Enhanced Digital Image Encryption Using Sine Transformed Complex Chaotic Sequence

  • Vimal GaurEmail author
  • Rajneesh Kumar Gujral
  • Anuj Mehta
  • Nikhil Gupta
  • Rudresh Bansal
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1164)


In order to increase the chaotic behaviour of the equation and to get better results than existing encryption methods, we have found a new chaotic equation, namely STLS. The chaotic map generated from STLS (as shown in Fig. 1) manifests convoluted behaviour in the entire range of parameters, and their output states scattered randomly and completely over the entire 2-D plane, which points out that they have an enhanced hyper-chaotic behaviour and shows highly random behaviour. For increasing the key space, our proposed encryption scheme uses effective scrambling and diffusion. Also, simulation results such as average entropy of encrypted image (7.9993) and NBCR (0.50005) show that our proposed algorithm is reliable and provides a high level of security.


Chaotic STLS Image encryption Scrambling and diffusion Entropy 


  1. 1.
    Y. Zhou, L. Bao, C.L.P. Chen, Image encryption using a new parametric switching chaotic system. Sig. Process. 93, 3039–3052 (2013).
  2. 2.
    X. Huang, G. Ye, An image encryption algorithm based on hyper-chaos and DNA sequence. Multimedia Tools Appl. 72, 57–70 (2014). Scholar
  3. 3.
    W. Liu, K. Sun, C. Zhu, A fast image encryption algorithm based on chaotic map. Opt. Lasers Eng. 84, 26–36 (2016). Scholar
  4. 4.
    L. Xu, Z. Li, J. Li, W. Hua, A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 78, 17–25 (2016). Scholar
  5. 5.
    N. Zhou, S. Pan, S. Cheng, Z. Zhou, Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt. Laser Technol. 82, 121–133 (2016). Scholar
  6. 6.
    J. Lu, O. Dunkelman, N. Keller, J. Kim, New impossible differential attacks on AES, in Proceedings of the Progress in Cryptology-INDOCRYPT (Springer, Berlin, 2008)., pp. 279–293
  7. 7.
    S. Zhu, C. Zhu, W. Wang, A new image encryption algorithm based on chaos and secure hash SHA-256. Entropy 20, 716 (2018). Scholar
  8. 8.
    Z. Hua, Y. Zhou, H. Huang, Cosine-transform-based chaotic system for image encryption. Inf. Sci. 480, 403–419 (2018). Scholar
  9. 9.
    G. Alvarez, S. Li, Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcat. Chaos 16, 2129–2151 (2006).
  10. 10.
    J.C.H. Castro, J.M. Sierra, A. Seznec, A. Izquierdo, A. Ribagorda, The strict avalanche criterion randomness test. Math. Comput. Simul. 68, 1–7 (2005). Scholar
  11. 11.
    Y. Wu, J.P. Noonan, S. Agaian, NPCR and UACI randomness tests for image encryption. Cyber J. Multidisci. J. Sci. Technol. J. Select. Areas Telecommun. (JSAT) 31–38 (2011)Google Scholar
  12. 12.
    H.H. Abdlrudha, Q. Nasir, Low complexity high security image encryption based on nested PWLCM chaotic map, in IEEE International conference for Internet Technology and Secure Transactions (2011), pp. 220–225Google Scholar
  13. 13.
    M.B. Hossain, M.T. Rahman, A.B.M.S. Rahman, S. Islam, A new approach of image encryption using 3D chaotic map to enhance security of multimedia component, in International Conference on Informatics, Electronics & Vision (ICIEV) (2014)., pp. 1–6
  14. 14.
    H. Al-Najjar, Digital image encryption algorithm based on a linear independence scheme and the logistic map, in Proceedings of ACIT (2011)Google Scholar
  15. 15.
    M. Khan, H.M. Waseem, A novel image encryption scheme based on quantum dynamical spinning and rotations. Plos One 13 (2018).
  16. 16.
    L. Min, T. Li, A chaos–based data encryption algorithm for image/video, in International Conference on Multimedia and Information Technology (2010)., pp. 172–175
  17. 17.
    Y. Zhou, L. Bao, C.L.P. Chen, A new 1D chaotic system for image encryption. Signal Process. 97, 172–182 (2014). Scholar
  18. 18.
    Z.L. Zhu, W. Zhang, K.-W. Wong, H. Yu, A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf. Sci. 181, 1171–1186 (2011). Scholar
  19. 19.
    A.A. Karawia, Encryption algorithm of multiple-image using mixed image elements and two dimensional chaotic economic map. Entropy 20, 801 (2018). Scholar
  20. 20.
    A. Srivastava, A survey report on different techniques of image encryption. Int. J. Emerg. Technol. Adv. Eng. 2, 163–167 (2012)Google Scholar

Copyright information

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021

Authors and Affiliations

  • Vimal Gaur
    • 1
    Email author
  • Rajneesh Kumar Gujral
    • 2
  • Anuj Mehta
    • 1
  • Nikhil Gupta
    • 1
  • Rudresh Bansal
    • 1
  1. 1.Computer Science and Engineering DepartmentMSITDelhiIndia
  2. 2.Computer Science and Engineering DepartmentM.M. Engineering CollegeMullanaIndia

Personalised recommendations