Skip to main content

Image Encryption Based on Multi-scrolls Chaotic System and Logistic Map

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10658))

Abstract

The chaotic image encryption has been a hot research topic for years due to its remarkable functions. However, traditional chaotic systems exist some latent problems such as insecure key source, low key space, vulnerable to known-plaintext attacks and chosen-plaintext attacks. A novel encryption algorithm based on multi-scrolls chaotic system and Logistic map is proposed in the paper. The proposed algorithm uses multi-scrolls chaotic system and Logistic map to generate key sequences, and the cipher image is obtained by performing bit shuffling to the plain image according to key sequences, then double direction diffusion operations are applied to enhance the encryption performance. Multi-scrolls chaotic system has more complex dynamic characteristics and larger key space than single-scroll and traditional chaotic systems, which can obtain better encryption performance in image encryption. The experimental results show that our method has better encryption performance and higher security, which can be applied in other secure communication domain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lorenz, N.: Deterministic nonperiodic flow. J. Atmos. Sci. 20, 130–141 (1962)

    Article  Google Scholar 

  2. Matthews, R.: On the derivation of a chaotic encryption algorithm. Cryptologia 13, 29–42 (1989)

    Article  MathSciNet  Google Scholar 

  3. Mandal, M.K., Banik, G.D., Chattopadhyay, D.: An image encryption process based on chaotic logistic map. IEEE Tech. Rev. 29(5), 395–404 (2014)

    Article  Google Scholar 

  4. Krishnamoorthi, R., Murali, P.: Chaos based image encryption with orthogonal polynomials model and bit shuffling. In: IEEE International Conference on Signal Processing and Integrated Networks (2014)

    Google Scholar 

  5. Liu, L., Miao, S.: A new image encryption algorithm based on logistic chaotic map with varying parameter. Springer Plus 5, 289 (2016)

    Article  Google Scholar 

  6. Huang, M.Y., Huang, Y.M., Wang, M.S.: Image encryption algorithm based on chaotic maps. In: IEEE Computer Symposium, pp. 154–158 (2010)

    Google Scholar 

  7. Zhou, Y., Bao, L., Chen, C.L.P.: Image encryption using a new parametric switching chaotic system. Signal Process. 93(11), 3039–3052 (2013)

    Article  Google Scholar 

  8. Rohith, S., Sujatha, B.K.: Image encryption and decryption using combined key sequence of Logistic map and Lozi map. IEEE Int. Conf. Commun. Signal Process. 1053–1058, 2–4 (2015)

    Google Scholar 

  9. Ye, G., Wong, K.W.: An image encryption scheme based on time-delay and hyperchaotic system. Nonlinear Dyn. 71(1–2), 259–267 (2012)

    MathSciNet  Google Scholar 

  10. Zhang, J.: An image encryption scheme based on cat map and hyperchaotic lorenz system. In: IEEE International Conference on Computational Intelligence & Communication Technology, pp. 78–82 (2015)

    Google Scholar 

  11. Hassan, A.A.: Proposed hyperchaotic system for image encryption. Int. J. Adv. Comput. Sci. Appl. 7(1), 37–40 (2016)

    Google Scholar 

  12. Liu, M.H., Yu, S.M.: Multi-scroll high-order general Jerk circuits. Acta Phys. Sin. 55(11), 5707–5713 (2006)

    Google Scholar 

  13. Matsumoto, T., Chua, L.O., Komuro, M.: The double scroll. IEEE Trans. Circuits Syst. 32(8), 797–818 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  14. Yu, S., Tang, W.K.S.: Generation of n × m-scroll attractors in a two-port RCL network with hysteresis circuits. Chaos, Solitons Fractals 39(2), 821–830 (2009)

    Article  MATH  Google Scholar 

  15. Wang, C.H., Xu, H., Yu, F.: A novel approach for constructing high-order Chua’s circuit with multi-directional multi-scroll chaotic attractors. Int. J. Bifurcat. Chaos Appl. Sci. Eng. 23(2), 1350022_1–1350022_10 (2013)

    MathSciNet  MATH  Google Scholar 

  16. Ye, R.: A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Opt. Commun. 284(22), 5290–5298 (2011)

    Article  Google Scholar 

Download references

Acknowledgments

This work is partially supported by the Natural Science Foundation of Hunan Province (Grant No. 2017JJ2047), the Hunan province science and technology plan projects (Grant No. 2016GK2011), and young teachers program in Hunan University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yaoqiang Xiao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xiao, Y., Wang, Z., Cao, J., Yuan, J. (2017). Image Encryption Based on Multi-scrolls Chaotic System and Logistic Map. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10658. Springer, Cham. https://doi.org/10.1007/978-3-319-72395-2_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72395-2_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72394-5

  • Online ISBN: 978-3-319-72395-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics