Multimedia Tools and Applications

, Volume 78, Issue 12, pp 16177–16193 | Cite as

A fast hybrid image cryptosystem based on random generator and modified logistic map

  • Ayman M. Hemdan
  • Osama S. FaragallahEmail author
  • Osama Elshakankiry
  • Ahmed Elmhalaway


This paper demonstrates an image encryption technique using a hybrid method. This method consists of two stages. The image is XORed with the Pseudo-Random Number Generator (PRNG) in the first stage. The confusion and diffusion processes are applied by using the Logistic map and its’ three modifications in the second stage. The original Logistic map has a small range of key-space. The three modifications of Logistic map increased key-space range due to expanding the range of the original Logistic map parameter. Multiple tests have been performed on the hybrid method such as security analysis and encryption quality. The hybrid method presented a good evaluation.


Pseudo-random number generator (PRNG) Chaos Logistic map Diffusion Image encoding 



  1. 1.
    Chen JX, Zhu ZL, Fu C, Yu H (2015) A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Commun Nonlinear Sci Numer Simul 20:846–860CrossRefGoogle Scholar
  2. 2.
    Elabady NF, Abdalkader HM, Moussa MI, Sabbeh SF (2015) Image encryption based on new one-dimensional chaotic map. ICET, 2nd International Conference on Engineering and Technology, pp 851–892Google Scholar
  3. 3.
    Elkamchouchi H, Makar M (2005) Measuring encryption quality for bitmap images encrypted with rijndael and kamkar block ciphers. In: Radio Science Conference, Proceedings of the Twenty-Second National. IEEE, NRSC, pp 277–284Google Scholar
  4. 4.
    Farajallah M, El Assad S, Deforges O (2016) Fast and secure chaos-based cryptosystem for images. International Journal of Bifur and Chaos 26(02):1650021.1–1650021.21Google Scholar
  5. 5.
    Gokavarapu S, Kumari SV (2015) A novel encryption using one-dimensional chaotic maps. 49th Annual Convention of the Computer Society of India (CSI) Volume 1. Advances in Intelligent Systems and Computing, vol 337. SpringerGoogle Scholar
  6. 6.
    Gray R (2010) Entropy and information theory. Springer VerlagGoogle Scholar
  7. 7.
    Haliuk S, Krulikovskyi O, Politanskyi L (2016) Analysis of pixels permutations based on discretized Chirikov map. 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), Lviv, pp 519–521Google Scholar
  8. 8.
    Hua Z, Zhou Y, Pun C-M, Philip Chen CL (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80–94. ElsevierCrossRefGoogle Scholar
  9. 9.
    Kamali S, Shakerian R, Hedayati M, Rahmani M (2010) A new modified version of advanced encryption standard based algorithm for image encryption. In: Electronics and Information Engineering (ICEIE), International Conference On, vol. 1. IEEE, pp V1–141Google Scholar
  10. 10.
    Kocarev L, Lian S (2011) Chaos-based cryptography. SpringerGoogle Scholar
  11. 11.
    Kwok HS, Tang WKS (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons Fractals 32(4):1518–1529MathSciNetCrossRefzbMATHGoogle Scholar
  12. 12.
    Liu L, Miao S (2016) A new image encryption algorithm based on logistic chaotic map with varying parameter. SpringerPlus 5:289CrossRefGoogle Scholar
  13. 13.
    Martin M, Plastino A, Rosso O (2006) Generalized statistical complexity measures: geometrical and analytical properties. Physica A: Statistical Mechanics and its Applications 369(2):439–462Google Scholar
  14. 14.
    Mersenne twister. Accessed 15 Jan 2017
  15. 15.
    Mukhopadhyay D, Forouzan BA (2011) Cryptography and network security, 2nd edn. Mcgraw Hill EducationGoogle Scholar
  16. 16.
    Murillo-Escobar, Cruz-Hernández, Abundiz-Pérez, López-Gutiérrez (2016) Implementation of an improved chaotic encryption algorithm for real-time embedded systems by using a 32-bit microcontroller. Microprocess Microsyst 45(Part B):297–309. ElsevierCrossRefGoogle Scholar
  17. 17.
    Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934CrossRefGoogle Scholar
  18. 18.
    Rohith S, Bhat KN, Hari S, Nandini A (2015) Image encryption and decryption using chaotic key sequence generate by sequence of logistic map and sequence of states of linear feedback shift register. International Conference on Advances in Electronic, Computers and Communications, vol 6, pp 1124–1130Google Scholar
  19. 19.
    Shu-Jiang X, Ying-Long W, Ji-Zhi W, Min T (2008) A novel image encryption scheme based on chaotic maps. In: Signal Processing, 9th International Conference on. IEEE. ICSP, pp 1014–1018Google Scholar
  20. 20.
    Stallings W (2005) Cryptography and Network security principles and practices, Fourth edn. Prentice HallGoogle Scholar
  21. 21.
    Volos CK (2013) Image encryption scheme based on coupled chaotic systems. In: JAMB, vol 3, 1, pp 123–149Google Scholar
  22. 22.
    Wang C, Zhang X, Zheng Z (2017) An efficient image encryption algorithm based on a novel chaotic map. Multimedia Tools and Applications 76(22):24251–24280CrossRefGoogle Scholar
  23. 23.
    Xiao D, Liao X, Wei P (2009) Analysis and improvement of a chaos-based image encryption algorithm. Chaos, Solitons Fractals 40(5):2191–2199MathSciNetCrossRefzbMATHGoogle Scholar
  24. 24.
    Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic S-box. Inf Sci 450:361–377. ElsevierMathSciNetCrossRefGoogle Scholar
  25. 25.
    Zhou Y, Hua Z, Pun C-M, Philip Chen CL (2015) Cascade chaotic system with applications. IEEE Transactions on Cybernetics 45(9):2001–2012CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer Science and Engineering, Faculty of Electronic EngineeringMenoufia UniversityMenoufEgypt
  2. 2.Department of Information Technology, College of Computers and Information TechnologyTaif UniversityTaifKingdom of Saudi Arabia

Personalised recommendations