Professional Documents
Culture Documents
A Fast Color Image Encryption Algorithm Based On Hyper-Chaotic Systems
A Fast Color Image Encryption Algorithm Based On Hyper-Chaotic Systems
A Fast Color Image Encryption Algorithm Based On Hyper-Chaotic Systems
DOI 10.1007/s11071-014-1492-0
ORIGINAL PAPER
Abstract This paper presents a new way of image UACI >33.56 %) in one round of diffusion. The exper-
encryption scheme, which consists of two processes; imental results reveal that the new image encryption
key stream generation process and one-round diffusion algorithm has the advantages of large key space, high
process. The first part is a pseudo-random key stream security, high sensitivity, and high speed. Also, the dis-
generator based on hyper-chaotic systems. The initial tribution of gray-level values of the encrypted image
conditions for both hyper-chaotic systems are derived has a semi-random behavior.
using a 256-bit-long external secret key by applying
some algebraic transformations to the key. The orig- Keywords Color image encryption · Diffusion ·
inal key stream is related to the plain-image which Hyper-chaotic systems
increases the level of security and key sensitivity of
the proposed algorithm. The second process employs
the image data in order to modify the pixel gray-level 1 Introduction
values and crack the strong correlations between adja-
cent pixels of an image simultaneously. In this process, Along with the fast development of electronic data
the states which are combinations of two hyper-chaotic exchange, it is essential to protect the confidentiality of
systems are selected according to image data itself and data from illegal access. Security breaches may affect
are used to encrypt the image. This feature will sig- user’s privacy and reputation. So, data encryption is a
nificantly increase plaintext sensitivity. Moreover, in useful means for ensuring reliable security in open net-
order to reach higher security and higher complexity, works such as the internet. The data include text, audio,
the proposed method employs the image size in key image, and other multimedia data. Each type of data
stream generation process. It is demonstrated that the has its own characteristics; as a result, different meth-
number of pixel change rate (NPCR) and the unified ods should be employed to protect confidential image
average changing intensity (UACI) can satisfy secu- data from unauthorized access. Security of image and
rity and performance requirements (NPCR >99.80 %, video data has become more and more important for
many applications such as internet-based communica-
B. Norouzi (B) · S. Mirzakuchaki tions, video conferencing, secure facsimile, medical,
Electronic Research Center, School of Electrical
and military applications.
Engineering, Iran University of Science and Technology,
P.O. Box 16846-13114, Tehran, Iran Most of the available encryption schemes are used
e-mail: Benyamin_Norouzi@elec.iust.ac.ir for text data. However, due to some inherent features
S. Mirzakuchaki of images such as bulk data capacity, strong correla-
e-mail: M_Kuchaki@iust.ac.ir tion among pixels, and high computation complexity,
123
B. Norouzi, S. Mirzakuchaki
the algorithms that are appropriate for textual data may ity, their security is not high enough. Some researchers
not be proper for multimedia data, especially under the have investigated image encryption based on hyper-
scenario of online communications. Consequently, dur- chaos [11,13,14], but in Ref. [15,16], some attacks
ing the last few years, several image encryption algo- were suggested to break a chaotic cryptosystem pre-
rithms have been proposed. Such encryption schemes sented in Ref. [14]. It has been shown that this algorithm
are based on iterative fractional Fourier transform [1], is weak against chosen-ciphertext and chosen-plaintext
Phase Encoding Algorithm in the Fresnel Transform attacks.
Domain [2], the hyper-chaotic systems [3], and chaos This paper aims to overcome these weaknesses
maps with total shuffling [4]. The cryptosystems based by designing a novel image encryption method with
on chaos are suitable for the secure transmission of high security and high sensitivity. In order to fast de-
images due to the intrinsic characteristics of chaotic correlate relations among pixels, two hyper-chaotic
systems such as ergodicity, randomness, simplicity, systems are employed to modify the pixel values and
sensitivity to initial conditions, and system parameters. break the correlations between adjacent pixels of an
There exist three main types for image encryption based image simultaneously in only one round of diffusion
on chaos, namely position permutation (confusion), the process. Based on the sequence which is generated by
value transformation (diffusion), and their compound- hyper-chaotic system and correlating keys with plain-
ing form [4–6]. The aim of permutation (confusion) text of an image to be encrypted, the algorithm uses
phase was to disturb the strong correlation among pix- different key streams when encrypting different input
els but due to the fact that the pixel value remains con- images (even with the same sequence based on hyper-
stant, the histogram of the encrypted image and the chaotic system). These features strengthen the cryp-
original image is identical, so its security is threatened tosystem security. Experimental results and perfor-
by the statistical attacks. Arnold cat map is often used to mance analysis prove the viability of this cryptography
shuffle the positions of the pixels in many cryptosys- based on privacy, integrity, and authenticity.
tems [6–9], but the map has two weaknesses. One is The rest of this paper is organized as follows.
that the iteration times are very limited, usually less Section 2 gives a brief introduction of pseudo-random
than 1,000 times; the other is that the width and height number generators and hyper-chaotic systems. Section 3
of the plain image must be equal, or the image cannot introduces the proposed encryption scheme. Section 4
be permuted directly. In the diffusion phase, the pixel evaluates the security of the proposed algorithm. Some
values of the original image are modified sequentially conclusions are drawn in Sect. 5.
by chaotic sequences such that a tiny change in the
gray-level value of only one pixel is spread out to all
the pixels (avalanche effect) [10,11]. Most of these dif- 2 Pseudo-random number generators
fusion schemes directly implement encryption by over-
laying a chaotic sequence generated by a single chaotic Random number generators are commonly used in
map and the pixel value from the image. Compared to encoding algorithms which can be classified into
the confusion, diffusion may lead to higher security. In three classes: true random number generators, pseudo-
practice, confusion and diffusion are often combined random number generators (PRNG), and hybrid ran-
in order to get high computational security [4,10]. The dom number generators. Pseudo-Random Number
whole confusion-diffusion round repeats for a number Generators are cryptographic and deterministic algo-
of times to achieve a satisfactory level of security. rithms used to produce numbers from an initial seed
Applying more than one chaotic map can achieve that must appear random but are necessarily predeter-
better key space. For grayscale image, most algorithms mined. As we know, each dynamical system has spe-
use the one-dimension chaotic maps [5], but their limi- cific characteristics. A good PRNG must have some
tations, such as small key space and weak security, are properties such as high value of entropy, high dimen-
also disturbing. The purpose of using multiple chaotic sionality of the parent dynamical system, very large
maps and hyper-chaotic systems is to enlarge the key period of the generated sequence, good distribution,
space to resist various attacks. Liu et al. [12] have used long period, portability, and so on [17,18]. In fact, the
multiple chaotic maps to encrypt images. Although differences between discrete dynamical systems arise
these algorithms have large key space and high sensitiv- from these properties.
123
A fast color image encryption algorithm
A probabilistic dynamical system is characterized pared with the chaotic system with only one positive
as ergodic or non-ergodic by its marginal probabil- Lyapunov exponent. It means that hyper-chaotic sys-
ity distributions. If the distributions have finite vari- tems generate better dynamical behaviors compared to
ances, so that a time-independent process-mean can chaotic systems. There are several 4D hyper-chaotic
be clearly defined, the system is called ergodic [19]. systems discovered in the high-dimensional social and
Moreover, the signs of Lyapunov exponents provide a economical systems such as Rossler system, Lorenz-
good classification of the dynamics of PRNG systems Haken system, Chua’s circuit, and Chen system [25].
that explain the separation rate of systems whose ini- In the suggested encryption scheme, the Chen’s
tial conditions differ by a small perturbation. Increasing chaotic system is one that is employed in key scheming
the values and the number of positive Lyapunov expo- which is described as follows [27]:
nents makes the probability distributions of the output ⎧
chaotic sequences more homogeneous and reduces the ⎪
⎪ ẋ1 = a (x2 − x1 ) ,
⎨
correlations of chaotic outputs for different times and ẋ2 = −x1 x3 + d x1 + cx2 − x4 ,
(1)
different space units [20–22]. ⎪ ẋ3
⎪ = x1 x2 − bx3 ,
⎩
One-dimensional chaotic systems such as Logistic ẋ4 = x1 + k,
map can be used as a pseudo-random number gen-
erator but their weaknesses, such as small key space where a, b, c, d, and k are system parameters. When
and weak security (it generates sequences of extremely a = 36, b = 3, c = 28, d = −16, and −0.7 ≤ k ≤
short period), are also disturbing [11,19]. 0.7, the system is hyper-chaotic and can generate four
Chen [23], Qi [24], and Lu [25] introduced three- hyper-chaotic sequences. We have used 0.2 for k in our
dimensional autonomous chaotic systems that exhibit a calculations. The chaotic behaviors of this system are
chaotic behavior with a single positive Lyapunov expo- shown in Fig. 1.
nent. Another chaotic system in our scheme is described
In order to increase the sensitivity, we seek PRNG as follows [26]:
systems with an improved random nature, or in other ⎧
words, with more and higher Lyapunov exponents. ⎪
⎪ ẋ5 = p (x6 − x5 ) + x6 x7 ,
⎨
Therefore, in this paper, we have employed hyper- ẋ6 = q x5 − x6 − x5 x7 + x8 ,
(2)
chaotic systems. It is worth mentioning that according ⎪
⎪ ẋ = x5 x6 − r x7 ,
⎩ 7
to Ref. [25–27], 3D systems proposed by chen, Qi and ẋ8 = sx8 − x5 x7 ,
Lu are not hyper-chaotic. Because in order to obtain
hyper-chaos, the following two basic conditions must where p, q, r , and s are system parameters. When
be met: p = 35, q = 8/3, r = 55, and s = 1.3, the hyper-
chaotic system is in the chaotic state and can produce
(1) The minimal dimension of the phase space of
four hyper-chaotic sequences. Here, we take the fourth-
an autonomous system is at least four which
order Runge-Kutta (we have used the algorithm given
requires the minimum number of coupled first-
in Matlab as ODE45 function.) method to solve the
order autonomous ordinary differential equations
Eqs. (1) and (2) and obtain the sequences x1 , x2 , . . ., x8 .
to be four.
These hyper-chaotic sequences are non-periodical and
(2) The number of terms in the coupled equations giv-
very sensitively dependent on initial conditions. The
ing rise to instability is at least two, of which at least
projections of the attractors are shown in Fig. 2.
one has a nonlinear function. In other words, the
system has at least two positive Lyapunov expo-
nents satisfying the condition that the sum of all
3 Color image encryption algorithm
Lyapunov exponents is less than zero.
In recent years, hyper-chaotic systems have been exten- Without loss of generality, we suppose that the size of
sively studied because of their ability to exhibit at least the color plain-image RGB_Image is 3 × M × N . We
two positive Lyapunov exponents. In other words, the transform RGB_Image into its R, G, and B components
dynamics of the system expand in more than one direc- as shown in Fig. 3; the size of each color’s (R, G, or B)
tion and produce a much more complex attractor com- matrix is M × N , and the pixels’ values range from 0 to
123
B. Norouzi, S. Mirzakuchaki
25 30 15
20
25
15 10
10 20
5
5
15
0
0
-5 10
10 -5
5
15
20 0 -10
-20 -15 -10 -5 0 5 10 15 20 -20 -15 -10 -5 0 5 10 15 20 -20 -15 -10 -5 0 5 10 15 20
a b c
30 15 15
25
10 10
20
5 5
15
0 0
10
-5 -5
5
0 -10 10
-20 -15 -10 -5 0 5 10 15 20 25 -20 -15 -10 -5 0 5 10 15 20 25 0 5 10 15 20 25 30
d e f
Fig. 1 The attractors of Chen’s hyper-chaos system. a x1 − x2 plane; b x1 − x3 plane; c x1 − x4 plane; d x2 − x3 plane; e x2 − x4
plane; f x3 − x4 plane
255. Afterwards, each color’s matrix (R, G or B) is con- N . Only 2 × L pseudo-random numbers are used for
verted into a one-dimensional vector of integers within the encryption of each component (R, G, or B).
{0, 1, …, 255}. Each vector has a length of L = N × M.
The image encryption algorithm includes generating
original chaotic key stream and one round of diffu-
sion operation. Two hyper-chaotic systems which are 3.1.1 Generation the initial conditions
described in Eqs. (1) and (2) are employed to produce
the original chaotic key stream. The image encryption Our image encryption algorithm employs a 256-bit-
algorithm is based on the final secret key stream which long external secret key (K). This key is segmented
is not only related to the original chaotic key stream but into 32-bit -long blocks (K i ) referred to as session keys.
also to the original image. The image encryption algo- Such session keys are then utilized for the generation
rithm includes generating original chaotic key stream of the initial conditions of the hyper-chaotic systems
and one round of diffusion process. described in Eqs. (1) and (2). The 256-bit-long external
secret key (K) is given by K = K 1 , K 2 , . . ., K 8 .
To compute the initial conditions {x10 , x20 , x30 , x40 ,
3.1 Key stream generation process x50 , x60 , x70 , x80 } of the hyper-chaotic systems, four
bytes K i j are produced from session keys as shown in
This process generates pseudo-random key streams for Fig. 4 (i = 1, . . ., 8 and j = 1, . . ., 4). From these K i j ,
encryption of the color image based on the two hyper- this method generates eight numbers (of 32 bits) Q i as
chaotic systems. To this end, 8 × L pseudo-random shown in Fig. 5. We have ksum = mod( ki j , 256).
numbers are produced for each color image of size M × The initial conditions are then obtained as follows:
123
A fast color image encryption algorithm
w
0 0 0
y
z
-5 -5 -5
-10 -10 -10
-15 -15 -15
-20 -20 -20
-30 -20 -10 0 10 20 30 -100 -50 0 50 100 150 5 10 15 20 25 30 35 40 45 50
x x x
a b c
y-z plane y-w plane z-w plane
30 30 50
45
20 20
40
10 10 35
30
w
w
0
z
25
-10 -10 20
15
-20 -20
10
-30 -30 5
5 10 15 20 25 30 35 40 45 50 -100 -50 0 50 100 150 -100 -50 0 50 100 150
y y z
d e f
Fig. 2 The attractors of hyper-chaos system described in Eq. (2). a x5 − x6 plane; b x5 − x7 plane; c x5 − x8 plane; d x6 − x7 plane; e
x6 − x8 plane; f x7 − x8 plane
Q i = bi2de (Q i1 ) × 109 + bi2de (Q i2 ) × 106 times to avoid the harmful effect of transitional
+ bi2de (Q i3 ) × 10 + bi2de (Q i4 ) .
3
(3) procedure.
Qi Step 2 two hyper-chaotic systems are iterated for L
xi 0 = 2 for i = 1, . . . , 8. (4) times continuously. For each iteration, we can
L
get eight values x1 , x2 , . . ., x8 . In other words,
The function bi2de(x) converts binary value x to deci- eight sequences {xi }, i = 1, 2, . . ., 8 will be
mal number. produced. The size of each sequence is L.
Obviously, this section shows that the initial condi- Step 3 these decimal values are determined first as fol-
tions of the hyper-chaotic systems are greatly sensitive lows:
to the change in even a single bit of the 256-bit external
secret key and the length of the plaintext (L); hence, the
proposed algorithm with total complexity of 2256 can
xi = floor mod xi × 1014 , 256 , (5)
resist any brute-force attack.
The hyper-chaos systems which are shown in Eqs.
(1) and (2) are employed to produce the original chaotic
key stream as follows: where i = 1, 2, . . ., 8; floor(x) returns the
value of x to the nearest integer less than or
Step 1 using Runge-Kutta step size 0.001 and initial equal to x. Mod (x, y) returns the remainder
conditions {x10 , x20 , x30 , x40 , x50 , x60 , x70 , after division. The size of each sequence (xi ) is
x80 }, iterate the hyper-chaotic systems for N0 L. To make the states of the two chaoticsystems
123
B. Norouzi, S. Mirzakuchaki
Q1 Q11 = k11 k84 ksum Q12 = k12 k83 ksum Q13 = k42 k52 ksum Q14 = k44 k54 ksum
Q2 Q21 = k21 k74 ksum Q22 = k22 k73 ksum Q23 = k32 k62 ksum Q24 = k34 k64 ksum
Q3 Q31 = k31 k64 ksum Q32 = k32 k63 ksum Q33 = k22 k72 ksum Q34 = k24 k74 ksum
Q4 Q41 = k41 k54 ksum Q42 = k42 k53 ksum Q43 = k12 k82 ksum Q44 = k14 k84 ksum
Q5 Q51 = k51 k44 ksum Q52 = k52 k43 ksum Q53 = k41 k51 ksum Q54 = k43 k53 ksum
Q6 Q61 = k61 k34 ksum Q62 = k62 k33 ksum Q63 = k31 k61 ksum Q64 = k33 k63 ksum
Q7 Q71 = k71 k24 ksum Q72 = k72 k23 ksum Q73 = k21 k71 ksum Q74 = k23 k73 ksum
Q8 Q81 = k81 k14 ksum Q82 = k82 k13 ksum Q83 = k11 k81 ksum Q84 = k13 k83 ksum
123
A fast color image encryption algorithm
Table 1 Different
Serial number R-channel G-channel B-channel
combinations of states
between two hyper-chaotic Key_r1 Key_r2 Key_g1 Key_g2 Key_b1 Key_b2
systems
0 x1 x2 x3 x4 x5 x6
1 x2 x3 x4 x5 x6 x7
2 x3 x4 x5 x6 x7 x8
3 x4 x5 x6 x7 x8 x1
4 x5 x6 x7 x8 x1 x2
5 x6 x7 x8 x1 x2 x3
6 x7 x8 x1 x2 x3 x4
7 x8 x1 x2 x3 x4 x5
this value after encryption, then the sum.image variable Step 5 calculate the ith pixel of cipher-images (cri ,
reached at the encryptor and decryptor, which are not cgi , and cbi ) using the values of the ith pixel of
the same and thus the decryption would be impossible. original images (ri , gi , and bi ), the previously
operated pixels (cri−1 , cgi−1 , and cbi−1 ), and
Step 4 compute the x̄ using the following formula:
ith chaotic keys corresponding to serial num-
sum.image = sum.image ber x̄ according to Table 1:
− (r (i) + g (i) + b (i)) , (10)
cri = bitxor (ri , bitxor (mod (cri−1
sum.image
x̄ = floor mod × 10 , 8
10
. (11) + key_r 1, 256) key_r 2)) , (12)
2565
As x̄ ∈ [0,7], we select from Table 1, the corresponding cgi = bitxor gi , bitxor mod cgi−1
group that can be used to perform encryption operation + key_g1, 256) key_g2)) , (13)
if x̄ equals to the serial number of sequence of the group. cbi = bitxor (bi , bitxor (mod (bri−1
Remark 2 The sum.image variable is used in Eq. + key_b1, 256) key_b2)) , (14)
(10) for encryption of the ith pixel. Because of the
where bitxor(x, y) returns the result after a bitwise XOR
fact that the algorithm needs to be reversible, the
operation.
ith pixel is not used for the formation of the sum.
image. Remark 4 In Eq. (12), a hyper-chaotic system is
employed to generate key_r1 and key_r2; therefore,
Remark 3 To increase the effect of the sum.image vari-
these keys are pseudo-random. On the other hand, since
ables, Eqs. (9) and (11) are used to increase the sensi-
the “add,” “mod,” and “XOR” operators do not disturb
tivity of this algorithm to a change in even one bit of
the pseudo-randomness nature of these keys, therefore,
the image. According to Eq. (11), eight different values
according to the equation below, the encrypted image
are given to x in Table 1 which results in selecting six
has a random nature [28,29]. Thus, a uniform histogram
keys in each iteration of the diffusion function. These
is reached. Equations (13) and (14) are the same as Eq.
steps help increase the random nature of our method.
(12).
123
B. Norouzi, S. Mirzakuchaki
⎛ ⎞
⎜ ⎛ ⎞⎟
⎜ ⎟
⎜ ⎟
⎜ ⎜ ⎟⎟
⎜ ⎜ ⎛ ⎞ ⎟ ⎟
⎜ ⎜ ⎟⎟
⎜ ⎜ ⎟ ⎟
⎜ ⎜ ⎜ ⎟ ⎟⎟
⎜ ⎜ ⎜ ⎟ ⎟ ⎟
⎜ ⎜ ⎜ ⎟ ⎟⎟
⎜ ⎜ ⎜ ⎟ ⎟ ⎟
⎜ ⎜ ⎜ ⎟ ⎟⎟
⎜ ⎜ ⎜ ⎟ ⎟ ⎟
cri = bitxor ⎜ri , bitxor ⎜mod ⎜cri−1 + key_r 1 , 256⎟, key_r 2 ⎟⎟ (15)
⎜ ⎜ ⎜ ⎟ ⎟ ⎟
⎜ ⎜ ⎜ ⎟ Pseudo-random ⎟⎟
⎜ ⎜ ⎜ Pseudo-random ⎟ ⎟ ⎟
⎜ ⎜ ⎝ ⎠ ⎟⎟
⎜ ⎜ ⎟ ⎟
⎜ ⎜ ⎟⎟
⎜ ⎜ Pseudo-random ⎟⎟
⎜ ⎝ ⎠⎟
⎜ ⎟
⎜ ⎟
⎜ Pseudo-random ⎟
⎝ ⎠
Pseudo-random
Pseudo-random
Step 6 set i ← i + 1 and return to step 4 until Step 1 convert the encrypted color image C into three
i reaches L. Then, we get the encrypted matrixes CR, CG, and CB.
arrays CR = {cr1 , cr2 , . . ., cr L }, CG = Step 2 transform each matrix into one-dimensional
{cg1 , cg2 , . . ., cg L }, and CB = {cb1 , cb2 , . . ., vectors denoted by CR = {cr1 , cr2 , . . ., cr L },
cb L }. By reshaping these sequences into CG = {cg1 , cg2 , . . ., cg L }, and B = {cb1 , cb2 ,
M × N images, we obtain the cipher-images. . . ., cb L }.
Then, we recombine them into color image Step 3 set i ← L; x̄ ← 0; and sum.image ← 0.
C. C is the encrypted image. Step 4 performing the reverse operations corresponds
to the diffusion operation in the encryption
Remark 5 In the encryption procedure, from Eq. (7) algorithm from the last pixel to the first pixel.
to Eq. (14), one can see that the pixel gray values The equations for removing the effect of dif-
of the original image are employed to modify the fusion stage are illustrated as follows:
final encryption keys. Hence, the final encryption keys ri = bitxor (cri , bitxor (mod (cri−1
depend on not only the initial state values of the hyper- + key_r 1, 256) key_r 2)) , (16)
chaos systems but also on the original image. When
different plain-images are encrypted, the correspond- gi = bitxor cgi , bitxor mod cgi−1
ing key stream is not the same. The attacker cannot +key_g1, 256) key_g2)) , (17)
obtain useful information by encrypting some special bi = bitxor (cbi , bitxor (mod (bri−1
images since the resultant information is related to + key_b1, 256) key_b2)) , (18)
those chosen-images. Therefore, the proposed scheme
sum.image = sum.image + (r (i) + g (i)
can well resist the known-plaintext and the chosen-
plaintext attacks. +b (i)) , (19)
sum.image
x̄ = floor mod × 1010 , 8 .
2565
3.3 Decryption algorithm (20)
Step 5 set i ← i − 1; return to step 4 until i reaches
The decryption procedure is similar to that of the 1. To obtain the first pixel of images (r1 , g1 ,
encryption process except that some steps are followed and b1 ), we use the initial value cr−1 , cg−1 ,
in a reversed order. and cb−1 which are calculated using Eq. 9.
123
A fast color image encryption algorithm
By reshaping the sequences R = {r1 , r2 , . . ., r L }, G = posed algorithm is compared with other image encryp-
{g1 , g2 , . . ., g L }, and B = {b1 , b2 , . . ., b L } into an M × tion algorithms in Table 2. The table shows that the key
N image, we obtain the recovered image. space of our suggested method is large enough to resist
any brute-force attack.
123
B. Norouzi, S. Mirzakuchaki
a b
800 700 900
800
700 600
700
600 500 600
500 500
400
400 400
300
300 300
200
200 200
100 100 100
0 0 0
0 50 100 150 200 250 0 50 100 150 200 250 0 50 100 150 200 250
c d e
600 600 600
0 0 0
0 50 100 150 200 250 0 50 100 150 200 250 0 50 100 150 200 250
f g h
Fig. 6 a Lena image (256 × 256); b Lena encryption; Histogram of the original image of Lena in the c Red, d Green, and e Blue
components; Histogram of the encrypted image of Lena in the f Red, g Green, and h Blue components
One must also pay attention to the fact that many uniform histogram and higher entropy leading to lower
cryptosystems have been cracked [3,5,11,14] regard- degree of correlation among pixels and, therefore, a
less of the PRNG system employed. This is due to the higher quality of the cryptosystem. Also, using the
weakness of their diffusion function (encryption algo- image pixels leads to resistance against differential
rithm), and this is why in addition to a suitable PRNG attacks.
system, we also need a strongly resistant encryption The histograms of several 256 × 256 color images
algorithm (diffusion and confusion algorithm). were analyzed with different contents and natures. Test
In our proposed method, any one of the hyper- results show that histograms of cipher-images are very
chaotic systems may be used to obtain an approxi- uniform and obviously different from the histogram of
mately uniform histogram in the encrypted image. But, the plain-images which makes statistical attacks dif-
according to our previous discussion (see Sect. 2), it is ficult. Figure 6 shows one typical result. The figures
obvious that the more ideal the PRNG system (here show clearly the uniformity and random-like appear-
a hyper-chaotic system), the more uniform would be ance of the histogram of the encrypted image. It demon-
the histogram of the cipher-image. By “more ideal,” strates that our encryption scheme has covered up all
we mean a higher randomness in generated numbers the characters of the plain-image and shows good per-
and higher entropy. Thus, the cipher-image has a more formance of balanced 0–1 ratio and zero correlation.
123
A fast color image encryption algorithm
4.2.2 Peak signal-to-noise ratio in the recent years are mentioned as follows. The algo-
rithm of Ref. [41] reports MSE = 8,369, the Norouzi’s
Even though an image histogram is a useful tool, unfor- algorithm reports MSE = 9,404 [32], the Singh’s algo-
tunately, it does not tell us much about the distance rithm mentioned in Refs. [41] reports MSE = 5,800,
between plain and cipher images. A better alternative the Wang’s algorithm mentioned in Ref. [41] reports
would be to use similarity measurement metrics such as MSE = 3,300, the Prasanna’s algorithm mentioned
the popular PSNR. An encrypted image should be sig- in Ref. [41] reports MSE = 8,760, and the proposed
nificantly different from the original one. As a measure algorithm reports MSE = 9,790. Compared with these
of the level of encryption of an image, we calculate the existing results, the MSE results of the proposed algo-
PSNR. The PSNR should be a low value corresponding rithm for the cipher-image Lena are better than these
to great difference between the original image and the algorithms.
encrypted image. Mathematically, PSNR is defined as
4.2.3 Information entropy
255
PSNR = 20log10 √ (db) , (21)
MSE
Entropy is a measure of uncertainty [28,29,32]. We
1 M N
MSE = (a (i, j) − b (i, j))2 , (22) can use it to express uncertainties in the image infor-
M×N mation. The entropy can determine the distribution of
i=1 j=1
gray-level values in the image. If the distribution of
where MSE is the Mean Square Error between the orig- gray-level values is more uniform, then the informa-
inal image and the encrypted image; M and N are the tion entropy is greater. The higher the value of entropy
width and the height of the test image, respectively; of an encrypted image, the better is the security. The
a(i, j) and b(i, j) are two pixel gray values of the orig- entropy is given as
inal image and encrypted image at the location (i, j),
respectively. The larger the MSE value, the better the M −1
2
encryption security. The effectiveness of the proposed 1
H (s) = P (si ) log2 , (23)
method, evaluated in terms of MSE and PSNR for all P (si )
i=0
six images, is tabulated in Table 3.
The average of the PSNR values for the encrypted where P(si ) denotes the probability of symbol si and
images is about 8.1717, which is considerably lower 2 M is the total states of the information source. A truly
than Refs. [11,32,38]. Random Image (RI) has a uniform distribution of pixel
Moreover, to compare the MSE values for Lena intensities in the interval [0, 255], i.e., P(RIi ) = 1/256
encryption, the MSE values of the reported schemes for all i ∈ [0, 255], hence, H (RI) = 8 bits. In other
Table 3 Comparison of MSE and PSNR of different encrypted images of the proposed method
Image PSNR MSE
123
B. Norouzi, S. Mirzakuchaki
160 120
140 100 100
120 80
100 50 60
80 40
60 0 20
50 100 150 200 250 300 0 50 100 150 200 250 20 40 60 80 100 120 140 160 180 200 220
a b c
300 300 300
50 50 50
0 0 0
0 50 100 150 200 250 300 0 50 100 150 200 250 300 0 50 100 150 200 250 300
d e f
Fig. 7 Correlation analysis of two horizontally adjacent pixels: respectively, show the distribution of two horizontally adjacent
frames (a), (b), and (c), respectively, show the distribution of two pixels in the encrypted image of Lena in the a red, b green, and
horizontally adjacent pixels in the plain-image of Lena in the a c blue, components; obtained using the proposed scheme
red, b green, and c blue components. Frames (d), (e), and (f),
words, for an ideally random image, the value of the images. The results are shown in Table 4. Also, the
information entropy is 8. entropy averages of six images are calculated and
We have computed the information entropy for six shown in the ninth row of this Table. The values
standard plain-images and their corresponding cipher- obtained are very close to the theoretical value of
123
A fast color image encryption algorithm
Table 5 Correlation coefficients of two adjacent pixels in the plain/cipher image of LENA
Algorithm Lena Component Orientation
123
B. Norouzi, S. Mirzakuchaki
Table 6 The results of CC values between original and elements of matrices A and B, respectively; and M and
encrypted images N are the height and width of the plain/cipher image,
Image CC respectively.
In Table 6, the CC of the encryption is pointed out. It
Red Green Blue
is clear that the CCs between various pairs of the origi-
Lena −0.0031 0.0043 −0.0025 nal and encrypted images are very small (or practically
Peppers −0.0047 −0.0024 −0.0028 zero). Considering CC values, our proposed algorithm
Couple 0.0054 0.0003 −0.0058 also shows better performance in comparison to Ref.
Baboon 0.0059 −0.0023 −0.0037 [11]. Therefore, the encrypted and original images are
Home −0.0063 −0.0012 −0.0020 significantly different.
Tree 0.0021 −0.0071 −0.0019
Average of absolute values 0.0046 0.0029 0.0031
Average (CCR,G,B ) 0035
4.3 Differential analysis
Ref. [11] 0.003673
As a general requirement for all image encryption algo-
rithms, the cipher-image should be greatly different
Yong Wang’s scheme [10], Congxu Zhu’s scheme [11], from its original form. The meaningful relationship
Liu Jin-mei’s scheme [12], Xiaopeng Wei’s scheme between an original image and its encrypted image can
[13], Mohammad Seyedzadeh’s scheme [33], Sahar be revealed using a slightly modified cipher-image. An
Mazloom’s scheme [34], Behnia scheme [35], Sun attacker can crack the cipher by tracing the difference
scheme [36], and Xiaoling Huang’s scheme [37] on of the two cipher-images. This kind of attack is called
“Lena.” differential attack. The secure image encryption algo-
rithm has to be highly sensitive to the plaintext and
4.2.5 Correlations between plain and cipher-images
the key, so that any changes in the plaintext or the key
should affect the whole ciphertext.
The correlations between various pairs of plain/cipher
images have been analyzed by computing the 2D CCs
between input and encrypted images [11,32]. The CC 4.3.1 Plaintext sensitivity
is calculated as follows:
M N The image encryption algorithm should be sensitive
i=1 j=1 Ai j − Ā Bi j − B̄
CC = , to a tiny change in the original image, which means
M N 2 M N 2
i=1 j=1 A i j − Ā i=1 j=1 Bi j − B̄ that one-pixel change leads to a completely different
cipher-image. Two criteria are generally used to mea-
(25)
sure the influence of a one-pixel change in plain-image
where A and B represent the plain-image and cipher- on the corresponding cipher-image. They are the num-
image, respectively; Ā and B̄ are the mean values of the ber of pixels change rate (NPCR) and the unified aver-
Table 7 Plaintext sensitivity
Image NPCR (average of 50 iterations for each component) UACI (average of 50 iterations for each component)
123
A fast color image encryption algorithm
Table 8 Comparison of
Algorithm Average (NPCRR,G,B ) (%) Average (NPCRR,G,B ) (%)
NPCRR,G,B and UACIR,G,B
on ‘Lena’ Proposed algorithm 99.8031 33.6237
Ref. [6] 99.6052 33.4000
Ref. [10] 99.6110 33.4630
Ref. [11] 99.6100 33.4700
Ref. [12] 99.6000 33.5000
Ref. [13] 99.2172 33.4055
Ref. [33] 99.6828 33.4898
Ref. [34] 99.6410 33.3620
Ref. [35] 0.46 0.39
Ref. [36] 0.40 0.3192
Ref. [37] 99.3097 33.4553
age changing intensity (UACI) which are calculated by cryptosystem only needs a minimum of one round to
achieve a high performance such as NPCR >99.80 %
i, j DR,G,B (i, j)
NPCRR,G,B = × 100 %, (26) and UACI >33.56 %. Therefore, the proposed algo-
M×N rithm can resist the differential attack if the number of
1
UACIR,G,B = rounds is at least one.
