Chaotic image encryption system using phase-magnitude transformation and pixel substitution | Telecommunication Systems Skip to main content
Log in

Chaotic image encryption system using phase-magnitude transformation and pixel substitution

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

We proposed an algorithm to encrypt an image in hybrid domain, frequency and time domains. The proposed method is a private key encryption system with two main units, chaotic phase-magnitude transformation unit and chaotic pixel substitution unit. Chaotic phase-magnitude transformation unit works in frequency domain and a 2-D DFT is performed on the plain image to change the domain. A chaotic function, the tent map, is used to generate the pseudo random image, which are combined with the plain image in frequency domain. Chaotic pixel substitution unit works in time domain Bernoulli map is applied to produce another pseudo random image that is mixing with the encrypted image nonlinearly. The performance of the proposed chaotic image encryption system is analysed using a computer simulation. The distribution of histogram of encrypted image is uniform. Chi-square value for encrypted image of our proposed method is considerably low. The MSE of the proposed encrypted image is big enough. The correlation coefficients of the proposed encrypted image in all three directions are sufficiently small. The total key length is large enough to resist the proposed system against any brute-force attack. The proposed scheme is robust against chosen plaintext attacks too. The proposed chaotic image encryption system, which is used frequency and time domain together, is more secure than most of single domain image encryption systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Yang, M., Bourbakis, N., & Shujun, L. (2004). Data-image-video encryption. IEEE Potentials, 23, 28–34.

    Article  Google Scholar 

  2. Fridrich, J. (1997). Image encryption based on chaotic maps. In Systems, man, and cybernetics, 1997 IEEE international conference on computational cybernetics and simulation (Vol. 2, pp. 1105–1110).

    Chapter  Google Scholar 

  3. Chen, G. R. (2004). A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals, 21, 749–761.

    Article  Google Scholar 

  4. Guan, Z. H., Huang, F. J., & Guan, W. J. (2005). Chaos-based image encryption algorithm. Physics Letters A, 346, 153–157.

    Article  Google Scholar 

  5. Lian, S. G., Sun, J. S., & Wang, Z. Q. (2005). A block cipher based on a suitable use of the chaotic standard map. Chaos, Solitons and Fractals, 26, 117–129.

    Article  Google Scholar 

  6. Mao, Y. B., Chen, G. R., & Lian, S. G. (2004). A novel fast image encryption scheme based on 3D chaotic baker maps. International Journal of Bifurcation and Chaos, 14, 3613–3624.

    Article  Google Scholar 

  7. Zhang, L., Liao, X., & Wang, X. (2005). An image encryption approach based on chaotic maps. Chaos, Solitons and Fractals, 24, 759–765.

    Article  Google Scholar 

  8. Gao, H., Zhang, Y., Liang, S., & Li, D. (2006). A new chaotic algorithm for image encryption. Chaos, Solitons and Fractals, 29, 393–399.

    Article  Google Scholar 

  9. Pareek, N. K. (2006). Image encryption using chaotic logistic map. Image and Vision Computing, 24, 926–934.

    Article  Google Scholar 

  10. Borujeni, S. E., & Eshghi, M. (2009). Chaotic image encryption design using Tompkins-Paige algorithm. Journal of Mathematical Problems in Engineering, 2009, Modeling experimental nonlinear dynamics and chaotic scenarios, p. 22. doi:10.1155/2009/762652.

  11. Singh, N., & Sinha, A. (2008). Optical image encryption using fractional Fourier transform and chaos. Optics and Lasers in Engineering, 46, 117–123.

    Article  Google Scholar 

  12. Borujeni, S. E. (2000). Speech encryption based on fast Fourier transform permutation. In The 7th IEEE international conference on electronics, circuits and systems, 2000. ICECS 2000 (Vol. 1, pp. 290–293).

    Google Scholar 

  13. Kuo, C. J. (1993). Novel image encryption technique and its application in progressive transmission. Journal of Electronic Imaging, 2, 345–351.

    Article  Google Scholar 

  14. Mitra, Y. V., Rao, S., & Prasanna, S. R. M. (2006). A new image encryption approach using combinational permutation techniques. International Journal of Computer Science, 1, 127–131.

    Google Scholar 

  15. Prasanna, S. R. M., Rao, Y. V. S., & Mitra, A. (2006). An image encryption method with magnitude and phase manipulation using carrier images. International Journal of Computer Science, 1, 132–137.

    Google Scholar 

  16. Wang, X., Zhao, D., & Chen, L. (2006). Image encryption based on extended fractional Fourier transform and digital holography technique. Optics Communications, 260, 449–453.

    Article  Google Scholar 

  17. Acharya, T., & Ray, A. K. (2005). Digital image processing algorithms and applications. New York: Wiley.

    Google Scholar 

  18. Gonzalez, A., Woods, A., & Eddins, A. (2004). Digital image processing using MATLAB (1st edn.). Knoxville: Gatesmark.

    Google Scholar 

  19. Alligood, K. T., Sauer, T., & Yorke, J. A. (1996). CHAOS: an introduction to dynamical systems. Berlin: Springer.

    Google Scholar 

  20. Cristea, B., Cehan, C., Serbanescu, A., & Grecu, D. (2002). Applications of chaos theory in cryptography. In International conference METRA2002, Bucharest, Romania.

    Google Scholar 

  21. Rincu, C. I., Iana, V. G., Serban, G., & Tutanescu, I. (2007). Hardware implementation of a tent map-based chaotic generator. In ELECO’2007 5’th international conference on electrical and electronics engineering, Bursa, Turkey.

    Google Scholar 

  22. Schuster, H. G., & Just, W. (2005). Deterministic chaos: an introduction (4th edn.). Weinheim: Wiley-VCH.

    Book  Google Scholar 

  23. Asim, M., & Jeoti, V. (2007). On image encryption: comparison between AES and a novel chaotic encryption scheme. In International conference on signal processing, communications and networking, 2007. ICSCN ’07 (pp. 65–69).

    Chapter  Google Scholar 

  24. Rijndael (2001). Announcing the ADVANCED ENCRYPTION STANDARD (AES), Federal Information Processing Standards Publication 197.

  25. Kwok, H. S., & Tang, W. K. S. (2007). A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons and Fractals, 32, 1518–1529.

    Article  Google Scholar 

  26. Alvarez, G., & Li, S. J. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos, 16, 2129–2151.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shahram Etemadi Borujeni.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Etemadi Borujeni, S., Eshghi, M. Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommun Syst 52, 525–537 (2013). https://doi.org/10.1007/s11235-011-9458-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-011-9458-8

Keywords