A Secure Efficient and Super-Fast Chaos-Based Imag
A Secure Efficient and Super-Fast Chaos-Based Imag
https://doi.org/10.1007/s11554-023-01289-5
Received: 7 August 2022 / Accepted: 16 February 2023 / Published online: 8 March 2023
© The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2023
Abstract
The remarkable and ever-increasing use of digital images has turned the necessity of image encryption into an important
issue, which has attracted many researchers. Unfortunately, fast encryption schemes for large color images are not well
developed and studied. In this study, a secure, efficient and super-fast algorithm is proposed which is compatible with
real-time applications. In this algorithm, three Logistic maps are utilized to generate initial values for the Chen system. To
initialize three Logistic maps and Chen system parameters, a SHA-512 secret key is provided. Efficient use with fewer runs
of chaotic maps has resulted in faster encryption/decryption process as well as less required memory. Moreover, a SHA-512
secret key, which can provide a wide key space, beside using multiple and high-dimensional chaotic maps will bring more
security for the proposed algorithm. The simulation results confirm the efficiency and security of the proposed algorithm,
while the average speed for tested images is more than 245 Mbps and all the security tests are passed successfully. For Man-
drill color image 512 × 512 , the proposed algorithm results in an entropy of 7.999428, a NPCR value of 99.6241, UACI
value of 33.4741 and encryption time of 0.0343 s. To compare the obtained results with recently published works from the
literature, a comparative study is provided to confirm the significant performance of the proposed method in comparison
with the other studied schemes.
Keywords Image encryption · Chaotic maps · Logistic map · Chen system · Real time
1 Introduction across the Internet. The number of images which are being
shared through cell phones and social media is increasing
With rapid development of digital technologies, digital rapidly, while they need to be protected against any privacy
images are capturing our daily life. They have penetrated violation. Military images must be secured and protected
in most of the fields and services: from military and medi- from any unauthorized access. Medical images should be
cal services to social media and communication applica- encrypted to protect patient’s privacy. These examples are a
tions. Every day, millions of images with different types few of the real-life samples dealing with encryption require-
and sizes are transmitted through networks and typically, ments. Thus, secure transmission of images via different
unsecure networks is one of the significant topics that has
* Rasul Enayatifar attracted researchers around the world. Image encryption is
r.enayatifar@gmail.com one of the solutions aiming to secure transmitting images
Babak Rezaei and keeping them safe from unauthorized access. To achieve
bbkrze@gmail.com this goal, lots of algorithms and methods are proposed by
Mahvash Mobasseri researchers. Some of the more recent studies are discussed
mah.mobasseri@gmil.com here.
Enayatifar et al. [1] proposed an index-based encryp-
1
Department of Electrical Engineering, Universidade Federal tion algorithm using DNA sequence to encrypt multiple
de Minas Gerais (UFMG), Belo Horizonte, Brazil
images. This method combines DNA and cellular automata
2
Department of Applied IT and Pedagogy, University to improve the security and needs half of the image size for
of Gothenburg, Gothenburg, Sweden
the permutation process, while permutation and diffusion are
3
Department of Computer Engineering, Firoozkooh Branch, performed simultaneously. Li et al. [2] proposed an image
Islamic Azad University, Firoozkooh, Iran
13
Vol.:(0123456789)
encryption scheme which is based on chaos and employs based on bit replacing. The proposed method merges DNA
bit level permutation and diffusion. In this method, a skew encoding and high-dimensional chaotic maps. At first, the
tent map is utilized to generate two sequences for plain- image is converted to binary and by bit replacing, two dif-
related substitution. Rucklidge system is applied to control ferent images are generated. Then, a 3-dimensional Chen
position and bit cycle shift sequences as well as generating system is responsible for permuting both generated images,
security keys for encryption and decryption. Wei et al. [3] while Lorenz system is applied for diffusion. Afterwards,
proposed a fast encryption method for gray-scaled images the diffused images are converted to DNA encoding and a
which is based on parallel compressive sensing (PCS) and single encrypted image is finally produced by applying DNA
DNA sequence. In this method, first, the image is com- operations and decoding rules.
pressed and encrypted by PCS and Arnold map, then two While recent studies on image encryption have pro-
DNA matrices are utilized for encoding and diffusing the posed different schemes to improve the security and effi-
image. The initial values and DNA matrices are generated ciency of encryption algorithms, the literature does not
by SHA-256 secret key and Logistic Sine system. Iqbal et al. show sufficient studies in neither the large size images nor
[4] proposed an image encryption scheme for color images the encryption speed. These days, more powerful personal
using hyper-chaotic system and DNA encoding. The method computers and laptops are available worldwide but still
is developed by a 3D scrambled image, while two levels most of the algorithms are proposed for small size images
of confusion and diffusion are provided, namely decimal with big encryption time. To tackle these issues, a secure,
level and DNA level. The initial values are generated by 5D efficient and real-time image encryption algorithm is pro-
multi-wing hyper-chaotic system. Ul Haq et al. [5] proposed posed. Some of the advantages are listed as following:
an image encryption algorithm for RGB images by apply-
ing substitution and diffusion mechanisms. They used a 4D (1) Using a SHA-512 secret key to protect the algorithm
Mixed chaotic system which is a combination of nonlinear against any brute-force attacks.
sine chaotic map and the two-dimensional nonlinear Tink- (2) Needs only two pseudo-random values to encrypt or
erbell. Elkandoz et al. [6] proposed a confusion-diffusion decrypt each channel; six values for RGB image and
image encryption algorithm by combining different chaotic two values for a given gray level image.
maps. This algorithm performs Arnold Cat map to shuffle (3) Using Chen system efficiently during the encryption
the image, then 4 different chaotic maps are used for diffu- and decryption process.
sion: 2D Logistic Sine map, Linear Congruential Generator, (4) Reducing the number of XOR operations.
Bernoulli Map, and Tent Map. Duan et al. [7] proposed an (5) Performing encryption/decryption process in only one
image encryption scheme for color images which benefits round and M + N iterations for each channel of a given
from nonlinear fractals in its permutation part. Moreover, M × N image.
to resist brute-force attacks, a multi-parameter fractal is (6) Suitable for any real-time encryption/decryption appli-
included. Alexan et al. [8] proposed an algorithm which cation.
included three stages: using Rule 30 of cellular automata,
applying a robust S-box and, employing Lorenz system. Gao To evaluate the performance, both standard test images
et al. [9] proposed a multiple image encryption scheme for and large size images from different datasets are studied
gray level images which includes a single-channel encryp- and results are compared with recently provided algo-
tion combined with a chaotic system. In this algorithm, three rithms from the literature. From the aspect of speed, the
images can be processed at the same time to generate an proposed algorithm provides significant results and in
RGB image. Therefore, the generated image transfers to terms of security, all the criteria have passed successfully.
HSV color image to encrypt each channel. Demirtaş et al. The rest of the paper is organized as follows. Section 2
[10] proposed a RGB color encryption algorithm which provides a short background. In Sect. 3, the proposed
uses hyper-chaotic 2D map in its stages. It includes 2 main method is discussed. Sections 4 and 5 present the simula-
steps: scrambling and diffusion. Scrambling contains cross- tion and discussion on experimental results and, finally,
channel pixel scrambling and cross-channel bit scrambling. Sect. 6 provides conclusions.
Moreover, the initial values for chaotic map is generated
using a SHA-512 secret key. Zhang et al. [11] proposed a
color image encryption that utilized a 3D zigzag transforma-
tion and view plan. The proposed algorithm is inspired by 2 Background
the three-view drawing in engineering and is constructed
as a diffusion–permutation–diffusion structure. To generate In the following subsections, concepts of the Logistic map
the initial values, a SHA-256 secret key is proposed. Yousif and Chen system are discussed.
et al. [12] proposed an image encryption technique which is
13
Fig. 1 a Logistic map for 200 iterations, X0 = 0.1 and 𝜇 = 4, b chaotic behavior for different 𝜇 values
13
13
13
Step 1: Decrypting and arranging rows: Algorithm 3: First step of encryption process
7: % calculate number of shifts and shift ith column
(1) x0 ← X0 (1), y0 ← Y0 (1), z0 ← Z0 (1) from Algorithm 2. to bottom
(2) Chen system generates new values for X, Y and Z using 8: Shifts ← mod(floor(X × 108 ), M − 1) + 1
the initial values x0 , y0 and z0. 9: Circular shift img(∶, i) to bottom by Shifts
(3) Calculate the mean value of row as RowMean 10: % calculate the value for XOR and perform XOR
(4) Perform XOR operation ( between
( all row
) pixels
) and operation with all the column values
ToXOR = uint8(mod floor (Y + Z) × 108 , 255 + 1) ( ( ) )
11: ToXOR ← uint8(mod floor (X + Z) × 108 , 255 + 1)
in bit level. 12: XOR(img(∶, i), ToXOR)
(5) Make a circular row shift to left with step size 13: % calculate the average value of ith column
14: ColMean ← mean(img(∶, i))
Shifts = −mod(floor(Y × 108 ), N − 1) + 1
15: x0 ← X + ColMean − floor(X + ColMean)
(6) Generate new initial values for Chen system by 16: y0 ← Y + ColMean − floor(Y + ColMean)
17: z0 ← Z + ColMean − floor(Z + ColMean)
⎧ x = X + RowMean − floor(X + RowMean) 18: endfor
⎪ 0 19: Output img
⎨ y0 = Y + RowMean − floor(Y + RowMean)
⎪ z0 ← Z + RowMean − floor(Z + RowMean) 20: End
⎩
(7) Repeat steps 2–6 for all rows of image. Algorithm 4: Second step of encryption process
Step 2: Decrypting and arranging columns: Inputs: img = M × N from first encryption step, X0 , Y0 andZ0 as
initial values for Chen system
(1) x0 ← X0 (2), y0 ← Y0 (2), z0 ← Z0 (2) from Algorithm 2. 1: Start
(2) Chen system generates new values for X, Y and Z using 2: fori = 1 ∶ M
the initial values x0 , y0 andz0. 3: % Chen system
(3) Calculate the mean value of column as ColMean 4: X ← mod(a × (Y0 − X0 ), 1)
5:
(4) Perform XOR operation ( between
( all row
) pixels
) and
Y ← mod(X0 × (c − a) − (X0 × Z0 ) + (c × Y0 ), 1)
6: Z ← mod(X0 × Y0 ) − (b × Z0 ), 1)
ToXOR = uint8(mod floor (X + Z) × 108 , 255 + 1)
7: % calculate number of shifts and shift ith row to
in bit level.
right
(5) Make a circular column shift to top with step size
8: Shifts ← mod(floor(Y × 108 ), N − 1) + 1
Shifts = −mod(floor(X × 108 ), N − 1) + 1 9: Circular shift img(i, ∶) to right by Shifts
10: % calculate the value for XOR and perform XOR
(6) Generate new initial values for Chen system by operation with all the row values
( ( ) )
11: ToXOR ← uint8(mod floor (Y + Z) × 108 , 255 + 1)
⎧ x = X + ColMean − floor(X + ColMean) 12: XOR(img(i, ∶), ToXOR)
⎪ 0
⎨ y0 = Y + ColMean − floor(Y + ColMean) 13: % calculate the average value of ith row
⎪ z0 ← Z + ColMean − floor(Z + ColMean) 14: RowMean ← mean(img(i, ∶))
⎩
15: X0 ← X + RowMean − floor(X + RowMean)
(7) Repeat steps 2–6 for all columns of image. 16: Y0 ← Y + RowMean − floor(Y + RowMean)
17: Z0 ← Z + RowMean − floor(Z + RowMean)
18: endfor
19: Output Encrypted image
Algorithm 3: First step of encryption process 20: End
13
Fig. 7 a Original image of Lena, b the encrypted image of Lena, and
c the decrypted image
The key space defines the total number of the possible com-
binations of the strings that can be produced by a secret key.
To make the proposed encryption scheme more secure and
encryption algorithm. The applications of such algo-
safe, the secret key should be long enough. The proposed
rithms include a vast range of software, web sites,
algorithm benefits from a 512-bit secret key which can gen-
mobile applications and more. Since color images are
erate 2512 > 1.3 × 10154 different combinations of the secret
the most common images used in the popular and spe-
key. Therefore, the key space is large enough to resist com-
cialized applications, the simulations are applied to this
mon brute-force attacks [31].
group of images. The size of the images varies greatly
depending on the device that took them. Therefore, the
5.2 Encryption and decryption speed
color images with different sizes and aspect ratios have
been considered in this research. As depicted in Figs. 6
In most of the applications and in addition to the need for
and 12, images are selected for this study from different
high security in the encryption process, a lot of attention is
sources: Fruits, Yacht, Sun, Mars and Sunrise from [27],
paid to speed of the operations and the proposed algorithm
Airplane and Mandrill from [28], Lena, Frymire and
is not an exception. The initial values for the encryption
Peppers from [29], Girl1 and Girl2 from (009641 and
and decryption process are generated by Logistic map (see
035946, respectively, from [30]). All the experiments
Sect. 3.2). The average time to extract required param-
are executed on MATLAB 2022a via a laptop equipped
eters and generate initial values from Logistic maps is
with Intel Core i7-8550U 1.8 GHz processor, 8 GB of
0.00045087 s. Table 1 shows the encryption and decryp-
RAM and Windows 10 Enterprise. All the encryptions
tion time required by the algorithm for different images. It
are performed using the string “THIS IS A SECRET
is evident in Table 1 that the average speed for encryption/
KEY FOR IMAGE ENCRYPTION!” as a secret key and
decryption process is much more than requirements for
considering a = 35 and b = 3 as two fixed parameters for
real-time applications; 135.82 Mbps for one image and
Chen system.
245.37 Mbps for 1000 images with the same secret key.
The strength of the proposed algorithm from aspect of the
speed is to encrypt/decrypt large size images. As depicted
13
Fig. 8 a Airplane image, b histogram of airplane, and d histogram of the encrypted image (c)
in Table 1, the average speed of encrypting/decrypting more efficient. Figures 8 and 9 present samples of histo-
1000 images for large size images (last 6 images in the gram analysis of different images. The uniform distribution
table) is 266.92 Mbps which makes the algorithm more of the histogram for encrypted images is clearly visible in
efficient in encrypting/decrypting large batch sizes of the image (d) from Figs. 8 and 9. To verify the uniform dis-
images. tribution of histogram, Chi-squared test (𝜒 2 ) is performed
for all the original and encrypted images using Eq. (5). The
5.3 Statistical analysis obtained 𝜒 2 values are provided in Table 2. The critical value
of 𝜒 2 for an image with d = 255 as degree of freedom and
5.3.1 Histogram significant level 𝛼 = 0.05 is 𝜒0.05
2
(255) = 293.2478. Thus, if
a calculated 𝜒 value is less than 293.2478, then the histo-
2
Histogram of an image shows the frequency of intensity gram of the image is considered as a uniformly distributed
values of its pixels. Thus, more uniform distribution of the one. Apparently, the 𝜒 2 values for encrypted images (listed
intensity values indicates that an encryption algorithm is in Table 2) are smaller than mentioned criteria, while the 𝜒 2
Fig. 9 a Lena image, b histogram of Lena, and d histogram of the encrypted image (c)
13
Table 2 Chi-square test results where x and y are the intensity values (gray levels) of two
Image Plain image Encrypted image adjacent pixels in different channels (R, G and B) of an
image. Equation (6) calculates the covariance of x and y .
Average (R, G, B) Red Green Blue
Equations (7) and (8) are utilized to calculate variance and
Fruits 273,740.44 248.28 261.83 249.95 expectation of a given x . To perform this test, 2000 pairs of
Yacht 113,555.44 249.06 246.31 268.38 adjacent pixels are selected randomly and their correlations
Airplane 822,925.96 252.97 269.01 263.71 are calculated in three directions: horizontal, vertical and
Lena 237,534.11 256.04 239.98 258.52 diagonal. Table 3 presents the calculated correlation coef-
Mandrill 101,863.46 246.87 248.04 260.46 ficient values for both original and encrypted images. As
Peppers 340,999.44 257.14 257.31 258.62 shown in Table 3, the correlation between adjacent pixels of
Frymire 60,955,593.92 269.02 260.73 253.09 the original image is high (close to 1). In contrast, the cor-
Mars 49,727,039.03 256.78 251.20 253.14 relation between adjacent pixels of encrypted images is low
Girl1 3,606,709.74 247.98 259.09 234.16 (close to 0) which confirms the robustness of the proposed
Sun 235,077,664.04 247.95 254.52 287.09 algorithm against statistical attacks. Moreover, Figs. 10
Girl2 3,300,452.10 265.64 242.32 256.71 and 11 present correlation graphs of different images. First
Sunrise 35,557,049.93 248.00 269.97 255.35 rows of these figures demonstrate the original images and
their corresponding correlation graphs and, the second rows
present the encrypted images and their related correlation
values for original images are far greater than the criteria graphs. Each graph shows the correlations between pixels
(293.2478): of three channels of an image (R, G and B) in one of the
directions: horizontal, vertical and diagonal.
∑
255
(Ok − U)2
χ2 = (5)
k=0
U
5.4 Information entropy
where Ok is the obtained frequency and U = M×N
256
is expected
value for frequency to be uniformity distributed, while M Information entropy is a common metric to measure the
and N are the number of rows and columns of an image. randomness of information in a given image. To perform
this test, two types of entropies are considered: global
5.3.2 Correlation of adjacent pixels Shannon entropy and local Shannon entropy.
13
∑
k
GSE(Si ) 5.5 Sensitivity analysis
LSE(k,TB ) (S) = (11)
i=1
k
In this section, two different aspects of system sensitivities
where S = {S1 , S2 , … Sk } are blocks of pixels without are studied: key sensitivity and plain image sensitivity which
overlapping with size of TB and, GSE(Si ) represents the are described in the following subsections. To measure
13
the sensitivity of the proposed algorithm, two metrics are ( ) ∑ ∑ |img1 i,j − img2 i,j |
considered from the literature: NPCR (Number of Pixels U img1 , img2 = × 100 (13)
255 × M × N
Change Rate) and UACI (Unified Average Changing Inten- i j
sity) which are calculated based on Eqs. (12), (13) and (14).
{
These analyses are performed to measure the resistance of ( ) 0 if img1 i,j = img2 i,j
the proposed algorithm against differential and linear crypta- D img1 i,j , img2 i,j = (14)
1 if img1 i,j ≠ img2 i,j
nalysis [33]:
where M and N are the number of rows and columns, respec-
( ) ∑ ∑ D(img1 i,j , img2 i,j ) tively. As a reference, the expected values of NPCR and
N img1 , img2 = × 100 (12)
i j
M×N UACI for different test images are calculated according to
Eqs. (15), (16) and (17) [33]. The results are provided for
different significant levels of 𝛼 = 0.05, 0.01 and 0.001 for a
given M × N image in Table 6:
13
( √ )
5.5.1 Key sensitivity
F
N∗𝛼 (15)
−1
= F − Φ (𝛼) ∕(F + 1)
MN
This test is performed to evaluate the rate of changes in
an encrypted image when a slight change is made in the
√ ( )
( ) (F + 2) F 2 + 2F + 3 secret key. To perform this test, two different analyses are
F+2 𝛼
U∗− = − Φ−1 (16) considered: key sensitivity in encryption step and sensitiv-
18(F + 1)2 MNF
𝛼 3F + 3 2 ity of illegal key in decryption step.
Key sensitivity in encryption step
√ ( )
( ) (F + 2) F 2 + 2F + 3 To evaluate this test, following steps are performed:
F+2 𝛼
U∗+ = + Φ−1 (17)
18(F + 1)2 MNF
𝛼 3F + 3 2
(1) A random 512-bit key Key1 is generated.
where F = 255 is the largest value for gray level and Φ−1 is (2) One bit from Key1 is modified randomly and a new key
inverse cumulative density function of the standard normal Key2 is generated.
distribution. (3) The encryption process is applied on an image using
Key1 and Key2 to obtain two encrypted images E1 and
E2, respectively.
(4) NPCR and UACI are calculated between E1 and E2.
13
Table 6 The expected values of Image size NPCR (%) UACI (%)
NPCR and UACI for different
significant levels 𝜇N N∗0.05 N∗0.01 N∗0.001 U∗−
0.05 U∗−
0.01 U∗−
0.001
U∗+
0.05 U∗+
0.01 U∗+
0.001
Fig. 12 Key sensitivity analysis of Girl2. a Original image. b, c Encrypted images using Key1 and Key2, respectively, d differences between (b,
c)
13
(5) Steps 1 to 4 are repeated 100 times for all the images (4) One bit from Key2 is modified randomly and a new key
listed in Fig. 6. The average of the calculated met- Key3 is generated.
rics for different channels of images (R, G and B) is (5) The decryption process is applied on E1 using Key2
reported in Table 7. and Key3 to generate two decrypted images D1 and
D2, respectively.
(6) NPCR and UACI are calculated between D1 and D2.
The provided results show that the proposed algorithm (7) Steps 1 to 6 are repeated 100 times for all the images
has a notable sensitivity to a slight change in the secret listed in Fig. 6. The average of the calculated met-
key and confirm the security of the algorithm against the rics for different channels of images (R, G and B) is
common attacks. Figure 12 is a sample of the results for reported in Table 8. Figure 13 shows a sample of sen-
key sensitivity test, while it shows the original image (a), sitivity test for an illegal key in decryption step, while
encryption of original image using Key1 (b), encryption of (b) is image E1 encrypted by Key1, (c) is image D1
original image using Key2 (c) and the difference between decrypted by a random key; Key2, (d) is image D2
two encrypted images (d). decrypted by Key3 (with only one bit difference with
Sensitivity of illegal key in decryption step Key2) and (e) is the difference between D1 and D2. As
To apply this test, following steps are performed: visible in this figure and reported results in Table 8,
the proposed algorithm shows a notable sensitivity
(1) A random 512-bit key Key1 is generated. to a small change in secret key and a broad resistance
(2) The encryption process is applied on an image using against common differential attacks.
Key1 to generate an encrypted image E1.
(3) A random 512-bit key Key2 is generated.
Fig. 13 Sensitivity of illegal key in decryption step for Frymire image. a Original image. b encrypted images E1, c decrypted image D1, d
decrypted image D2, e differences between (c, d)
13
5.5.2 Plain image sensitivity are the average of three channels (R, G and B) of image.
Moreover, provided NPCRs and UACIs are the results from
Plain image sensitivity is another test to evaluate security key sensitivity analysis in the encryption process. As it is
of the proposed algorithm when a slight change is made in evident in Table 10, the proposed algorithm has provided
the original image. To perform this test, following steps are the best Encryption time and speed among all the provided
applied: algorithms. This feature is another green light to confirm
the capabilities of the proposed algorithm to apply to real-
(1) A random 512-bit key Key1 is generated. time applications. From aspect of the information entropy,
(2) One pixel from image Img1 is modified randomly and the proposed algorithm has shown a good performance by
a new image Img2 is generated. providing entropies > 7.9994 for Lena color images. Since
(3) The encryption process is applied on both images all the provided key spaces are much greater that 2100, all the
Img1 and Img2 using the same key Key1 to obtain two algorithms can be considered as secure against brute-force
encrypted images E1 and E2, respectively. attacks [31]. All the reported Chi-square values are below
(4) NPCR and UACI are calculated between E1 and E2. the critical value 293.2478. Based on required critical values
(5) Steps 1 to 4 are repeated 100 times for all the images and ranges for Local Shannon Entropy, NPCR and UACI,
listed in Fig. 6 and the average of the calculated met- some of the results from Refs [12, 35] are out of the range
rics for different channels of images (R, G and B) is (highlighted cells), while all the results for the proposed
reported in Table 9. algorithm are within the critical ranges. All the reported
metrics in Table 10 confirm the resistance of the proposed
The provided results in Table 9 assert the performance of algorithm against different types of statistical and differential
the proposed algorithm against common differential attacks. attacks. Without loss of generality, the proposed algorithm
has shown better performance in comparison with the other
algorithms in most of the listed aspects.
5.6 Comparison analysis
5.7 Discussion
In this section, a comparison between the proposed algo-
rithm and several different algorithms from the literature Based on the simulation results and comparative studies,
is provided. In this comparison, obtained results for color the proposed algorithm has shown an excellent performance
and gray formats of Lena image (512 × 512) are compared in comparison with recent studies from the literature. The
with different algorithms and reported in Table 10. To major improvements and their reasons are highlighted as
have a fair comparison, all the encryption times are scaled follows:
based on CPU clocks reported in their experiments and
relevant “CPU Single Thread Rating” from [34]. All the (1) High-speed encryption/decryption process that comes
other reported metrics (correlations, information entropy, from:
local Shannon entropy, NPCR and UACI) for color Lena
13
Key space
needs only 6 pseudo-random values for each image
> 10154
> 10150
> 10202
> 10154
> 10128
> 10213
> 10168
> 10165
> 2345
> 2281
10225
channel; 18 values for a color image (see Sect. 3.2)
• Efficient use of Chen system: Chen system is not uti-
lized to generate any chaotic sequence. For each col-
UACI (%)
33.4620
33.4415
33.4570
33.3359
33.4033
33.4669
33.0305
33.1300
33.4950
33.4608
umn/row of image, Chen system generates 3 values
–
(X, Y and Z) only once. These values are applied to
calculate Shifts and ToXOR (see Sects. 3.3 and 3.4).
NPCR (%)
7.902029
7.902398
7.902803
–
–
–
–
2 loops (steps) and total number of loop executions
Information Entropy
246.90
251.51
235.49
251.92
–
–
–
1.0182
0.0955
0.8632
0.0642
2.7413
0.1966
0.0320
1.9665
0.8469
0.0488
Encryption Scaled
1.7697
0.9347
0.2880
0.0320
2.0179
0.1950
1.2114
0.0630
0.0468
3.7681
3.2).
Algorithm
Proposed
Ref [36]
Ref [12]
Ref [35]
Ref [10]
Ref [37]
Ref [38]
Ref [39]
Ref [40]
Ref [41]
Ref [42]
6 Conclusion
Lena (color)
13
the proposed “fast” algorithms are not suitable for real-time 7. Duan, C.-F., Zhou, J., Gong, L.-H., Wu, J.-Y., Zhou, N.-R.: New
applications, while real-time encryption/decryption for large color image encryption scheme based on multi-parameter frac-
tional discrete Tchebyshev moments and nonlinear fractal permu-
size images is a need. To address these issues, a secure, effi- tation method. Opt. Lasers Eng. 150, 106881 (2022). https://doi.
cient and super-fast image encryption algorithm is proposed org/10.1016/j.optlaseng.2021.106881
in this study which is compatible with both real-time appli- 8. Alexan, W., ElBeltagy, M., Aboshousha, A.: RGB Image Encryp-
cations and the large size images. The proposed algorithm tion through Cellular Automata, S-Box and the Lorenz System.
Symmetry (2022). https://doi.org/10.3390/sym14030443
is chaos based and benefits from two chaotic maps: Logistic 9. Gao, X., Mou, J., Xiong, L., Sha, Y., Yan, H., Cao, Y.: A fast
map and Chen system. A SHA-512 secret key is utilized and efficient multiple images encryption based on single-channel
to make the algorithm more secure by increasing the key encryption and chaotic system. Nonlinear Dyn. 108(1), 613–636
space. Initial values and 𝜇 for Logistic maps are derived (2022). https://doi.org/10.1007/s11071-021-07192-7
10. Demirtaş, M.: A new RGB color image encryption scheme based
from secret key as well as parameter c for Chen system. on cross-channel pixel and bit scrambling using chaos. Optik 265,
Three Logistic maps generate initial values for 3 dimen- 169430 (2022). https://doi.org/10.1016/j.ijleo.2022.169430
sions of Chen system. The proposed algorithm runs once for 11. Zhang, X., Gong, Z.: Color image encryption algorithm based
each channel of image: one run for a gray image and three on 3D Zigzag transformation and view planes. Multimedia Tools
Appl. (2022). https://doi.org/10.1007/s11042-022-13003-x
runs for a color image. Each run includes two steps: (1) re- 12. Yousif, S.F., Abboud, A.J., Alhumaima, R.S.: A new image
arranging and encrypting image columns, (2) re-arranging encryption based on bit replacing, chaos and DNA coding tech-
and encrypting image rows. Circular shift and XOR operator niques. Multimedia Tools Appl. 81(19), 27453–27493 (2022).
are applied for permutation and encryption, respectively. For https://doi.org/10.1007/s11042-022-12762-x
13. Singh, N., Sinha, A.: Chaos-based secure communication sys-
each column/row, Chen system generates the number of shift tem using logistic map. Opt. Lasers Eng. 48(3), 398–404 (2010).
steps and one value for XOR (see Sects. 3.3 and 3.4). The https://doi.org/10.1016/j.optlaseng.2009.10.001
simulation results and comparative studies assert the supe- 14. Lloyd, A.L.: The coupled logistic map: a simple model for the
rior performance of the proposed algorithm in comparison effects of spatial heterogeneity on population dynamics. J. Theor.
Biol. 173(3), 217–230 (1995). https://doi.org/10.1006/jtbi.1995.
with the studied ones. The most significant advantages of 0058
the proposed algorithm are: high-speed encryption/decryp- 15. Rani, M., Agarwal, R.: A new experimental approach to study the
tion process, high level of security and resistance against stability of logistic map. Chaos, Solitons Fractals 41(4), 2062–
different common attacks and, much less required memory. 2066 (2009). https://doi.org/10.1016/j.chaos.2008.08.022
16. Suneel, M.: Electronic circuit realization of the logistic map. Sad-
hana 31(1), 69–78 (2006). https://doi.org/10.1007/BF02703801
17. Arroyo, D., Alvarez, G., Fernandez, V.: On the inadequacy of
Data availability Authors confirm that this manuscript has no associ- the logistic map for cryptographic applications. Preprint at arXiv:
ated data. 0805.4355 (2008).
18. Tarasova, V.V., Tarasov, V.E.: Logistic map with memory from
economic model. Chaos Solitons Fractals 95, 84–91 (2017).
https://doi.org/10.1016/j.chaos.2016.12.012
References 19. Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using cha-
otic logistic map. Image Vis. Comput. 24(9), 926–934 (2006).
1. Enayatifar, R., Guimarães, F.G., Siarry, P.: Index-based permuta- https://doi.org/10.1016/j.imavis.2006.02.021
tion-diffusion in multiple-image encryption using DNA sequence. 20. Chen, G., Ueta, T.: Yet another chaotic attractor. Int. J. Bifurc.
Opt. Lasers Eng. 115, 131–140 (2019). https://doi.org/10.1016/j. Chaos 9(07), 1465–1466 (1999). https://doi.org/10.1142/S0218
optlaseng.2018.11.017 127499001024
2. Li, Z., Peng, C., Tan, W., Li, L.: A novel chaos-based color image 21. Zhang, Z., Chen, G., Yu, S.: Hyperchaotic signal generation via
encryption scheme using bit-level permutation. Symmetry (2020). DSP for efficient perturbations to liquid mixing. Int. J. Circuit
https://doi.org/10.3390/sym12091497 Theory Appl. 37(1), 31–41 (2009). https://doi.org/10.1002/cta.
3. Wei, D., Jiang, M.: A fast image encryption algorithm based on 470
parallel compressive sensing and DNA sequence. Optik 238, 22. Kayalvizhi, S., Malarvizhi, S.: A novel encrypted compressive
166748 (2021). https://doi.org/10.1016/j.ijleo.2021.166748 sensing of images based on fractional order hyper chaotic Chen
4. Iqbal, N., Hanif, M., Abbas, S., Khan, M.A., Ul Rehman, Z.: system and DNA operations. Multimedia Tools Appl. 79(5),
Dynamic 3D scrambled image based RGB image encryption 3957–3974 (2020). https://doi.org/10.1007/s11042-019-7642-0
scheme using hyperchaotic system and DNA encoding. J. Inf. 23. Ren, H.-P., Bai, C., Huang, Z.-Z., Grebogi, C.: Secure communi-
Secur Appl 58, 102809 (2021). https://d oi.o rg/1 0.1 016/j.j isa.2 021. cation based on hyperchaotic Chen system with time-delay. Int.
102809 J. Bifurc. Chaos 27(05), 1750076 (2017). https://doi.org/10.1142/
5. Ul Haq, T., Shah, T.: 4D mixed chaotic system and its applica- S0218127417500766
tion to RGB image encryption using substitution-diffusion. J. Inf. 24. Effati, S., Saberi Nik, H., Jajarmi, A.: Hyperchaos control of
Secur. Appl. 61, 102931 (2021). https://doi.org/10.1016/j.jisa. the hyperchaotic Chen system by optimal control design. Non-
2021.102931 linear Dyn. 73(1), 499–508 (2013). https://doi.org/10.1007/
6. Elkandoz, M.T., Alexan, W.: Image encryption based on a s11071-013-0804-0
combination of multiple chaotic maps. Multimedia Tools 25. Park, J.H.: Adaptive synchronization of hyperchaotic Chen sys-
Appl. 81(18), 25497–25518 (2022). https://doi.org/10.1007/ tem with uncertain parameters. Chaos Solitons Fractals 26(3),
s11042-022-12595-8 959–964 (2005). https://doi.org/10.1016/j.chaos.2005.02.002
13
26. Yan, Z.: Controlling hyperchaos in the new hyperchaotic Chen Springer Nature or its licensor (e.g. a society or other partner) holds
system. Appl. Math. Comput. 168(2), 1239–1250 (2005). https:// exclusive rights to this article under a publishing agreement with the
doi.org/10.1016/j.amc.2004.10.016 author(s) or other rightsholder(s); author self-archiving of the accepted
27. Hlevkin: https://www.hlevkin.com/hlevkin/06testimages.htm manuscript version of this article is solely governed by the terms of
28. SIPI: https://sipi.usc.edu/database/database.php?volume=misc such publishing agreement and applicable law.
29. University of Waterloo: https://l inks.u water loo.c a/R
eposi tory.h tml
30. CelebA dataset: http://mmlab.ie.cuhk.edu.hk/projects/CelebA.
html Babak Rezaei received the B.S.
31. Alvarez, G., Li, S.: Some basic cryptographic requirements for degree in Computer Engineer-
chaos-based cryptosystems. Int. J. Bifurc. Chaos 16(08), 2129– ing-Hardware from Shiraz uni-
2151 (2006). https://doi.org/10.1142/S0218127406015970 versity, Iran, in 2002 and, the
32. Wu, Y., Zhou, Y., Saveriades, G., Agaian, S., Noonan, J.P., Nata- M.S. degree in Software engi-
rajan, P.: Local Shannon entropy measure with statistical tests for neering from Islamic Azad Uni-
image randomness. Inf. Sci. 222, 323–342 (2013). https://doi.org/ versity, Firoozkooh Branch, Iran,
10.1016/j.ins.2012.07.049 in 2017. He is currently pursuing
33. Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness PhD degree with Electrical Engi-
tests for image encryption. Cyber J. 1(2), 31–38 (2011) neering Dept. in Universidade
34. CPU Benchmark: https://w ww.c puben chmar k.n et/s ingle Compa re. Federal de Minas Gerais
php (UFMG), Belo Horizonte, Bra-
35. Boriga, R.E., Dăscălescu, A.C., Diaconu, A.V.: A new fast image zil. His research interests include
encryption scheme based on 2D chaotic maps. IAENG Int. J. Image Encryption, Evolutionary
Comput. Sci. 41(4), 249–258 (2014) Algorithms, Machine Learning
36. Zhang, X., Ye, R.: A novel RGB image encryption algorithm based and Operational Research.
on DNA sequences and chaos. Multimedia Tools Appl. 80(6),
8809–8833 (2021). https://doi.org/10.1007/s11042-020-09465-6 Mahvash Mobasseri received the
37. Teng, L., Wang, X., Yang, F., Xian, Y.: Color image encryption B.S. degree in English transla-
based on cross 2D hyperchaotic map using combined cycle shift tion studies from Zand Univer-
scrambling and selecting diffusion. Nonlinear Dyn. 105(2), 1859– sity, Shiraz, Iran, in 2019 and,
1876 (2021). https://doi.org/10.1007/s11071-021-06663-1 the M.A. degree in English
38. Hanif, M., Abbas, S., Khan, M.A., Iqbal, N., Rehman, Z.U., Translation Studies from Khatam
Saeed, M.A., Mohamed, E.M.: A novel and efficient multiple University, Tehran, Iran, in 2021.
RGB images cipher based on chaotic system and circular shift She is currently pursuing M.A.
operations. IEEE Access 8, 146408–146427 (2020). https://doi. degree with Applied IT Dept.
org/10.1109/ACCESS.2020.3015085 and pedagogy in University of
39. Ge, B., Chen, X., Chen, G., Shen, Z.: Secure and fast image Gothenburg, Sweden. Her
encryption algorithm using hyper-chaos-based key generator and research interests include Auto-
vector operation. IEEE Access 9, 137635–137654 (2021). https:// matic Translators, Machine
doi.org/10.1109/ACCESS.2021.3118377 Learning and Deep Learning.
40. Kang, S.W., Choi, U.S., Cho, S.J.: Fast image encryption
algorithm based on (n, m, k)-PCMLCA. Multimedia Tools
Appl. 81(1), 1209–1235 (2022). https:// d oi. o rg/ 1 0. 1 007/ Rasul Enayatifar received the
s11042-021-11424-8 post-doctoral and Ph.D from
41. Valandar, M.Y., Barani, M.J., Ayubi, P.: A fast color image UFMG (Brazil) and UTM
encryption technique based on three dimensional chaotic map. (Malaysia), respectively. He is
Optik 193, 162921 (2019). https://doi.org/10.1016/j.ijleo.2019. currently Assistant Prof. and
06.021 PhD supervisor with Computer
42. Heucheun Yepdia, L.M., Tiedeu, A., Kom, G.: A robust and fast Engineering Dept., Islamic Azad
image encryption scheme based on a mixing technique. Secur. University, Firoozkooh Branch,
Commun. Networks 2021, 6615708 (2021). https://doi.org/10. Iran. His research interests
1155/2021/6615708 include Image Encryption, Oper-
ational Research, Machine
Publisher's Note Springer Nature remains neutral with regard to Learning and Deep Neural
jurisdictional claims in published maps and institutional affiliations. Networks.
13
1. use such content for the purpose of providing other users with access on a regular or large scale basis or as a means to circumvent access
control;
2. use such content where to do so would be considered a criminal or statutory offence in any jurisdiction, or gives rise to civil liability, or is
otherwise unlawful;
3. falsely or misleadingly imply or suggest endorsement, approval , sponsorship, or association unless explicitly agreed to by Springer Nature in
writing;
4. use bots or other automated methods to access the content or redirect messages
5. override any security feature or exclusionary protocol; or
6. share the content in order to create substitute for Springer Nature products or services or a systematic database of Springer Nature journal
content.
In line with the restriction against commercial use, Springer Nature does not permit the creation of a product or service that creates revenue,
royalties, rent or income from our content or its inclusion as part of a paid for service or for other commercial gain. Springer Nature journal
content cannot be used for inter-library loans and librarians may not upload Springer Nature journal content on a large scale into their, or any
other, institutional repository.
These terms of use are reviewed regularly and may be amended at any time. Springer Nature is not obligated to publish any information or
content on this website and may remove it or features or functionality at our sole discretion, at any time with or without notice. Springer Nature
may revoke this licence to you at any time and remove access to any copies of the Springer Nature journal content which have been saved.
To the fullest extent permitted by law, Springer Nature makes no warranties, representations or guarantees to Users, either express or implied
with respect to the Springer nature journal content and all parties disclaim and waive any implied warranties or warranties imposed by law,
including merchantability or fitness for any particular purpose.
Please note that these rights do not automatically extend to content, data or other material published by Springer Nature that may be licensed
from third parties.
If you would like to use or distribute our Springer Nature journal content to a wider audience or on a regular basis or in any other manner not
expressly permitted by these Terms, please contact Springer Nature at
onlineservice@springernature.com