Abstract
Chaotic maps are widely being researched for application in cryptography. In this paper, a new chaotic 2-Dimensional Henon Sine Map (2D-HSM) is derived from the well-known Henon and sine maps. The resulting chaotic map’s performance is demonstrated with the help of trajectory plots, bifurcation diagrams, Lyapunov exponents and Kolmogorov entropy. A novel Image Encryption Algorithm (IEA) is, then, proposed utilising the 2D-HSM to ensure the two essential characteristics of a good cryptographic system - diffusion and confusion. The IEA performs operations in two rounds for achieving a highly secure cipher-image. The simulation results and performance analysis are compared with some recently proposed cryptosystems which are also based on two dimensional chaotic maps. Simulations are carried out with the help of parameters like sensitivity to initial conditions and resistance to brute force attacks. The simulation results establish the security of the proposed 2D-HSM based IEA.


















Similar content being viewed by others
References
Alawidai M, Samsudin A, Teh J (2020) Enhanced digital chaotic maps based on bit reversal with applications in random bit generators. Inf Sci 512:1155–1169
Broumandnia A (2020) Scale invariant digital image encryption using 3D modular chaotic map. Multimed Tools Appl 79:11327–11355
Chai X, Yang K, Gan Z (2017) A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimed Tools Appl 76:9907–9927
Chang CC, Hwang MS, Chen TS (2001) A new encryption algorithm for image cryptosystems. J Syst Softw 58(2):83–91
Chen X, Hu CJ (2017) Adaptive medical image encryption algorithm based on multiple chaotic mapping. Saudi J Biol Sci 24:1821–1827
Chen G, Mao Y, Chui C (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solit Fractals 21(3):749–761
Chen J, Zhu Z, Zhang L, Zhang Y, Yang B (2018) Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption. Signal Process 142:340–353
Chen Y, Tang C, Ye R (2020) Cryptanalysis and improvement of medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 167:107286
Eskicioglu AM, Delp EJ (2001) An overview of multimedia content protection in consumer electronics devices. Signal Processing: Image Communication 16(7):681–699
Farsana F, Devi V, Gopakumar K (2019) An audio encryption scheme based on fast Walsh Hadamard transform and mixed chaotic keystreams. Applied Computing and Informatics. https://doi.org/10.1016/j.aci.2019.10.001
Franko DL, Cousineau TM, Rodgers RF, Roehrig JP (2013) Bodimojo: effective internet-based promotion of positive body image in adolescent girls. Body Image 10(4):481–488
Fu C, Lin B, Miao Y, Liu X, Chen J (2011) A novel chaos-based bit-level permutation scheme for digital image encryption. Opt Commun 284(23):5415–5423
Fu C, Chen J, Zou H, Meng W, Zhan Y, Yu Y (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Express 20(3):2363–2378
Gong L, Qiu K, Deng C, Zhou N (2019) An optical image compression and encryption scheme based on compressive sensing and RSA algorithm. Opt Lasers Eng 121:169–180
Graf F (2002) Providing security for eLearning. Computers & Graphics 26(2):355–365
Grassberger P, Procaccia I (1983) Estimation of the Kolmogorov entropy from a chaotic signal. Phys Rev A 28(4):2591–2593
Henon M (1976) A two-dimensional mapping with a strange attractor. Commun Math Phys 50:69–77
Hikal NA, Eid MM (2020) A new approach for palmprint image encryption based on hybrid chaotic maps. J King Saud Univ - Comput Inf Sci 32(7):870–882
Hua Z, Zhou Y (2016) Image encryption using 2D logistic-adjusted-sine map. Inf Sci 339:237–253
Hua Z, Zhou Y, Pun C, Chen C (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80–94
Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 144:134–144
Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403–419
Kang J, Nyang D, Lee K (2014) Two-factor face authentication using matrix permutation transformation and a user password. Inf Sci 269(10):1–20
Kopacsi S, Kovacs GL, Nacsa J (2013) Some aspects of dynamic 3D representation and control of industrial processes via the Internet. Comput Ind 64(9):1282–1289
Lai YL, Hwang JY, Jina Z, Cho KS, Teohc ABJ (2019) Symmetric keyring encryption scheme for biometric cryptosystem. Inf Sci 502:492–509
“lena512.bmp”. https://www.ece.rice.edu/wakin/images/lena512.bmp. Accessed 4 Feb 2021
Li P, Yang X, Cao K, Tao X, Wang R, Tian J (2010) An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. J Netw Comput Appl 33(3):207–220
Li C, Luo G, Qin K, Li C (2016) An image encryption scheme based on chaotic tent map. Nonlinear Dyn 87(1):127–133
Ming Li M, Xu M, Luo J, Fan H (2019) Cryptanalysis of an image encryption using 2D Henon-Sine map and DNA approach. IEEE Access 7:63336–63345
Maniccam SS, Bourbakis NG (2001) Lossless image compression and encryption using SCAN. Pattern Recogn 34(6):1229–1245
Natiq H, Al-Saidi NMG, Kilicman A (2018) A new hyperchaotic map and its application for image encryption. Eur Phys J Plus 133(6)
Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129–137
Qin X (2020) Business English visualization system based on video surveillance and the internet of things. Microprocess Microsyst 80:103639
Sharma M (2019) Image encryption based on a new 2D logistic adjusted logistic map. Multimed Tools Appl 79:355–374
Sheela SJ, Suresh KV, Tandur D (2019) Image encryption based on modified Henon map using hybrid chaotic shift transform. Multimed Tools Appl 11042-018-5782-2
Strogatz SH (2015) Nonlinear dynamics and chaos - with applications to physics, biology, chemistry and engineering. CRC Press, Boca Raton
Talhaoui Z, Wang X, Midoun A (2020) Fast image encryption algorithm with high security level using the Bülban chaotic map. Journal of Real-Time Image Processing. Accessed 4 Feb 2021. https://doi.org/10.1007/s11554-020-00948-1
USC-SIPI Image Database Website. http://sipi.usc.edu/database/database.php?volume=misc. Accessed 30 Sept 2020
Wang H, Xiao D, Chen X, Huang H (2018) Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map. Signal Process 144:444–452
Wilde SJ, Kelly SJ, Scott D (2004) An exploratory investigation into e-tail image attributes important to repeat, internet savvy customers. J Retail Consum Serv 11(3):131–139
Wu Y, Yang G, Jin H, Noonan JP (2012) Image encryption using the two-dimensional logistic chaotic map. Electron Imaging 21(1), Art ID 013014
Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci 222(10):323–342
Wu Y, Zhou Y, Noonan JP, Agaian S (2014) Design of image cipher using latin squares. Inf Sci 264(0):317–339
Wu JH, Liao XF, Yang B (2018) ‘Image encryption using 2D Hénon-Sine map and DNA approach. Signal Process 153:11–23
Yang W, Hu J, Wang S Stojmenovic M (2014) An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures. Pattern Recogn 47(3):1309–1320
Yu YH, Chang CC, Hu YC (2005) Hiding secret data in images via predictive coding. Pattern Recogn 38(5):691–705
Zhang Q, Samani A, Peters TM (2021) MR and ultrasound cardiac image dynamic visualization and synchronization over Internet for distributed heart function diagnosis. Comput Med Imaging Graph 88:101850
Zhou Y, Bao L, Chen CLP (2013) Image encryption using a new parametric switching chaotic system. Signal Process 93(11):3039–3052
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Competing interests
The authors declare that they have no conflict of interests/competing interests.
Additional information
Availability of Data and Materials
All data generated or analysed during this study are included in this published article.
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Sharma, M., Ranjan, R.K. & Bharti, V. An image encryption algorithm based on a novel hyperchaotic Henon sine map. Multimed Tools Appl 82, 11949–11972 (2023). https://doi.org/10.1007/s11042-022-13733-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-13733-y