M×N ⎤ As it is obvious from the simulation results, the
⎡
CR,G,B (i, j) − CR,G,B (i, j) proposed cryptosystem achieves high performance by
× ⎣ ⎦ having NPCRR,G,B > 99.8028 and UACIR,G,B >
255
i, j 33.5555, and can well resist the known- plaintext and
×100 %, (27) the chosen-plaintext attacks.
where C and C are the two cipher-images whose corre-
sponding plain-images have only one-pixel difference. 4.3.2 Key sensitivity analysis
The grayscale values of the pixels at position (i, j) of
C and C are denoted as C(i, j) and C (i, j), respec- Extreme key sensitivity is an important feature for any
tively. The difference array DR,G,B (i, j) is determined good image encryption cryptosystem which guaran-
by the following rule: If CR,G,B (i, j) = CR,G,B (i, j), tees the security of the algorithm against the brute-
then DR,G,B (i, j) = 0; otherwise, DR,G,B (i, j) = 1. force attack to some extent. Indeed, a small deviation
To evaluate plaintext sensitivity of our proposed in the input should cause a large change in the output.
scheme, the following procedure was carried out: The hyper-chaos systems are sensitive to initial val-
ues which ensure the key sensitivity of the encryption
• Plain-image is encrypted first. scheme. Two key sensitivity tests were performed.
• Then, one pixel in the original image is ran-
domly selected and changed. The modified image 4.3.2.1 First key sensitivity test The encrypted image
is encrypted again using the same key. generated by the image encryption algorithm should
• Finally, the two cipher-images are compared pixel- be very sensitive to the secret external key; i.e., if two
by-pixel (the NPCR and UACI values are com- slightly different keys are used to encrypt the same plain
puted). image, then the two cipher-images produced should be
completely independent of each other.
This kind of test is performed over 150 times with
different images (900 times for all images). Table 7 • A 256 × 256 color image is encrypted using “1, 2,
provides the data related to the experimental results 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18,
obtained by our proposed algorithm. As can be seen 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31,
from the computer simulation results, the proposed 32” as the first set of keys or KEY1.
123
B. Norouzi, S. Mirzakuchaki
123
A fast color image encryption algorithm
New scheme 0 1
Norouzi’s [32] 0 2
Wang’s [43] 2 2
Wong’s [44] 4 2
Lian’s [45] 18 6
Xiang’s [46] 3 3
Red Green Blue 0.39, 0.3192 %, respectively. They can hardly satisfy
any high-performance requirement. On the contrary,
Lena 84.7177 77.5301 75.2204 it is demonstrated that the proposed method requires
Peppers 74.3792 86.1866 86.1460 only one encryption round (one round of diffusion)
Couple 97.1340 104.5973 105.8835 to achieve the satisfactory performance with NPCR
Baboon 76.6660 72.6091 79.3484 >99.80 % and UACI >33.55 %.
Home 69.4347 76.4666 80.2435 To make a comparison with other algorithms, the
Tree 76.7878 87.2157 80.5876 number of permutation and diffusion rounds required
Average 79.8532 84.1009 84.5716 to achieve this performance is listed in Table 11. The
Average (CCR,G,B ) 82.8419 results show that the number of permutation and dif-
Ref. [32] 80.2 fusion required by the new scheme is fewer than that
by other comparable algorithms. Thus, the proposed
algorithm indeed leads to a faster encryption speed.
The larger the MAE value, the better the encryption We have also analyzed the speed of the proposed
security. The results for the MAE values are shown in image encryption/decryption technique on a personal
Table 10. computer (PC) with a CPU 2.4 GHz, 4 GB Memory,
and 640 GB hard-disk capacity, and the operating sys-
tem is Microsoft Windows 7 using MATLAB 7.6.0.324
4.4 Speed performance (R2008a) and Eclipse 3.5 compiler. Table 12 shows that
the proposed algorithm is very fast compared to the
Regardless of the security considerations, some other other schemes such as Refs. [33,34,47–49].
aspects on image encryption are also important, such The algorithm’s speed on a DSP for the color image
as the running speed for the real-time internet applica- of size n × n, we compute the number of mathematical
tions. According Table 8, the NPCR and UACI mea- operations given in Table 13. According to the pro-
surements reported in Refs. [35,36] are 0.46, 0.40 and posed results, the total number of used operations is
123
B. Norouzi, S. Mirzakuchaki
77n 2 +27N0 +64 ≈ 77n 2 , and the proposed algorithm Table 14 Results of the SP800-22 tests suite for cipher Lena
has the computational complexity of O (n 2 ). Suppos- image
ing that the “add/subtract”, “XOR”, “mod”, and “floor” Test name P value Result
operators take one cycle and “multiplication/division”
Frequency 0.875539 Success
operators take two cycles, we can compute the esti-
Runs (M = 10,000) 0.299251 Success
mated time of hardware execution by multiplying these
operators by their related clock cycles and then dividing Block-frequency 0.900104 Success
by the CPU or DSP clock. Therefore, the encryption Long runs of ones 0.437274 Success
time on a ADSP-BF5xx DSP with a 750 MHz clock Rank 0.028181 Success
frequency would be less than 9 ms. Spectral DFT 0.689019 Success
It is obvious that running this algorithm on a newer No overlapping templates 0.350485 Success
series of DSP with the ability to perform add/multiply Overlapping templates 0.422034 Success
operations in one clock would greatly improve the Universal 0.350485 Success
speed. Lempel ziv complexity 0.170294 Success
Linear complexity 0.739918 Success
Approximate entropy 0.941144 Success
4.5 Decryption quality Serial (1) 0.500934 Success
Serial (2) 0.739918 Success
The decryption quality between original and decrypted
Cumulative sums (1) 0.122325 Success
images can be observed by means of the CC, MSE, and
Cumulative sums (2) 0.517442 Success
PSNR. For a good decryption, the CC should be near
Random excursions 0.531816 Success
1 or equal to 1, the MSE should be a small value, and
Random excursions variant 0.430824 Success
the PSNR should be large. To determine the decryp-
tion quality, the decryption algorithm is applied to the
encryption of all eight images. The CC, the MSE, and
the PSNR are computed for each decrypted image. For high complexity, and efficiency [50–57]. Recently, the
the proposed decryption, the CC of each decryption is 1. NIST designed a set of different statistical tests to jus-
The MSE of each decryption is 0, and the PSNR of each tify randomness of binary sequences produced by either
decryption is infinite. The results suggest that every hardware- or software-based cryptographic random or
decryption is accurate. In other words, each decrypted pseudo-random number generators [40].
image is identical to the corresponding original image. In order to satisfy these requirements, we have uti-
Thus, a good quality is demonstrated in the proposed lized NIST SP 800-22 tests [54], DIEHARD [55], and
decryption. ENT test suite for testing the randomness of the cipher.
Some of these tests consist of a number of subsets.
To carry on these tests, we have used 120 sequences of
4.6 Randomness tests for the cipher ciphers with the length of 1,000,000 bits. The encrypted
image is Lena 24 bits image. To test the cipher random-
For the security of a cryptosystem, the cipher must have ness, a lot of initial keys are used. The results of the
some properties such as good distribution, long period, tests are shown in Tables 14, 15, and 16. By analyzing
123
A fast color image encryption algorithm
Table 15 DIEHARD tests suite for the Lena image erate the initial conditions of two hyper-chaotic sys-
Test name P value Result tems by applying some algebraic transformations to
the key. Our algorithm is based on the final secret key
Birthday spacing 0.309305 Success stream which is not only related to the original chaotic
Overlapping permutation 0.913173 Success key stream but also to the plain-image. The second
Binary rank 31 × 31 0.371207 Success process employs the image data in order to modify the
Binary rank 6 × 8 0.890111 Success pixel gray-level values and crack the strong correlations
Bitstream 0.178442 Success between adjacent pixels of an image simultaneously. In
OPSO 0.663982 Success this process, the states which are the combinations of
OQSO 0.482065 Success two hyper-chaotic systems are selected according to
DNA 0.579123 Success image data itself and are used to encrypt the red, green,
Count the ones 01 0.530422 Success and blue components, respectively.
Count the ones 02 0.822360 Success All parts of the encryption system are simulated
Parking lot 0.259096 Success using MATLAB and Eclipse 3.5 compiler. Statistical
Minimum distance 0.824483 Success analysis shows that the scheme can well protect the
3DS spheres 0.029493 Success image against statistical attacks. Also, the measured
Squeeze 0.631710 Success encryption quality shows that the proposed algorithm
Overlapping sum 0.689073 Success
has a better encryption quality than others. Moreover,
the scheme possesses high key sensitivity and has a
Runs 0.824604 Success
good ability to resist differential attacks. MAE, NPCR,
CrapsRa 0.499557 Success
and UACI were used as three criterions to examine the
performance of resistance against differential attacks.
Table 16 Max grade of ENT test suite for the Lena image The results demonstrate that a swift change in the origi-
Test name Average value Result nal image and the key will result in a significant change
in the ciphered image and cannot yield the correct plain-
Entropy 7.999986 Success image. The decryption procedure is similar to that of the
Arithmetic mean 127.5378 Success encryption but in the reversed order. Overall, it seems
Monte Carlo 3.1401497 Success that the proposed algorithm can be a good candidate
Chi square 244.94 Success for image encryption.
SCC 0.000313 Success
Acknowledgments The authors would like to thank the Edi-
tor, the anonymous Referees, and Miss Shirin Saberian for their
valuable comments and suggestions to improve this paper.
these results, it can be deduced that our proposed image
encryption algorithm successfully passes the NIST SP
800-22, DIEHARD, and ENT tests. Therefore, based
on the achieved results, the generated ciphers in our
cryptosystem can be claimed, which are quite stochas- References
tic.
1. Zhou, N., Wang, Y., Gong, L., Chen, X., Yang, Y.: Single-
channel color image encryption based on iterative frac-
tional fourier transform and chaos. Opt. Laser Technol. 48,
5 Conclusion 117–127 (2013)
2. Huang, J.-J., Hwang, H.-E., Chen, C.-Y., Chen, C.-M.: Opti-
cal multiple-image encryption based on phase encoding
In this paper, we design a color image encryption algorithm in the Fresnel transform domain. Opt. Laser Tech-
scheme based on hyper-chaos systems, which consists nol. 44(7), 2238–2244 (2012)
of two processes; key stream generation process and 3. Mirzaei, O., Yaghoobi, M., Irani, H.: A new image encryp-
one-round diffusion process. The first process gener- tion method: parallel sub-image encryption with hyper
chaos. Nonlinear Dyn 67(1), 557–566 (2012)
ates pseudo-random key streams for encryption of the 4. Zhang, G., Liu, Q.: A novel image encryption method based
color image based on the two hyper-chaotic systems. on total shuffling scheme. Opt. Commun. 284, 2775–2780
A 256 bit-long external secret key is used to gen- (2011)
123
B. Norouzi, S. Mirzakuchaki
5. Belkhouche, F., Qidwai, U.: Binary image encoding using 25. Chen, A., Lu, J., Lu, J., Yu, S.: Generating hyperchaotic lu
one-dimensional chaotic map. In: Proceedings of the IEEE attractor via state feedback control. Physica A 364, 103–110
Annual Techical Conference, pp. 39–43 (2003) (2006)
6. Zhu, Z., Zhang, W., Wong, K., Yu, H.: A chaos-based sym- 26. Yujun, N., Xingyuan, W., Mingjun, W., Huaguang, Z.: A new
metric image encryption scheme using a bit-level permuta- hyperchaotic system and its circuit implementation. Com-
tion. Inf. Sci. 181, 1171–1186 (2011) mun. Nonlinear Sci. Numer. Simul. 15, 3518–3524 (2010)
7. Sui, L., Gao, B.: Color image encryption based on Gyrator 27. Gao, T., Chen, Z., Yuan, Z., Chen, G.: A hyperchaos gener-
transform and Arnold transform. Opt. Laser Technol. 48, ated from Chen’s system. Int. J. Mod. Phys. C 17(4), 471–
530–538 (2013) 478 (2006)
8. Chen, G., Mao, Y., Chui, C.: A symmetric image encryp- 28. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Hand-
tion scheme based on 3D chaotic cat maps. Chaos Solitons book of Applied Cryptography. CRC Press, Boca Raton
Fractals 21(3), 749–761 (2004) (1997)
9. Wang, K., Pei, W., Zou, L., Song, A., He, Z.: On the security 29. Goldreich, O.: Foundations of Cryptography. Weizmann
of 3D cat map based symmetric image encryption scheme. Institute of Science, Rehovot (1995). (fragment of a book)
Phys. Lett. A 343(6), 432–439 (2005) 30. Zhang, Y., Xiao, D., Wen, W., Li, M.: Cryptanalyzing a
10. Wang, Y., Wong, K., Liao, X., Chen, G.: A new chaos-based novel image cipher based on mixed transformed logis-
fast image encryption algorithm. Appl. Soft Comput. 11(1), tic maps. Multimed. Tools Appl. (2013). doi:10.1007/
514–522 (2011) s11042-013-1684-5
11. Zhu, C.: A novel image encryption scheme based on 31. Ye, G.: A block image encryption algorithm based on wave
improved hyperchaotic sequences. Opt. Commun. 285(1), transmission and chaotic systems. Nonlinear Dyn. (2013).
29–37 (2012) doi:10.1007/s11071-013-1074-6
12. Liu, J.M., Qiu, S.S., Xiang, F., Xiao, H.J.: A cryptosystem 32. Norouzi, B., Seyedzadeh, S.M., Mirzakuchaki, S., Mosavi,
based on multi-chaotic maps. In: International Symposiums M.R.: A novel image encryption based on hash function with
on Information Processing, pp. 740–743 (2008) only two-round diffusion process. Multimed. Syst. (2013).
13. Wei, X., Guo, L., Zhang, Q., Zhang, J., Lian, S.: A novel doi:10.1007/s00530-013-0314-4
color image encryption algorithm based on DNA sequence 33. Seyedzadeh, S.M., Mirzakuchaki, S.: A fast color image
operation and hyper-chaotic system. J. Syst. Softw. 85(2), encryption algorithm based on coupled two-dimensional
290–299 (2012) piecewise chaotic map. Signal Process. 92, 1202–1215
14. Gao, T., Chen, Z.: A new image encryption algorithm based (2012)
on hyper-chaos. Phys. Lett. A 372(4), 394–400 (2008) 34. Mazloom, S., Eftekhari-Moghadam, A.M.: Color image
15. Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption based on coupled nonlinear chaotic map. Chaos
encryption algorithm based on hyper-chaos. Phys. Lett. A Solitons Fractals 42(3), 1745–1754 (2009)
372(38), 5973–5978 (2008) 35. Behnia, S., Akhshani, A., Ahadpour, S., Mahmodi, H.,
16. Ge, X., Liu, F., Lu, B., Yang, C.: Improvement of Rhouma’s Akhavan, A.: A fast chaotic encryption scheme based on
attacks on Gao algorithm. Phys. Lett. A 374(11–12), 1362– piecewise nonlinear chaotic maps. Phys. Lett. A 366(4–5),
1367 (2010) 366, 391–396 (2007)
17. DSouza, R.M., Bar-Yam, Y., Kardar, M.: Sensitivity of bal- 36. Sun, F., Liu, S., Li, Z., Lü, Z.: A novel image encryption
listic deposition to pseudorandom number generators. Phys. scheme based on spatial chaos map. Chaos Solitons Fractals
Rev. E 57, 5044–5052 (1998) 38(3), 631–640 (2008)
18. Vattulainen, I., Ala-Nissila, T., Kankaala, K.: Physical mod- 37. Huang, X.: Image encryption algorithm using chaotic
els as tests of randomness. Phys. Rev. E 52, 3205–3214 Chebyshev generator. Nonlinear Dyn. 67, 2411–2417
(1995) (2012)
19. Behnia, S., Akhavan, A., Akhshani, A., Samsudin, A.: A 38. Taneja, N., Raman, B., Gupta, I.: Combinational domain
novel dynamic model of pseudo random number generator. encryption for still visual data. Multimed. Tool Appl. 59,
J. Comput. Appl. Math. 235, 3455–3463 (2011) 775–793 (2012)
20. Lee, P.-H., Chen, Y., Pei, S.-C., Chen, Y.-Y.: Evidence of the 39. Shatheesh Sam, I., Devaraj, P., Bhuvaneswaran, R.S.: An
correlation between positive Lyapunov exponents and good intertwining chaotic maps based image encryption scheme.
chaotic random number sequences. Comput. Phys. Com- Nonlinear Dyn. 69, 1995–2007 (2012)
mun. 160, 187–203 (2004) 40. Kanso, A., Ghebleh, M.: A novel image encryption algo-
21. Falcioni, M., Palatella, L., Pigolotti, S.: Properties making rithm based on a 3D chaotic map. Commun. Nonlinear Sci.
a chaotic system a good pseudo random number generator. Numer. Simul. 17, 2943–2959 (2012)
Phys. Rev. E 72, 016220 (2005) 41. Borujeni, S.E., Eshghi, M.: Chaotic image encryption
22. Gonzlez, C.M., Larrondo, H.A., Rosso, O.A.: Statistical system using phase-magnitude transformation and pixel
complexity measure of pseudorandom bit generators. Phys- substitution. J. Telecommun. Syst. (2011). doi:10.1007/
ica A 354, 281–300 (2005) s11235-011-9458-8
23. Choudhury, S.R., Gorder, R.A.V.: Competitive modes as 42. Liu, H., Wang, X.: Color image encryption using spatial bit-
reliable predictors of chaos versus hyperchaos and as geo- level permutation and high-dimension chaotic system. Opt.
metric mappings accurately delimiting attractors. Nonlinear Commun. 284, 3895–3903 (2011)
Dyn. 69(4), 2255–2267 (2012) 43. Wang, Y., Wong, K.W., Liao, X., Xiang, T.: A chaos-based
24. Qi, G., Chen, G., Du, S., Chen, Z., Yuan, Z.: Analysis of a image encryption algorithm with variable control parame-
new chaotic system. Physica A 352, 295–308 (2005) ters. Chaos Solitons Fractals 41, 1773–1783 (2009)
123
A fast color image encryption algorithm
44. Wong, K.W., Kwok, B.S., Law, W.S.: A fast image encryp- 52. Zhang, Y., Li, C., Li, Q., Zhang, D., Shu, S.: Breaking a
tion scheme based on chaotic standard map. Phys. Lett. A chaotic image encryption algorithm based on perceptron
372(15), 2645–2652 (2008) model. Nonlinear Dyn. 69(3), 1091–1096 (2012)
45. Lian, S., Sun, J., Wang, Z.: A block cipher based on a suitable 53. Li, C., Liu, Y., Xie, T., Chen, M.Z.Q.: Breaking a novel
use of the chaotic standard map. Chaos Solitons Fractals image encryption scheme based on improved hyperchaotic
26(1), 117–129 (2005) sequences. Nonlinear Dyn. 73(3), 2083–2089 (2013)
46. Xiang, T., Liao, X., Tang, G., Chen, Y., Wong, K.W.: A 54. Rukhin, A., et al.: A Statistical Test Suite for Random
novel block cryptosystem based on iterating a chaotic map. and Pseudorandom Number Generators for Cryptographic
J. Phys. Lett. A 349, 109–115 (2006) Applications. NIST Special Publication, 800–22 (2001)
47. Liu, Z.X.S., Sun, J.: An improved image encryption algo- 55. Marsaglia, G.: Diehard, A Battery of Tests for Random
rithm based on chaotic system. J. Comput. 4, 1091–1100 Number Generators (1997)
(2009) 56. Norouzi, B., Seyedzadeh, S.M., Mirzakuchaki, S., Mosavi,
48. Akhshani, A., Akhavan, A., Lim, S.-C., Hassan, Z.: An M.R.: A novel image encryption based on row-
image encryption scheme based on quantum logistic map. column, masking and main diffusion processes with
Commun. Nonlinear Sci. Numer. Simul. 17, 4653–4661 hyper chaos. Multimed. Tools Appl. (2013). doi:10.1007/
(2012) s11042-013-1699-y
49. Wang, X., Teng, L., Qin, X.: A novel colour image 57. Norouzi, B., Mirzakuchaki, S., Seyedzadeh, S.M., Mosavi,
encryption algorithm based on chaos. Signal Process. 92, M.R.: A simple, sensitive and secure image encryption algo-
1101–1108 (2012) rithm based on hyperchaotic system with only one round dif-
50. Wang, X., Liu, L.: Cryptanalysis of a parallel sub-image fusion process. Multimed. Tools Appl. (2012). doi:10.1007/
encryption method with high-dimensional chaos. Nonlinear s11042-012-1292-9
Dyn. 73(1–2), 795–800 (2013)
51. Li, C., Zhang, L.Y., Ou, R., Wong, K.W., Shu, S.: Breaking
a novel colour image encryption algorithm based on chaos.
Nonlinear Dyn. 70(4), 2383–2388 (2012)
123