A chaotic permutation and diffusion based image encryption algorithm for secure communications


In this digital era, a huge amount of digital data is being generated, transmitted, and stored over the network. Images are widely searched, shared and uploaded which make them more vulnerable to the attackers. Therefore, image encryption has become the most widespread form of secure image communication. In recent past, a range of chaotic encryption schemes have been proposed for image encryption which suffers from low key space and high computational overhead. In this paper, the authors have proposed a secure image encryption technique based on 2D Baker’s map. In the proposed scheme a plain image is permuted first, based on a sequence of pseudo random number generated by 2D Baker’s map followed by diffusion process based on XORing. The strength of the proposed scheme is analyzed using the most well-known security test measures like NPCR, MSE, PSNR, UACI, correlation coefficient, Entropy etc. and the results demonstrate that the proposed scheme is resistive to various types of known attacks. The scheme runs on comparatively low computational overhead. Further, the results are compared with existing schemes.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10


  1. 1.

    Akhavan A, Mahmodi H, Akhshani A (2006) A New Image Encryption Algorithm Based on One-Dimensional Polynomial Chaotic Maps. Computer and Information Sciences – ISCIS 2006: 21th International Symposium. Proceedings, Springer Berlin Heidelberg, Berlin, pp 963–971

    Google Scholar 

  2. 2.

    Akhavan A, Samsudin A, Akhshani A (2013) A novel parallel hash function based on 3d chaotic map. EURASIP J Adv Signal Process 2013(1):126

    Article  Google Scholar 

  3. 3.

    Amigó JM, Kocarev L, Szczepanski J (2007) Theory and practice of chaotic cryptography. Phys Lett A 366(3):211–216

    Article  Google Scholar 

  4. 4.

    Arumugam AS, Jothi DK (2010) Image encryption algorithm based on improved 3d chaotic cat map. In: 2010 IEEE International Conference on Computational Intelligence and Computing Research, pp 1–4

  5. 5.

    Benrhouma O, Hermassi H, Belghith S (2015) Security analysis and improvement of a partial encryption scheme. Multimed Tools Appl 74(11):3617–3634

    Article  Google Scholar 

  6. 6.

    Biswas K, Muthukkumarasamy V, Singh K (2015) An encryption scheme using chaotic map and genetic operations for wireless sensor networks. Sens J IEEE 15 (5):2801–2809

    Article  Google Scholar 

  7. 7.

    Chen Z, Li H, Dong E, Du Y (2010) A hyper-chaos based image encryption algorithm. In: 2010 Second International Conference on Intelligent Human-Machine Systems and Cybernetics, vol 2, pp 188–191

  8. 8.

    Chen Jx, Zhu Zl, Yu H (2014) A fast chaos-based symmetric image cryptosystem with an improved diffusion scheme. Optik - Int J Light Electron Opt 125(11):2472–2478

    Article  Google Scholar 

  9. 9.

    Fridrich J (1997) Image encryption based on chaotic maps. In: 1997. Computational Cybernetics and Simulation., 1997 IEEE International Conference on Systems, Man, and Cybernetics, vol 2, pp 1105–1110

  10. 10.

    Hamza R, Muhammad K, Lv Z, Titouna F (2017) Secure video summarization framework for personalized wireless capsule endoscopy. Pervasive Mob Comput 41:436–450

    Article  Google Scholar 

  11. 11.

    Jun Z, Li J, Luqian W (2010) A new compound chaos encryption algorithm for digital images. 2010 International Forum on Information Technology and Applications

  12. 12.

    Lawrence Bassham III E, Rukhin AL, Soto J, Nechvatal JR, Smid ME, Barker EB, Leigh SD, Levenson M, Vangel M, Banks DL, Heckert NA, Dray JF, Vo S (2010) SP 800-22 Rev. 1a. A statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards & Technology

  13. 13.

    Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238–246

    Article  Google Scholar 

  14. 14.

    Liu J, Yang D, Zhou H, Chen S (2017) A digital image encryption algorithm based on bit-planes and an improved logistic map. Multimed Tools Appl 77 (8):10217–10233

    Article  Google Scholar 

  15. 15.

    Mondal B, Mandal T (2013) A multilevel security scheme using chaos based encryption and steganography for secure audio communication. Int J Res Eng Technol 02(10):399–403

    Article  Google Scholar 

  16. 16.

    Mondal B, Singh SK (2013) A highly secure steganography scheme for secure communication. In: Proceedings.,International Conference of Computation and Communication Advancement (IC3A)-2013, vol 3, pp 88–92

  17. 17.

    Mondal B, Sinha N, Mandal T (2015) A secure image encryption algorithm using lfsr and rc4 key stream generator. In: Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics. Springer, India, pp 227–237

  18. 18.

    Mondal B, Biswas N, Mandal T (2017) A comparative study on cryptographic image scrambling. In: Proceedings of the Second International Conference on Research in Intelligent and Computing in Engineering, volume 10 of Annals of Computer Science and Information Systems. PTI, pp 261–268

  19. 19.

    Mondal B, Mandal T (2017) A light weight secure image encryption scheme based on chaos & dna computing. J King Saud Univ - Comput Inf Sci 29(4):499–504

    Google Scholar 

  20. 20.

    Parker TS, Chua L (1987) Chaos : A tutorial for engineers, 982 Proceedings IEEE, 75, 8

  21. 21.

    Parvin Z, Seyedarabi H, Shamsi M (2014) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimed Tools Appl 75(17):10631–10648

    Article  Google Scholar 

  22. 22.

    Stinson DR (2005) Cryptography: Theory and Practice, Third. Discrete Mathematics and Its Applications. Taylor & Francis, Milton Park

    Google Scholar 

  23. 23.

    Tong X-J, Wang Z, Zhang M, Liu Y (2013) A new algorithm of the combination of image compression and encryption technology based on cross chaotic map. Nonlinear Dyn 72(1-2):229–241

    MathSciNet  Article  Google Scholar 

  24. 24.

    Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108

    MathSciNet  Article  Google Scholar 

  25. 25.

    Wang X, Liu L (2013) Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos. Nonlinear Dynamics 73:795–800

    MathSciNet  Article  Google Scholar 

  26. 26.

    Wang X, Wang Q (2014) A novel image encryption algorithm based on dynamic s-boxes constructed by chaos. Nonlinear Dyn 75(3):567–576

    Article  Google Scholar 

  27. 27.

    Wang W, Tan H, Sun P, Yu P, Ren B (2016) A novel digital image encryption algorithm based on wavelet transform and multi-chaos. Wireless Communication and Sensor Network 1:711–719

    Google Scholar 

  28. 28.

    Wang W, Si M, Yu P, Ran P, Wang H, Jiang X, Liu Y, Wu J, Wu W, Chilamkurti N, Jeon G (2018) An encryption algorithm based on combined chaos in body area networks. Comput Electr Eng 65:282–291

    Article  Google Scholar 

  29. 29.

    Wong K-W, Kwok BS-H, Law W-S (2008) A fast image encryption scheme based on chaotic standard map. Phys Lett A 372(15):2645–2652

    Article  Google Scholar 

  30. 30.

    Wu CW, Rul’kov NF (1993) Studying chaos via 1-d maps-a tutorial. IEEE Trans Circ Syst I: Fund Theory Appl 40(10):707–721

    Article  Google Scholar 

  31. 31.

    Hamza R, Muhammad K, Nachiappan A, González GR (2017) Hash based Encryption for Keyframes of Diagnostic Hysteroscopy. IEEE Access 1:1–1

    Google Scholar 

  32. 32.

    Zhou J, Liu X, Au OC, Tang YY (2014) Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation. IEEE Trans Inf Forensic Secur 9(1):39–50

    Article  Google Scholar 

Download references

Author information



Corresponding author

Correspondence to Bhaskar Mondal.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Mondal, B., Kumar, P. & Singh, S. A chaotic permutation and diffusion based image encryption algorithm for secure communications. Multimed Tools Appl 77, 31177–31198 (2018). https://doi.org/10.1007/s11042-018-6214-z

Download citation


  • Baker’s map
  • Cryptography
  • Image encryption
  • PRNG
  • Security