Skip to main content
Log in

Chaotic encryption of images in the fractional Fourier transform domain using different modes of operation

  • Original Paper
  • Published:
Signal, Image and Video Processing Aims and scope Submit manuscript


This paper presents an implementation of 2D chaotic Baker map using different modes of operation in the fractional Fourier transform domain on digital images. The proposed image cryptosystem implements the chaotic Baker map scrambling using three different modes of operation: cipher block chain, cipher feedback, and output feedback, in which the initialization vector works as the main key. We examine its implementation for digital images along with its detailed security analysis. The security analysis includes the statistical analysis, the histogram analysis, the correlation coefficient metric, the maximum deviation metric, the irregular deviation metric, the noise immunity, the processing time, and the key space analysis. Experimental results verify and prove that the proposed image cryptosystem is highly secure from the cryptographic viewpoint, more immune to noise, has high key sensitivity, and takes less processing time.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others


  1. Furht, B., Socek, D.: A Survey of Multimedia Security, Technical Report August 21 2003

  2. Schneier, B.: Applied Cryptography-Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, New York (1996)

    MATH  Google Scholar 

  3. Daemen, J., Sand, B., Rijmen, V.: The Design of Rijndael: AES—The Advanced Encryption Standard. Springer, Berlin (2002)

    Book  Google Scholar 

  4. Li, S., Li, Q., Li, W., Mou, X., Cai, Y.: Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseudo-random coding. IMA Int. Conf. Crypt. Coding 2260, 205–221 (2001)

    MathSciNet  Google Scholar 

  5. Gotz, M., Kelber, K., Schwarz, W.: Discrete-time chaotic cryptosystems-part I: statistical design approach. IEEE Trans. Circuits Syst.-1: Fundam. Theory Appl. 44, 963–970 (1997)

    Article  MathSciNet  Google Scholar 

  6. Wang, K., Pei, W., Zou etl, L.: Security of public key encryption technique based on multiple chaotic system. Phys. Lett. A 360, 259–262 (2006)

    Article  MATH  Google Scholar 

  7. Huang, F., Feng, Y.: Security analysis of image encryption based on two-dimensional chaotic maps and improved algorithm. Front Electr. Electron. Eng. China 4(1), 5–9 (2009)

    Google Scholar 

  8. Peng, J., Jin, S., Chen, G., Yang, Z., Liao, X.: An image encryption scheme based on chaotic map. Presented at the 4th International Conference on Natural Computation, vol. 4, pp. 595–599 (2008)

  9. Zhai, Y., Lin, S., Zhang, Q.: Improving image encryption using multi-chaotic map. Presented at Workshop on Power Electronics and Intelligent Transportation System, pp. 143–148 (2008)

  10. El-din, H., Ahmed, H., Kalash, H.M., Farag Allah, O.S.: An efficient chaos-based feedback stream cipher (ECBFSC) for image encryption and decryption. Informatica 31(1), 121–129 (2007)

    Google Scholar 

  11. McBride, A.C., Kerr, F.H.: On Namias’ fractional Fourier transforms. IMA J. Appl. Math. 39, 159–175 (1987)

    Article  MATH  MathSciNet  Google Scholar 

  12. Ozaktas, H.M.: Fractional Fourier domains. Signal Process. 46, 119–124 (1995)

    Article  MATH  Google Scholar 

  13. Ozaktas, H.M., Zalevsky, Z., Kutay, M.A.: The Fractional Fourier Transform. Wiley, Chichester (2001)

    Google Scholar 

  14. Elashry, I.F., Farag Allah, O.S., Abbas, A.M., El-Rabaie, S., Abd El-Samie, F.E.: Homomorphic image encryption. J. Electro. Imaging 18(3), 033002-1–033002-14 (2009)

  15. El-Fishawy, N., Abu Zaid, O.M.: Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms. Int. J. Netw. Secur. 5(3), 241–251 (2007)

  16. Kuo, C.J.: Novel image encryption technique and its application in progressive transmission. J. Electron. Imaging 2(4), 345–351 (1993)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations


Corresponding author

Correspondence to Fathi E. Abd El-Samie.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Elhoseny, H.M., Ahmed, H.E.H., Abbas, A.M. et al. Chaotic encryption of images in the fractional Fourier transform domain using different modes of operation. SIViP 9, 611–622 (2015).

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: