Skip to main content

Image Encryption Using Chaotic Maps: A Survey

  • Conference paper
  • First Online:
Soft Computing: Theories and Applications

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 425))

Abstract

Images are widely used a data type for sharing information through the Internet. Designing and exploring security mechanisms to protect the image data during communication are matters of great interest among researchers and industry experts. Encrypting the images is a commonly used mechanism of securing them from different types of attacks. In this work, various image encryption algorithms employing chaotic map techniques are compared. It includes various security parameters in respect of chaotic maps and encryption algorithms for images. Chaotic maps are verified using tools like bifurcation and Lyapunov diagrams. Image encryption algorithms need to satisfy a comprehensive set of security parameters and tests—visual analysis, key sensitivity, keyspace, correlation coefficient, and histogram analysis. Finally, a tabular comparison of different encryption schemes is done using ‘NPCR’ and ‘UACI.’ Another comparison provides the different schemes’ correlation coefficients for horizontal, vertical, and diagonal adjacencies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Blizzard S (2014) Don’t feed the hackers: how your attitude to data security could affect business. Netw Secur 2014(5):18–20

    Article  Google Scholar 

  2. Wu Y, Ren X, Cao Z, Chen X (2021) Diagnosis and analysis of repeatable diseases based on deep intelligent model driven by big data of medical images. Author links open overlay panel, Digital communications and networks (in press). Available online 1 May 2021

    Google Scholar 

  3. Diaz O, Kushibar K, Osuala R, Linardos A, Garrucho L, Igual L, Radeva P, Prior F, Gkontra P, Lekadir K (2021) Data preparation for artificial intelligence in medical imaging: a comprehensive guide to open-access platforms and tools. Physica Medica 83:25–37

    Article  Google Scholar 

  4. Baptista MS (1998) Cryptography with chaos. Phys Lett A 240:50–54

    Article  MathSciNet  Google Scholar 

  5. Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934

    Article  Google Scholar 

  6. Kwok HS, Tang WKS (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos Solit Fract 32(4):1518–1529

    Article  MathSciNet  Google Scholar 

  7. Behnia S, Akhshani A, Mahmodi H, Akhavan A (2008) A novel algorithm for image encryption based on mixture of chaotic maps. Chaos Solit Fract 35(2):408–419

    Article  MathSciNet  Google Scholar 

  8. Patidar V, Pareek NK, Sud KK (2009) A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14(7):3056–3075

    Article  Google Scholar 

  9. Hongjun L, Xingyuan W (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320–3327

    Article  MathSciNet  Google Scholar 

  10. Akhavan A, Samsudin A, Akhshani A (2011) A symmetric image encryption scheme based on combination of nonlinear chaotic maps. J Franklin Inst 348(8):1797–1813

    Article  MathSciNet  Google Scholar 

  11. Huang X (2012) Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn 67:2411–2417

    Article  MathSciNet  Google Scholar 

  12. Zhang Y, Xiao D (2013) Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform. Opt Lasers Eng 51(4):472–480

    Article  Google Scholar 

  13. Khanzadi H, Eshghi M, Borujeni SE (2014) Image encryption using random bit sequence based on chaotic maps. Arab J Sci Eng 39:1039–1047

    Article  Google Scholar 

  14. Xiangjun W, Haibin K, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24–39

    Article  Google Scholar 

  15. Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25

    Article  Google Scholar 

  16. Zahmoul R, Ejbali R, Zaied M (2017) Image encryption based on new Beta chaotic maps. Opt Lasers Eng 96:39–49

    Article  Google Scholar 

  17. Khan M, Asghar Z (2018) A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Neural Comput Appl 29:993–999

    Article  Google Scholar 

  18. Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403–419

    Article  Google Scholar 

  19. Sharma M (2020) Image encryption based on a new 2D logistic adjusted logistic map. Multimed Tools Appl 79:355–374

    Article  Google Scholar 

  20. Patro KAK, Acharya B (2021) An efficient dual-layer cross-coupled chaotic map security-based multi-image encryption system. Nonlinear Dyn 52

    Google Scholar 

  21. Sheela SJ, Suresh KV, Tandur D (2019) Image encryption based on modified Henon map using hybrid chaotic shift transform. Multimed Tools Appl 11042-018-5782-2

    Google Scholar 

  22. Zhongyun H, Yicong Z, Pun C, Chen CP (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80–94

    Article  Google Scholar 

  23. Alawidai M, Samsudin A, Teh JS (2020) Enhanced digital chaotic maps based on bit reversal with applications in random bit generators. Inf Sci 512:1155–1169

    Article  Google Scholar 

  24. Natiq H, Al-Saidi NMG, Said MRM, Kilicman A (2018) A new hyperchaotic map and its application for image encryption. Eur Phys J Plus 133:6

    Article  Google Scholar 

  25. Patro KAK, Soni A, Netam PK, Acharya B (2020) Multiple grayscale image encryption using cross-coupled chaotic maps. J Inf Secur Appl 52:102470

    Google Scholar 

  26. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J Multidisci J Sci Technol J Select Areas Telecommun (JSAT) 31–38

    Google Scholar 

  27. Hua Z, Zhou Y (2016) Image encryption using 2D logistic-adjusted-Sine map. Inf Sci 339:237–253

    Article  Google Scholar 

  28. Chai X (2017) An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multimed Tools Appl 76:1159–1175

    Article  Google Scholar 

  29. Mansouri A, Wang X (2020) A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf Sci 520:46–62

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Madhu Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharma, M., Ranjan, R.K., Bharti, V. (2022). Image Encryption Using Chaotic Maps: A Survey. In: Kumar, R., Ahn, C.W., Sharma, T.K., Verma, O.P., Agarwal, A. (eds) Soft Computing: Theories and Applications. Lecture Notes in Networks and Systems, vol 425. Springer, Singapore. https://doi.org/10.1007/978-981-19-0707-4_75

Download citation

Publish with us

Policies and ethics