Skip Navigation Links
Journal of Vibration Testing and System Dynamics

C. Steve Suh (editor), Pawel Olejnik (editor),

Xianguo Tuo (editor)

Pawel Olejnik (editor)

Lodz University of Technology, Poland


C. Steve Suh (editor)

Texas A&M University, USA


Xiangguo Tuo (editor)

Sichuan University of Science and Engineering, China


Dual Authentication on a Secure Communication Channel to ImageTransmission

Journal of Vibration Testing and System Dynamics 8(3) (2024) 273--284 | DOI:10.5890/JVTSD.2024.09.001

Lucas G. Nardo$^{1}$, Erivelton Nepomuceno$^{2}$, Janier Arias-Garcia$^{1}$, Thomas M. Chen$^{3}$, Denis N. Butusov$^{4}$

$^{1}$ Graduate Program in Electrical Engineering, Department of Electronic Engineering, Federal University of Minas Gerais, Belo Horizonte, MG, 31270-901, Brazil

$^{2}$ Centre for Ocean Energy Research, Department of Electronic Engineering, Maynooth University, Maynooth, Co. Kildare, W23 F2H6, Ireland

$^{3}$ Department of Engineering, City, University of London, London EC1V 0HB, United Kingdom

$^{4}$ Youth Research Institute, Saint Petersburg Electrotechnical University ``LETI'', 5, Professora Popova St., Saint Petersburg 197376, Russia

Download Full Text PDF



Chaotic systems have been widely adopted for image encryption as means of securely transmitting confidential information. However, literature suggests that some encryption algorithms and transmission channels may be vulnerable, which raises concerns about the efficacy of using chaotic systems for image encryption. To address these concerns, this paper proposes an approach based on dual authentication to enhance information security and mitigate image attacks. The proposed method involves encrypting the image using a secure cipher and mixing the resulting encrypted image with a chaotic signal generated by two synchronized Rössler systems before transmitting it over a channel. The original image can be recovered by reversing the encryption and transmission process. The method was successfully tested using the Mean Structural Similarity Index (MSSIM), and a second security layer showed an increase in entropy, which is a strong indicator of good random properties. The proposed scheme has been proven to be secure in encrypting and transmitting benchmark images.


