Abstract
Images are widely used a data type for sharing information through the Internet. Designing and exploring security mechanisms to protect the image data during communication are matters of great interest among researchers and industry experts. Encrypting the images is a commonly used mechanism of securing them from different types of attacks. In this work, various image encryption algorithms employing chaotic map techniques are compared. It includes various security parameters in respect of chaotic maps and encryption algorithms for images. Chaotic maps are verified using tools like bifurcation and Lyapunov diagrams. Image encryption algorithms need to satisfy a comprehensive set of security parameters and tests—visual analysis, key sensitivity, keyspace, correlation coefficient, and histogram analysis. Finally, a tabular comparison of different encryption schemes is done using ‘NPCR’ and ‘UACI.’ Another comparison provides the different schemes’ correlation coefficients for horizontal, vertical, and diagonal adjacencies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Blizzard S (2014) Don’t feed the hackers: how your attitude to data security could affect business. Netw Secur 2014(5):18–20
Wu Y, Ren X, Cao Z, Chen X (2021) Diagnosis and analysis of repeatable diseases based on deep intelligent model driven by big data of medical images. Author links open overlay panel, Digital communications and networks (in press). Available online 1 May 2021
Diaz O, Kushibar K, Osuala R, Linardos A, Garrucho L, Igual L, Radeva P, Prior F, Gkontra P, Lekadir K (2021) Data preparation for artificial intelligence in medical imaging: a comprehensive guide to open-access platforms and tools. Physica Medica 83:25–37
Baptista MS (1998) Cryptography with chaos. Phys Lett A 240:50–54
Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934
Kwok HS, Tang WKS (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos Solit Fract 32(4):1518–1529
Behnia S, Akhshani A, Mahmodi H, Akhavan A (2008) A novel algorithm for image encryption based on mixture of chaotic maps. Chaos Solit Fract 35(2):408–419
Patidar V, Pareek NK, Sud KK (2009) A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14(7):3056–3075
Hongjun L, Xingyuan W (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320–3327
Akhavan A, Samsudin A, Akhshani A (2011) A symmetric image encryption scheme based on combination of nonlinear chaotic maps. J Franklin Inst 348(8):1797–1813
Huang X (2012) Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn 67:2411–2417
Zhang Y, Xiao D (2013) Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform. Opt Lasers Eng 51(4):472–480
Khanzadi H, Eshghi M, Borujeni SE (2014) Image encryption using random bit sequence based on chaotic maps. Arab J Sci Eng 39:1039–1047
Xiangjun W, Haibin K, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24–39
Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25
Zahmoul R, Ejbali R, Zaied M (2017) Image encryption based on new Beta chaotic maps. Opt Lasers Eng 96:39–49
Khan M, Asghar Z (2018) A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Neural Comput Appl 29:993–999
Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403–419
Sharma M (2020) Image encryption based on a new 2D logistic adjusted logistic map. Multimed Tools Appl 79:355–374
Patro KAK, Acharya B (2021) An efficient dual-layer cross-coupled chaotic map security-based multi-image encryption system. Nonlinear Dyn 52
Sheela SJ, Suresh KV, Tandur D (2019) Image encryption based on modified Henon map using hybrid chaotic shift transform. Multimed Tools Appl 11042-018-5782-2
Zhongyun H, Yicong Z, Pun C, Chen CP (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80–94
Alawidai M, Samsudin A, Teh JS (2020) Enhanced digital chaotic maps based on bit reversal with applications in random bit generators. Inf Sci 512:1155–1169
Natiq H, Al-Saidi NMG, Said MRM, Kilicman A (2018) A new hyperchaotic map and its application for image encryption. Eur Phys J Plus 133:6
Patro KAK, Soni A, Netam PK, Acharya B (2020) Multiple grayscale image encryption using cross-coupled chaotic maps. J Inf Secur Appl 52:102470
Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J Multidisci J Sci Technol J Select Areas Telecommun (JSAT) 31–38
Hua Z, Zhou Y (2016) Image encryption using 2D logistic-adjusted-Sine map. Inf Sci 339:237–253
Chai X (2017) An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multimed Tools Appl 76:1159–1175
Mansouri A, Wang X (2020) A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf Sci 520:46–62
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharma, M., Ranjan, R.K., Bharti, V. (2022). Image Encryption Using Chaotic Maps: A Survey. In: Kumar, R., Ahn, C.W., Sharma, T.K., Verma, O.P., Agarwal, A. (eds) Soft Computing: Theories and Applications. Lecture Notes in Networks and Systems, vol 425. Springer, Singapore. https://doi.org/10.1007/978-981-19-0707-4_75
Download citation
DOI: https://doi.org/10.1007/978-981-19-0707-4_75
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-0706-7
Online ISBN: 978-981-19-0707-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)