The European Physical Journal Special Topics

, Volume 223, Issue 8, pp 1611–1622 | Cite as

Image encryption using eight dimensional chaotic cat map

  • K. GanesanEmail author
  • K. Murali
Regular Article Chaos Based Image Encryption, Stream Cipher and Authentication
Part of the following topical collections:
  1. Chaos, Cryptography and Communications


In recent years, a large number of discrete chaotic cryptographic algorithms have been proposed. However, most of them encounter some problems such as lack of robustness and security. In this paper, we introduce a new image encryption algorithm based on eight-dimensional (nonlinear) chaotic cat map. Encryption of image is different from that of texts due to some intrinsic features of image such as bulk data capacity and high redundancy, which are generally difficult to handle by traditional methods. In traditional methods the key space is small and the security is weak. The proposed algorithm tries to address these problems and also tries to enhance the encryption speed. In this paper an eight dimensional chaotic cat map is used to encrypt the intensity values of pixels using lookup table method thereby significantly increasing the speed and security of encryption. The proposed algorithm is found to be resistive against chosen/known-plaintext attacks, statistical and differential attacks.


European Physical Journal Special Topic Image Encryption Adjacent Pixel Encrypt Image Plain Image 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Mintu Philip, Asha Das, Survey: Image Encryption using Chaotic Cryptography Schemes, IJCA Special Issue on Computational Science – New Dimensions & Perspectives, NCCSE, 2011Google Scholar
  2. 2.
    K. Ganesan, R. Muthukumar, K. Murali, IEEE Trans. Circ. Syst. 2006 (APCCAS 2006), p. 1951Google Scholar
  3. 3.
    Ii Won Yoon, Hyoungshick Kim, Comm. Nonlinear Sci. Numer. Simul. 15, 3998 (2010)CrossRefzbMATHGoogle Scholar
  4. 4.
    Xingyuan Worng, Jianfeng Zhao, Hongjun Lice, Optics Comm. 285, 562 (2012)ADSCrossRefGoogle Scholar
  5. 5.
    Narendra K. Pareek, Vinod Patida, Krishan K. Sud, Digital Signal Proc. 23, 894 (2013)CrossRefGoogle Scholar
  6. 6.
    Xinjun Zhang, Xingyuan Worng, Signal Proc. 93, 2422 (2013)CrossRefGoogle Scholar
  7. 7.
    H. Hermassi, R. Rhouma, S. Belghith, Telecomm. Syst. 52, 539 (2013)Google Scholar
  8. 8.
    Tiegang Gao, Zengqiang Chen, Phys. Lett. A 372, 394 (2008)ADSCrossRefzbMATHGoogle Scholar
  9. 9.
    Xiao-Jun Tang, Comm. Nonlinear Sci. Numer. Simul. 18, 1725 (2013)ADSCrossRefGoogle Scholar
  10. 10.
    Fei Chen, Kwok-wo Wong, Xiaofeng Liao, Tao Xiang, IEEE Trans., UST. 59, 3249 (2013)MathSciNetGoogle Scholar
  11. 11.
    K. Ganesan, Jerin Geogy George, P.V. Nithin, Real Time Secure Video Transmission Using Multicore CPUs and GPUs (submitted to Multimedia Tools and Applications, 2014)Google Scholar
  12. 12.
    A. Kanso, M. Ghebleh, Comm. Nonlinear Sci. Numer. Simul. UST. 17, 2943 (2012)ADSCrossRefzbMATHMathSciNetGoogle Scholar
  13. 13.
    K. Ganesan, G. Harsha Reddy, Sindhura Tokala, Ragava Monica desur, Amer. J. Comput. Architect 2, 1 (2013)Google Scholar
  14. 14.
    Ren Honge, Shang Zhenwei, Zhang Jian, Optical Technol. 35, 384 (2009)Google Scholar
  15. 15.
    Mao-Yu , Huang Etal, Image Encryption Algorithm Based On Chaotic Maps, Comp. Symposium (ICS), International, Tainan (2010)Google Scholar
  16. 16.
    Iqtadar Hussain, Tarig Shah, Mohannad Asif Gondal, Math. Comp. Modell. 57(9:10), 2576 (2013)CrossRefzbMATHGoogle Scholar

Copyright information

© EDP Sciences and Springer 2014

Authors and Affiliations

  1. 1.TIFAC-CORE, VIT UniversityVelloreIndia
  2. 2.Department of PhysicsAnna UniversityChennaiIndia

Personalised recommendations