Abstract
In this paper, we introduce a new hybrid system consisting of a permutation-substitution network based on two different encryption techniques: chaotic systems and the Latin square. This homogeneity between the two systems allows us to provide the good properties of confusion and diffusion, robustness to the integration of noise in decryption. The security analysis shows that the system is secure enough to resist brute-force attack, differential attack, chosen-plaintext attack, known-plaintext attack and statistical attack. Therefore, this robustness is proven and justified.
Graphical Abstract








Similar content being viewed by others
Abbreviations
- DC:
-
Cyclicshift
- Dcr:
-
Decryption
- Ecr:
-
Encryption
- GCL:
-
Latin Square Generator
- GS:
-
Sequence Generator
- PCCL:
-
Column Latin Square Permutation
- PCL:
-
Latin Square Permutation
- PLCL:
-
Row Latin Square Permutation
- SCCL:
-
Column Latin Square Substitution
- SLCL:
-
Row Latin Square Substitution
References
Said, F., Yasser, A., & Abdo, A. (2011). How good is the DES algorithm in image ciphering? International Journal of Advanced Networking and Applications, 2(5), 796–803.
Manoj, B., Manjula, N. (2012) Image encryption and decryption using AES. International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249–8958, 1(5).
Irfan, L., Burhanuddin, C., Aamna, P. et al. (2012) Image encryption and decryption using blowfish algorithm, National Conference on Emerging Trends in Information Technology.
Lian, S. (2009). A block cipher based on chaotic neural networks. Neurocomputing, 72, 1296–1301.
Guan, Z., Huang, F., & Guan, W. (2005). Chaos-based image encryption algorithm. Physics Letters A, 346, 153–157.
Pareek, N., Patidar, V., & Sud, K. (2006). Image encryption using chaotic logistic map. Image and Vision Computing, 24, 926–934.
Lian, S. (2009). Efficient image or video encryption based on spatiotemporal chaos system. International Journal of Chaos Solitons Fractals, 40(15), 2509–2510.
Fu, C., Zhu, Z. (2008) A chaotic image encryption scheme based on circular bit shift method. The 9th International Conference for Young Computer Scientists, pp. 3057–3061.
Yue, W., Gelan, Y., Huixia, J., et al. (2012). Image encryption using the two-dimensional logistic chaotic map. Journal of Electronic Imaging, 21(1), 013–014.
Li, S., Mou, X., Cai, Y., et al. (2003). On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision. Computer Physics Communications, 153(1), 52–58.
Alvarez, G., Li, S., & Hernandez, L. (2007). Analysis of security problems in a medical image encryption system. Computers in Biology and Medicine, 37(3), 424–427.
lvarez, G., Montoya, F., Romera, M., et al. (2003). Cryptanalysis of a discrete chaotic cryptosystem using external key. Physics Letters A, 319(3–4), 334–339.
Yue, W., Yicong, Z., Joseph, P., et al. (2014). Design of image cipher using latin squares. Information Sciences, 264, 317–339.
Radwan, A., Soliman, A., & Sedeek, E. L. (2004). Realization of the modified Lorenz chaotic system. Chaos Soliton Fractals, 21, 553–561.
Radwan, A., Soliman, A., & Elwakil, A. (2007). 1-D digitally-controlled multi-scroll chaos generator. International Journal of Bifurcation and Chaos (IJBC), 17(1), 227–242.
Telem, A. N. K., Segning, C. M., Kenne, G., Fotsin, H. B. (2014) A simple and robust gray image encryption scheme using chaotic logistic map and artificial neural network. Advances in Multimedia (2014): 19
Zhu, H., Zhao, C., & Zhang, X. (2013). A novel image encryption–compression scheme using hyper-chaos and Chinese remainder theorem. Signal Processing: Image Communication, 28(6), 670–680.
Hraoui, S., Gmira, F., Saaidi, A., et al. (2015). Chaos based crypto-compression using SPIHT coding. International Journal of Imaging and Robotics, 15(2), 68–78.
Kanso, A., & Ghebleh, M. (2012). A novel image encryption algorithm based on a 3D chaotic map. Communications in Nonlinear Science and Numerical Simulation, 17(7), 2943–2959.
Pareek, N. K., Patidar, V., & Sud, K. K. (2013). Diffusion–substitution based gray image encryption scheme. Digital Signal Process, 23(3), 894–901.
Al-Husainy, M. A. F. (2012). A novel encryption method for image security. International Journal of Security and Its Applications, 6(1), 1–8.
Pareek, N. K., Patidar, V., & Sud, K. K. (2011). Substitution-diffusion based image cipher. International Journal of Network Security and Its Applications (IJNSA), 3(2), 149–160.
Li Z, Liu X (2010) The image encryption algorithm based on the novel diffusion transformation. In 2010 International Conference on Computer, Mechatronics, Control and Electronic Engineering (CMCE) (pp. 345–348).
Wang, X., & Yang, L. (2012). A novel chaotic image encryption algorithm based on water wave motion and water drop diffusion models. Optics Communication, 285(20), 4033–4042.
Fouda, J. S. A. E., Effa, J. Y., Sabat, S. L., & Ali, M. (2014). A fast chaotic block cipher for image encryption. Communications in Nonlinear Science and Numerical Simulation, 19(3), 578–588.
Zhang, A., & Zhou, N. (2013). Color image encryption algorithm combining compressive sensing with Arnold transform. Journal of Computers, 8(11), 2857–2863.
Zhang, Y., & Xiao, D. (2014). Self-adaptive permutation and combined global diffusion for chaotic color image encryption. International Journal of Electronics and Communications (AEÜ), 68, 361–368.
AbdElHaleem, S. H., Radwan, A. G., Abd-El-Hafiz, S. K. (2014) A chess-based chaotic block cipher. In IEEE 12th International Conference on New Circuits and Systems (pp. 405–408).
Fournier-Prunaret, D., Lopez-Ruiz, R. (2003) Basin bifurcations in a two-dimensional logistic map, EprintarXiv:nlin/0304059.
Luo, W., Huang, F., & Huang, J. (2010). Edge adaptive image steganography based on lsb matching revisited. Information Forensics and Security. IEEE Transactions, 5(2), 201–214.
Menezes, A., Van Orschot, P., & Vanstone, S. (1997). Handbook of Applied Cryptography. Boca Raton: Chapman and Hall CRC.
Press, W. (2007). The art of scientific computing. Numerical recipes. New York: Cambridge University Press.
Data encryption standard (1977) Federal Information Processing Standards Publication 46.
Advanced encryption standard (2001) Federal Information Processing Standards Publication 197.
Stinson, D. (2006). The CRC Press series on discrete mathematics and its applications, cryptography: Theory and practice. New York: Chapman & Hall/CRC.
Zhi-liang, Z., Wei, Z., Wong, K., & Hai, Y. (2011). A chaos-based symmetric image encryption scheme using a bit-level permutation. Information Sciences, 181, 1171–1186.
Wang, X., & Lei, Y. (2012). A novel chaotic image encryption algorithm based on water wave motion and water drop diffusion models. Optics Communications, 285, 4033–4042.
Zhang, G., & Liu, Q. (2011). A novel image encryption method based on total shuffling scheme. Optics Communications, 284, 2775–2780.
Wang, X., Zhang, Y., & Bao, X. (2015). A novel chaotic image encryption scheme using DNA sequence operations. Optics and Lasers in Engineering, 73, 53–61.
Wua, Y., Joseph, P. N., & Agaianb, S. (2011). Shannon entropy based randomness measurement and test for image encryption. Information Sciences, 00, 1–23.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Machkour, M., Saaidi, A. & Benmaati, M.L. A Novel Image Encryption Algorithm Based on the Two-Dimensional Logistic Map and the Latin Square Image Cipher. 3D Res 6, 36 (2015). https://doi.org/10.1007/s13319-015-0068-1
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s13319-015-0068-1