Color image chaos encryption algorithm combining CRC and nine palace map


The color image encryption algorithm based on the chaos theory is not strong enough. In this paper, we proposed a color image chaos encryption algorithm combining Cyclic Redundancy Check (CRC) and nine palace map. Firstly, the pixel data of the plain image were moved and shuffled based on the theory of nine palace map. And the R, G and B components were extracted and converted into a binary sequence matrix that was then cyclically shifted based on the technology of generating CRC code. Finally, the encrypted image was derived from the XOR operation with random key matrix. The average entropy of encrypted image by our algorithm is 7.9993, which is slight improved compared with the coupled hyper chaotic Lorenz algorithm in previous studies. In addition, the algorithm has the advantages of large key space, high key sensitivity, anti-robust attack, and feasible encryption efficiency.

This is a preview of subscription content, log in to check access.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11


  1. 1.

    AqeelurRehman LX, Hahsmi MA et al (2018) An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos[J]. Optik 153

  2. 2.

    Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos[J]. Signal Process 128:155–170

    Article  Google Scholar 

  3. 3.

    Chai X (2017) An image encryption algorithm based on bit level Brownian motion and new chaotic systems[J]. Multimed Tools Appl 76(1):1159–1175

    Article  Google Scholar 

  4. 4.

    Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations[J]. Opt Lasers Eng 88:197–213

    Article  Google Scholar 

  5. 5.

    Chen W B, Xin Z (2006) Image encryption algorithm based on Henon chaotic system[C]// International Conference on Image Analysis and Signal Processing. IEEE 1–6

  6. 6.

    Chen J, Zhang Y, Qi L et al (2018) Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression[J]. Opt Laser Technol 99

    Article  Google Scholar 

  7. 7.

    Fu C, Chen ZF, Zhao W et al (2017) A new fast color image encryption scheme using chen chaotic system[C]// Ieee/acis international conference on software engineering, artificial intelligence, NETWORKING and parallel/distributed computing. IEEE:121–126

  8. 8.

    Hua Z, Yi S, Zhou Y (2017) Medical image encryption using high-speed scrambling and pixel adaptive diffusion[J]. Signal Process 144

  9. 9.

    Kadir A, Aili M, Sattar M (2017) Color image encryption scheme using coupled hyper chaotic system with multiple impulse injections[J]. Optik – Int J Light Electron Opt 129:231–238

    Article  Google Scholar 

  10. 10.

    Kanafchian M, Fathi-Vajargah BA (2017) Novel image encryption scheme based on Clifford attractor and Noisy logistic map for secure transferring images in navy [J]. Int J e-Navig Maritime Econ 6:53–63

    Google Scholar 

  11. 11.

    Kanso A, Ghebleh M (2017) An algorithm for encryption of secret images into meaningful images [J]. Opt Lasers Eng 90:196–208

    Article  Google Scholar 

  12. 12.

    Kumar M, Iqbal A, Kumar P (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie–Hellman cryptography[J]. Signal Process 125(C):187–202

    Article  Google Scholar 

  13. 13.

    Lan R, He J, Wang S, et al. (2018) Integrated Chaotic Systems for Image Encryption [J]. Signal Processing

  14. 14.

    Li Y, Dai W, Ming Z et al (2016) Privacy protection for preventing data over-collection in Smart City[J]. IEEE Trans Comput 65(5):1339–1350

    MathSciNet  Article  Google Scholar 

  15. 15.

    Liu H, Jin CA (2017) Novel color image encryption algorithm based on quantum Chaos sequence[J]. 3D Res 8(1):4

    Article  Google Scholar 

  16. 16.

    Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps[J]. Comput Math Appl 59(10):3320–3327

    MathSciNet  Article  Google Scholar 

  17. 17.

    Mahesh M, Srinivasan D, Kankanala M et al (2015) Image cryptography using discrete Haar wavelet transform and Arnold cat map [C]// international conference on communications and signal processing. IEEE:1849–1855

  18. 18.

    Martin K, Lukac R, Plataniotis KN (2005) Efficient encryption of wavelet-based coded color images [J]. Pattern Recogn 38(7):1111–1115

    Article  Google Scholar 

  19. 19.

    Mollaeefar M, Sharif A, Nazari M (2015) A novel encryption scheme for colored image based on high level chaotic maps[J]. Multimed Tools Appl 76:1–23

    Google Scholar 

  20. 20.

    Parvaz R, Zarebnia M (2017) A combination chaotic system and application in color image encryption[J]

  21. 21.

    Ping P, Xu F, Mao Y et al (2017) Designing permutation-substitution image encryption networks with Henon map[J]. Neurocomputing

  22. 22.

    Qiu H, Memmi G (2014) Fast Selective Encryption Method for Bitmaps Based on GPU Acceleration[C]// IEEE International Symposium on Multimedia. IEEE

  23. 23.

    Qiu H, Memmi G, Noura H (2017) An efficient secure storage scheme based on information fragmentation[C]// IEEE international conference on Cyber Security & Cloud Computing. IEEE

  24. 24.

    Sankpal PR, Vijaya PA (2014) Image encryption using chaotic maps: a survey[C]// international conference on Signal & Image Processing. IEEE:102–107

  25. 25.

    Sokouti M, Sokouti BA (2018) PRISMA-compliant systematic review and analysis on color image encryption using DNA properties[J]. Comput Sci Rev 29:14–20

    Article  Google Scholar 

  26. 26.

    Sosa C, Sutton B C, Huang H H (2010) PicFS: The Privacy-Enhancing Image-Based Collaborative File System[C]// IEEE International Conference on Parallel & Distributed Systems. IEEE Computer Society

  27. 27.

    Su Y, Tang C, Chen X et al (2017) Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map[J]. Optics & Lasers in. Engineering 88:20–27

    Google Scholar 

  28. 28.

    Teng L, Wang X, Meng J (2017) A chaotic color image encryption using integrated bit-level permutation[J]. Multimed Tools Appl 77(10):1–14

    Google Scholar 

  29. 29.

    Wang X, Zhang HL (2015) A color image encryption with heterogeneous bit-permutation and correlated chaos[J]. Opt Commun 342:51–60

    Article  Google Scholar 

  30. 30.

    Ye G, Huang X (2017) An efficient symmetric image encryption algorithm based on an intertwining logistic map[M]. Elsevier Science Publishers B. V

  31. 31.

    Ye C, Xiong Z, Ding Y et al (2014) Joint fingerprinting and encryption in hybrid domains for multimedia sharing in social networks[J]. J Vis Lang Comput 25(6):658–666

    Article  Google Scholar 

  32. 32.

    Ye C, Xiong Z, Ding Y et al (2016) Joint fingerprinting and encryption in the DWT domain for secure M2M communication[J]. Int J Sec Appl 10(1):125–138

    Google Scholar 

  33. 33.

    Zhang X, Wang X (2017) Multiple-image encryption algorithm based on mixed image element and chaos [J]. Optics & Lasers in. Engineering 92:6–16

    Google Scholar 

  34. 34.

    Zhang YQ, Wang XY, Liu J et al (2016) An image encryption scheme based on the MLNCML system using DNA sequences[J]. Opt Lasers Eng 82:95–103

    Article  Google Scholar 

  35. 35.

    Zhang Y, Qiu M, Tsai CW et al (2017) Health-CPS: healthcare cyber-physical system assisted by cloud and big data[J]. IEEE Syst J 11(1):88–95

    Article  Google Scholar 

  36. 36.

    Zhou N, Chen W, Yan X et al (2018) Bit-level quantum color image encryption scheme with quantum cross-exchange operation and hyper-chaotic system[J]. Quantum Inf Process 17(6):137

    MathSciNet  Article  Google Scholar 

  37. 37.

    Zhu L, Li W, Liao L et al (2006) A novel algorithm for scrambling digital image based on cat chaotic mapping[C]// international conference on intelligent information hiding and multimedia. IEEE Comput Soc:601–604

  38. 38.

    Wu Y, Hu F, Min G et al(2017) Big Data and Computational Intelligence in Networking[M].Taylor & Francis/CRC, Boca Raton

  39. 39.

    Cheng X, Wu Y, Min G et al (2018) Network Function Virtualization in Dynamic Networks: A Stochastic Perspective[J]. IEEE J Sel Areas Commun 36(10):2218–2232

    Article  Google Scholar 

  40. 40.

    Ma Y, Wu Y, Ge J et al (2018) An Architecture for Accountable Anonymous Access in the Internet-of-Things Network[J]. IEEE Access 6:14451–14461

    Article  Google Scholar 

  41. 41.

    Huang C, Min G, Wu Y et al (2017) Time Series Anomaly Detection for Trustworthy Services in Cloud Computing Systems[J]. IEEE Transactions on Big Data (99):1–1

Download references


This work was supported by the National Natural Science Foundation of China (No.61502154, 61370092), Hubei Provincial Department of Education Outstanding Youth Scientific Innovation Team Support Foundation (T201410), the MOE (Ministry of Education in China) Project of Humanities and Social Sciences (17YJCZH203).

Author information



Corresponding authors

Correspondence to Zenggang Xiong or Yuan Wu.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Xiong, Z., Wu, Y., Ye, C. et al. Color image chaos encryption algorithm combining CRC and nine palace map. Multimed Tools Appl 78, 31035–31055 (2019).

Download citation


  • Color image encryption
  • Cyclic redundancy check (CRC)
  • Nine palace map
  • Logistic map
  • Cross shift