Abstract
Content protection is considered as an important issue in today’s world. Therefore, encryption of such contents is a challenging task for researchers. They are focusing on protection of valuable data such as image, video, and audio against different attacks from eavesdroppers. In this paper, we proposed an enhanced version of Fawad et al.’s scheme to fulfill essential needs of a secure image encryption algorithm. The proposed cryptosystem is resistant against many attacks like brute force, differential and statistical. To quantify the quality of the proposed scheme, instead of visual inspection, the proposed scheme is analyzed through various tests, such as correlation coefficient, information entropy, Number of Pixel Change Rate (NPCR) and Unified Average Change Intensity (UACI). Simulation results of the presented scheme shows good diffusion characteristics when compared to other traditional schemes.
This is a preview of subscription content,log in via an institution to check access.
Access this article
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
Price includes VAT (Japan)
Instant access to the full article PDF.








Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
Jakimoski G, Subbalakshmi K (2008) Cryptanalysis of some multimedia encryption schemes. IEEE Trans Multimed 10(3):330–338
Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf Sci 273:329–351
Elashry IE (2010) Digital image encryption. MS thesis, Department of computer science and engineering, Faculty of electronic engineering, Menofia University
Ahmed J, Hwang SO A fast encryption/decryption scheme for biometric images using multiple chaotic maps. In: IMTIC’15–international multi-topic conference. p 104
Zhang YQ, Wang XY (2014) Spatiotemporal chaos in mixed linear–nonlinear coupled logistic map lattice. Physica A: Statistical Mechanics and Its Applications 402:104–118
Zeng W, Yu H, Lin C (2006) Multimedia security technologies for digital rights management. Academic Press
Zhang YQ, Wang XY (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn 77(3):687–698
Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62(3):615–621
Zhang YQ, Wang XY (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10–20
Zhang YQ, Wang XY, Liu J, Chi ZL (2016) An image encryption scheme based on the mlncml system using dna sequences. Opt Lasers Eng 82:95–103
Schneier B (1996) Applied Cryptography. Wiley, USA
Ahmad J (2010) Efficiency analysis and security evaluation of image encryption schemes. computing 23:25
Rehman AU, Khan JS, Ahmad J, Hwang SO (2016) A new image encryption scheme based on dynamic s-boxes and chaotic maps. 3D Research 7(1):1–8
Chen Y, Chang L (2001) A secure and robust digital watermarking technique by the block cipher rc6 and secure hash algorithm. In: Proceedings of the 2001 international conference on image processing, 2001. IEEE, vol 2, pp 518–521
Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Computers & Mathematics with Applications 59(10):3320–3327
Liu H, Wang X, et al. (2012) Image encryption using dna complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466
Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16):3895–3903
Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18
Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108
Wang XY, Yu Q (2009) A block encryption algorithm based on dynamic sequences of multiple chaotic systems. Commun Nonlinear Sci Numer Simul 14(2):574–581
Wang X, Luan D (2013) A novel image encryption algorithm using chaos and reversible cellular automata. Commun Nonlinear Sci Numer Simul 18(11):3075–3085
Wang XY, Chen F, Wang T (2010) A new compound mode of confusion and diffusion for block encryption of image based on chaos. Commun Nonlinear Sci Numer Simul 15(9):2479–2485
Spanos G, Maples T (1995) Performance study of a selective encryption scheme for the security of networked, real-time video. In: icccn, p. 0002, Published by the IEEE computer society.
Shannon C (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715
Lookabaugh T, Sicker D (2004) Selective encryption for consumer applications. IEEE Commun Mag 42 (5):124–129
Ahmad J, Hwang SO, Ali A (2015) An experimental comparison of chaotic and non-chaotic image encryption schemes. Wirel Pers Commun 84(2):901–918
Ahmad J, Hwang SO (2015) Chaos-based diffusion for highly autocorrelated data in encryption algorithms. Nonlinear Dyn 82(4):1839–1850
Ahmad J, Hwang SO (2015) A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools and Applications:1–26
Khan J, Ahmad J, Hwang SO (2015) An efficient image encryption scheme based on: Henon map, skew tent map and s-box 2015 6th international conference on modeling, simulation, and applied optimization (ICMSAO). IEEE, pp 1–6
Bin Younas M, Ahmad J (2014) Comparative analysis of chaotic and non-chaotic image encryption schemes 2014 international conference on emerging technologies (ICET). IEEE, pp 81–86
Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput & Applic 26 (5):1137–1148
Elashry I, Allah O, Abbas A, El-Rabaie S, El-Samie F (2009) Homomorphic image encryption. J Electron Imaging 18:033002
Hussain I, Shah T, Gondal MA (2012) Image encryption algorithm based on pgl (2, gf (28)) s-boxes and td-ercs chaotic sequence. Nonlinear Dyn 70(1):181–187
Elkamchouchi H, Makar M (2005) Measuring encryption quality for bitmap images encrypted with rijndael and kamkar block ciphers NRSC 2005 Proceedings of the 22nd national radio science conference, 2005. IEEE, pp 277–284
Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn 67(1):557–566
Wang X, Teng L (2012) An image blocks encryption algorithm based on spatiotemporal chaos. Nonlinear Dyn 67(1):365–371
Gray R (2010) Entropy and information theory, Springer Verlag
Ahmed H, Kalash H, Allah O (2017) Implementation of RC5 block cipher algorithm for image cryptosystems. Int J Inf Technol 3(4):245–250
Ahmed F, Siyal M, Abbas V (2010) A perceptually scalable and jpeg compression tolerant image encryption scheme 2010 4th pacific-rim symposium on image and video technology (PSIVT). IEEE, pp 232–238
Ahmed F, Anees A, Abbas VU, Siyal MY (2014) A noisy channel tolerant image encryption scheme. Wirel Pers Commun 77(4):2771–2791
Anees A, Siddiqui AM, Ahmed F (2014) Chaotic substitution for highly autocorrelated data in encryption algorithm. Commun Nonlinear Sci Numer Simul 19(9):3106–3118
Ahmad J, Khan MA, Hwang SO, Khan JS (2016) A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices. Neural Comput & Applic:1–15
Khan JS, ur Rehman A, Ahmad J, Habib Z (2015) A new chaos-based secure image encryption scheme using multiple substitution boxes 2015 conference on information assurance and cyber security (CIACS). IEEE, pp 16–21
Jolfaei A, Mirghadri A (2010) Survey: image encryption using salsa20. Int J Comput Sci Issues 7(5)
Khan MA, Ahmad J, Javaid Q, Saqib NA (2016) An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box. J Mod Opt:1–10
Khan JS, Ahmad J, Khan MA (2017) Td-ercs map-based confusion and diffusion of autocorrelated data. Nonlinear Dyn 87(1):93–107
Mohamed A, Zaibi G, Kachouri A (2011) Implementation of rc5 and rc6 block ciphers on digital images 2011 8th international multi-conference on systems, signals and devices (SSD). IEEE, pp 1–6
Liehuang Z, Wenzhuo L, Lejian L, Hong L (2006) A novel image scrambling algorithm for digital watermarking based on chaotic sequences. Int J Comput Sci Netw Secur 6(8B):125– 130
Wang X, Wang Q (2014) A novel image encryption algorithm based on dynamic s-boxes constructed by chaos. Nonlinear Dyn 75(3):567–576
Ye G, Wong KW (2012) An efficient chaotic image encryption algorithm based on a generalized arnold map. Nonlinear dyn 69(4):2079–2087
Mao Y, Chen G (2005) Chaos-based image encryption. Handbook of Geometric Computing:231–265
Author information
Authors and Affiliations
Department of Electrical Engineering, HITEC University Taxila, Taxila, Pakistan
Jawad Ahmad & Fawad Ahmed
Department of Computer Engineering, National University of Sciences, Technology, Islamabad, Pakistan
Muazzam Ali Khan
Department of Electrical Engineering, University of Gaziantep, Gaziantep, Turkey
Jan Sher Khan
- Jawad Ahmad
You can also search for this author inPubMed Google Scholar
- Muazzam Ali Khan
You can also search for this author inPubMed Google Scholar
- Fawad Ahmed
You can also search for this author inPubMed Google Scholar
- Jan Sher Khan
You can also search for this author inPubMed Google Scholar
Corresponding author
Correspondence toJawad Ahmad.
Ethics declarations
Conflict of interests
The authors declare that they have no conflict of interest.
Rights and permissions
About this article
Cite this article
Ahmad, J., Khan, M.A., Ahmed, F.et al. A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation.Neural Comput & Applic30, 3847–3857 (2018). https://doi.org/10.1007/s00521-017-2970-3
Received:
Accepted:
Published:
Issue Date:
Share this article
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative