravitational search algorithm. Inf Sci 179(13):2232–2248CrossRefzbMATHGoogle Scholar
  24. 24.
    Sabri NM, Puteh M, Mahmood MR (2013) A review of gravitational search algorithm. Int J Advance Soft Comput Appl 5(3):1–39Google Scholar
  25. 25.
    Sinha A, Singh K (2003) A technique for image encryption using digital signature. Opt Commun 218(4):229–234CrossRefGoogle Scholar
  26. 26.
    Sreelaja NK, Pai GV (2012) Stream cipher for binary image encryption using Ant Colony Optimization based key generation. Appl Soft Comput 12(9):2879–2895CrossRefGoogle Scholar
  27. 27.
    Van Droogenbroeck M, Benedett R (2002) Techniques for a selective encryption of uncompressed and compressed images. In: ACIVS advanced concepts for intelligent vision systems, proceedings, pp 90–97Google Scholar
  28. 28.
    Wang Y, Wong KW, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514–522CrossRefGoogle Scholar
  29. 29.
    Wang W, Tan H, Pang Y, Li Z, Ran P, Wu J (2016) A novel digital image encryption algorithm based on wavelet transform and multi chaos. J Sensors 2016: Article ID 2646205Google Scholar
  30. 30.
    Wang W, Si M, Pang Y, Ran P, Wang H, Jiang X, Liu Y, Wu J, Wu W, Chilamkurti N, Jeon G (2017) An encryption algorithm based on combined chaos in body area networks. J Comput Electric Eng Available online 18Google Scholar
  31. 31.
    Zefreh EZ, Rajaee S, Farivary M (2011) Image security system using recursive Cellular automata substitution and its parallelization. In: 2011 CSI international symposium on computer science and software engineering (CSSE). IEEE, pp 77–86Google Scholar
  32. 32.
    Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775–2780CrossRefGoogle Scholar
  33. 33.
    Zhang Y, Xiao D (2014) Self-adaptive permutation and combined global diffusion for chaotic color image encryption. AEU Int J Electron Commun 68(4):361–368CrossRefGoogle Scholar
  34. 34.
    Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model 52(11):2028–2035MathSciNetCrossRefzbMATHGoogle Scholar
  35. 35.
    Zhou Y, Panetta K, Agaian S, Chen CP (2013) (n, k, p)-Gray code for image systems. IEEE Trans Cybern 43(2):515–529CrossRefGoogle Scholar
  36. 36.
    Zhou Y, Bao L, Chen CP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182CrossRefGoogle Scholar
  37. 37.
    Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171–1186CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Saeed Noshadian
    • 1
  • Ata Ebrahimzade
    • 1
  • Seyed Javad Kazemitabar
    • 1
  1. 1.Babaol Noshirvani University of TechnologyBabolIran

Personalised recommendations