  1. [1]  Terzi, D.S., Terzi, R., and Sagiroglu, S. (2015), A survey on security and privacy issues in big data, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), 202–207.
  2. [2]  Swire, P. and Ahmad, K. (2011), Encryption and globalization, Columbia Science and Technology Law Review, 23, 416–481.
  3. [3]  Kwok, H.S. and Tang, W.K.S. (2007), A fast image encryption system based on chaotic maps with finite precision representation, Chaos, Solitons and Fractals, 32(4), 1518–1529.
  4. [4]  Çavuşoğlu, Ü., Kaçar, S., Pehlivan, I., and Zengin, A. (2017), Secure image encryption algorithm design using a novel chaos based S-Box, Chaos, Solitons and Fractals, 95, 92–101.
  5. [5]  Nardo, L.G., Nepomuceno, E.G., Arias-Garcia, J., and Butusov, D.N. (2019), Image encryption using finite-precision error, Chaos, Solitons and Fractals, 123, 69–78.
  6. [6]  Nepomuceno, E.G., Nardo, L.G., Arias-Garcia, J., Butusov, D.N., and Tutueva, A. (2019), Image encryption based on the pseudo-orbits from 1D chaotic map, Chaos: An Interdisciplinary Journal of Nonlinear Science, 29(6), 061101.
  7. [7]  Chen, L., Ma, B., Zhao, X., and Wang, S. (2017), Differential cryptanalysis of a novel image encryption algorithm based on chaos and Line map, Nonlinear Dynamics, 87(3), 1797–1807.
  8. [8]  Ge, X., Lu, B., Liu, F., and Luo, X. (2017), Cryptanalyzing an image encryption algorithm with compound chaotic stream cipher based on perturbation, Nonlinear Dynamics, 90(2), 1141–1150.
  9. [9]  Li, C., Lin, D., Feng, B., Lu, J., and Hao, F. (2018), Cryptanalysis of a chaotic image encryption algorithm based on information entropy, IEEE Access, 6, 75834–75842.
  10. [10]  Frey, D.R. (1993), Chaotic digital encoding: an approach to secure communication, IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, 40(10), 660–666.
  11. [11]  Cuomo, K.M., Oppenheim, A.V., and Strogatz, S.H. (1993), Synchronization of Lorenz-based chaotic circuits with applications to communications, IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, 40(10), 626–633.
  12. [12]  Tôrres, L.A.B. and Aguirre, L.A. (2004), Transmitting information by controlling nonlinear oscillators, Physica D: Nonlinear Phenomena, 196(3–4), 387–406.
  13. [13]  Chien, T. and Liao, T. (2005), Design of secure digital communication systems using chaotic modulation, cryptography and chaotic synchronization, Chaos, Solitons and Fractals, 24(1), 241–255.
  14. [14]  Alvarez, G. and Li, S. (2006), Some basic cryptographic requirements for chaos-based cryptosystems, International Journal of Bifurcation and Chaos, 16(08), 2129–2151.
  15. [15]  Pecora, L.M. and Carroll, T.L. (1990), Synchronization in chaotic systems, Physical Review Letters, 64(8), 821–824.
  16. [16]  Pecora, L.M. and Carroll, T.L. (1991), Driving systems with chaotic signals, Physical Review A, 44(4), 2374–2383.
  17. [17]  Pecora, L.M., Carroll, T.L., Johnson, G.A., Mar, D.J., and Heagy, J.F. (1997), Fundamentals of synchronization in chaotic systems, concepts, and applications, Chaos: An Interdisciplinary Journal of Nonlinear Science, 7(4), 520–543.
  18. [18]  Ye, G. (2010), Image scrambling encryption algorithm of pixel bit based on chaos map, Pattern Recognition Letters, 31(5), 347–354.
  19. [19]  Guan, Z.-H., Huang, F., and Guan, W. (2005), Chaos-based image encryption algorithm, Physics Letters A, 346(1–3), 153–157.
  20. [20]  Gao, T. and Chen, Z. (2008), A new image encryption algorithm based on hyper-chaos, Physics Letters A, 372(4), 394–400.
  21. [21]  Rhouma, R. and Belghith, S. (2008), Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Physics Letters A, 372(38), 5973–5978.
  22. [22]  Çokal, C. and Solak, E. (2009), Cryptanalysis of a chaos-based image encryption algorithm, Physics Letters A, 373(15), 1357–1360.
  23. [23]  Wang, B., Wei, X., and Zhang, Q. (2013), Cryptanalysis of an image cryptosystem based on logistic map, Optik, 124(14), 1773–1776.
  24. [24]  Özkaynak, F. (2018), Brief review on application of nonlinear dynamics in image encryption, Nonlinear Dynamics, 92(2), 305–313.
  25. [25]  Li, S., Alvarez, G., Li, Z., and Halang, W.A. (2007), Analog chaos-based secure communications and cryptanalysis: A brief survey, 1-6.
  26. [26]  Merah, L., Ali-Pacha, A., and Hadj-Said, N. (2015), Real-time cryptosystem based on synchronized chaotic systems, Nonlinear Dynamics, 82(1–2), 877–890.
  27. [27]  Guillén-Fernández, O., Meléndez-Cano, A., Tlelo-Cuautle, E., Núñez-Pérez, J.C., and Rangel-Magdaleno, J.J. (2019), On the synchronization techniques of chaotic oscillators and their FPGA-based implementation for secure image transmission, Plos One, 14(2), 0209618.
  28. [28]  Yang, C.-H., Wu, H.-C., and Su, S.-F. (2019), Implementation of encryption algorithm and wireless image transmission system on FPGA, IEEE Access, 7, 50513–50523.
  29. [29]  Xie, Y., Li, J., Kong, Z., Zhang, Y., Liao, X., and Liu, Y. (2016), Exploiting optics chaos for image encryption-then-transmission, Journal of Lightwave Technology, 34(22), 5101–5109.
  30. [30]  Bouridah, M.S., Bouden, T., and Boulkroune, A. (2017), Image secure transmission using chaotic synchronization, 2017 5th International Conference on Electrical Engineering - Boumerdes (ICEE-B), 1–6.
  31. [31]  Andrievsky, B. (2002), Adaptive synchronization methods for signal transmission on chaotic carriers, Mathematics and Computers in Simulation, 58(4–6), 285–293.
  32. [32]  Feki, M. (2003), An adaptive chaos synchronization scheme applied to secure communication, Chaos, Solitons and Fractals, 18(1), 141–148.
  33. [33]  Kaddoum, G. (2016), Wireless chaos-based communication systems: A comprehensive survey, IEEE Access, 4, 2621–2648.
  34. [34]  Rössler, O.E. (1976), An equation for continuous chaos, Physics Letters A, 57(5), 397–398.
  35. [35]  Khalil, H.K. (2002), Nonlinear systems, Prentice Hall: New Jersey.
  36. [36]  Chen, H. (2005), Global chaos synchronization of new chaotic systems via nonlinear control, Chaos, Solitons and Fractals, 23(4), 1245–1251.
  37. [37]  Park, J.H. (2005), Chaos synchronization of a chaotic system via nonlinear control, Chaos, Solitons and Fractals, 25(3), 579–584.
  38. [38]  Abdullah, H.N. and Abdullah, H.A. (2017), Two-level secure colored image transmission using novel chaotic map, 2017 Second Al-Sadiq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA), 295–300.
  39. [39]  Nardo, L.G., Nepomuceno, E.G., Bastos, G.T., Santos, T.A., Butusov, D.N., and Arias-Garcia, J. (2021), A reliable chaos-based cryptography using Galois field, Chaos: An Interdisciplinary Journal of Nonlinear Science, 31(9), 091101.
  40. [40]  Goldberg, D. (1991), What every computer scientist should know about floating-point arithmetic, ACM Computing Surveys, 23(1), 5–48.
  41. [41]  Lozi, R. (2013), Can we trust in numerical computations of chaotic solutions of dynamical systems?, Topology and Dynamics of Chaos: In Celebration of Robert Gilmore’s 70th Birthday, 63–98.
  42. [42]  Nepomuceno, E.G. and Mendes, E.M.A.M. (2017), On the analysis of pseudo-orbits of continuous chaotic nonlinear systems simulated using discretization schemes in a digital computer, Chaos, Solitons and Fractals, 95, 21–32.
  43. [43]  Nepomuceno, E.G., Martins, S.A.M., Silva, B.C., Amaral, G.F.V., and Perc, M. (2018), Detecting unreliable computer simulations of recursive functions with interval extensions, Applied Mathematics and Computation, 329, 408–419.
  44. [44]  Qin, S. and Liao, S. (2018), Influence of round-off errors on the reliability of numerical simulations of chaotic dynamic systems, Journal of Applied Nonlinear Dynamics, 7(2), 197–204.
  45. [45]  Institute of Electrical and Electronics Engineers (IEEE) 754-2019 (2019), IEEE standard for floating-point arithmetic, 1-84.
  46. [46]  Shannon, C.E. (1949), Communication theory of secrecy systems, Bell System Technical Journal, 28(4), 656–715.
  47. [47]  Luo, Y., Du, M., and Liu, J. (2015), A symmetrical image encryption scheme in wavelet and time domain, Communications in Nonlinear Science and Numerical Simulation, 20(2), 447–460.
  48. [48]  Wang, Z., Bovik, A.C., Sheikh, H.R., and Simoncelli, E.P. (2004), Image quality assessment: From error visibility to structural similarity, IEEE Transactions on Image Processing, 13(4), 600–612.