Skip to main content

Chaotic Map Based Image Encryption in Spatial Domain: A Brief Survey

  • Conference paper
  • First Online:
Proceedings of the First International Conference on Intelligent Computing and Communication

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 458))

Abstract

Image encryption is a process of conversion of original image into an unintelligible form, which is not understood by anyone except authorized parties after performing decryption operation on it with the help of a secret key. Image encryption is a challenging task due to its large amount of data and correlation among pixels restricts using traditional encryption algorithm. So, to obtain an efficient and robustness against security violation during image transmission chaotic based image encryption techniques are proven to be more suitable. These techniques are considered more effective due to low computational power, high sensitivity to initial conditions. In this paper, we discuss about chaos and their properties and we give a general overview of chaotic map based image encryption scheme and various phases in the process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Y. Matias and A. Shamir. 1987. A video scrambling technique based on space filling curves. Proceedings on Advances in Cryptology-CRYPTO’87, Lecture Notes in Computer Science, vol. 293, 398–417

    Article  Google Scholar 

  2. CENELEC (European Committee for Electro technical Standardization). 1992(December). Access control system for the MAC/packet family: EUROCRYPT. European Standard EN 50094. Brussels: CENELEC

    Google Scholar 

  3. Shiguo Lian “Multimedia Content Encryption: Techniques and Application”, CRC Press, ISBN 987-1-4200-6527-5, pp. 43–85

    Google Scholar 

  4. M. Saikia, S.J. Bora and Md. A. Hussain “A Review on Applications of Multimedia Encryption” in ISBN: 987-81-8487-088-6 in national conference on Network Security- issues, challenges and Techniques, at Tezpur University

    Google Scholar 

  5. K. Sakthidasan, B. V. Santhosh Krishna, “A New Chaotic Algorithm for Image Encryption and Decryption of Digital Color Images”, International Journal of Information and Education Technology, vol. 1, no. 2, June 2011

    Google Scholar 

  6. N.K. Pareeka, Vinod Patidar, K.K. Sud, “Image encryption using chaotic logistic map”, Image and Vision Computing 24 (2006) 926–934

    Google Scholar 

  7. https://en.wikipedia.org/wiki/List_of_chaotic_maps

  8. K S Tamilkodi, (Mrs) N Rama, “A comprehensive survey on performance analysis of chaotic colour image encryption algorithms based on its cryptographic requirements”, International Journal of Information Technology, Control and Automation (IJITCA), vol.5, no.1/2, April 2015

    Google Scholar 

  9. https://en.wikipedia.org/wiki/Chebyshev_polynomials

  10. Pawan N. Khade, Prof. Manish Narnaware, “3D Chaotic Functions for Image Encryption”, IJCSI International Journal of Computer Science Issues, vol. 9, Issue 3, no 1, May 2012ISSN (Online): 1694-0814

    Google Scholar 

  11. Guanrong Chen, Yaobin Mao, Charles K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solutions and Fractals, vol. 21, no. 3, pp. 749–761, 2004.

    Article  MathSciNet  MATH  Google Scholar 

  12. Mayank Mishra, Prashant Singh, Chinmay Garg, “A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping”, International Journal of Information & Computation Technology. ISSN 0974-2239, vol. 4, no. 7 (2014), pp. 741–746

    Google Scholar 

  13. Xin Ma, Chong Fu, Wei-min Lei, Shuo Li, “A Novel Chaos-based Image Encryption Scheme with an Improved Permutation Process”, International Journal of Advancements in Computing Technology, vol. 3, no. 5, June 2011

    Google Scholar 

  14. Nitumoni Hazarika, Monjul Saikia, “A Novel Partial Image Encryption Using Chaotic Logistic Map”, 2014 International Conference on Signal Processing & Integrated Networks(SPIN), IEEE, 2014

    Google Scholar 

  15. Monjul Saikia, Nitumoni Hazarika, Margaret Kathing “Partial Image Encryption using Peter De Jong Chaotic Map based Bit-Plane Permutation and it’s Performance Analysis” published in ACEEE Fifth International Conference on Recent Trends in Information, Telecommunication and Computing ITC 2014 on Mar 21st at Chandigarh, India ISBN: 978-94-91587-21-3 Search DL ID: 02.ITC.2014.5.5 pp. 1–10 URL: http://searchdl.org/index.php/conference/view/751

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Monjul Saikia .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Monjul Saikia, Bikash Baruah (2017). Chaotic Map Based Image Encryption in Spatial Domain: A Brief Survey. In: Mandal, J., Satapathy, S., Sanyal, M., Bhateja, V. (eds) Proceedings of the First International Conference on Intelligent Computing and Communication. Advances in Intelligent Systems and Computing, vol 458. Springer, Singapore. https://doi.org/10.1007/978-981-10-2035-3_58

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2035-3_58

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2034-6

  • Online ISBN: 978-981-10-2035-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics