Abstract
The transmission rate of multimedia data becomes exponential due to the tremendous development in network and communication facilities in last decades. Legitimate and illegitimate both kind of users can access these facilities easily 24 × 7. During transmission of data, protecting the authenticity, confidentiality and integrity of data is paramount because it affects the privacy as well as reputation of the person. Data encryption method is used to provide secure transmission of data among end devices. With the revolution in digital photography, image authenticity and integrity problems are hot topics. This paper reviews the resources offered within scope of research community so far to cover recent developments in chaotic image encryption field.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lorenz EN (1963) Deterministic non periodic flow. J Atmos Sci
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715
Wang X, Teng L, Qin X (2012) A novel color image encryption algorithm based on chaos. Signal Process 1101–1108
Bhatnagar QG (2012) Selective image encryption based on pixels of interest and singular value decomposition. Digit Signal Process 648–663
Jakimoski G, Subbalakshmi KP (2007) Discrete lyapunov exponent and differential cryptanalysis. IEEE Trans Circuits Syst II, pp 499–501
Zhu ZL, Wang C, Chai H, Yu H (2011) A chaotic image encryption scheme based on magic cube transformation. In: IEEE fourth international workshop on chaos-fractals theories and applications. China
Chen RJ, Horng SJ (2010) Novel SCAN-CA-based image security system using scan and 2-D von Neumann cellular automata. Signal Process Image Commun 413–426
Li L, El-Latif AAA, Niu X (2012) Elliptic curve Elgamal based homomorphic image encryption scheme for sharing secret images. Signal Process 1069–1078
Chen TH, Tsao KH, Lee YS (2012) Yet another multiple-image encryption by rotating random grid. Signal Process 2229–2237
Yang S, Sun S (2008) A video encryption method based on chaotic maps in DCT domain. Sci Direct Prog Nat Sci 18
Pecora LM, Carroll TL (1990) Synchronization in chaotic systems. Phys Rev Lett 64:821
Bradley E (1995) Causes and effects of chaos. Comput Graph Elsevier Sci Ltd. 19(5):755–778
Baptista MS (1998) Cryptography with chaos. Phys Lett A 50
Bose R, Banerjee A (1999) Implementing symmetric cryptography using chaos function. In: 7th international conference on advanced computing and communications. Roorkee
Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness test for image encryption. J Sel Areas Telecommun (JSAT) 31(8)
Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model (Elsevier) 52:2028–2035
Zhu ZL, Wang C, Chai H, Yu H (2011) A chaotic image encryption scheme based on magic cube transformation. In: Fourth international workshop on chaos-fractals theories and applications. China
Ye G, Huang X (2016) A secure image encryption algorithm based on chaotic maps and SHA-3. Secur Commun Netw, Wiley online library, pp 2015–2023
Zahmoul R, Zaied M (2016) Toward new family beta maps for chaotic image encryption. In: IEEE international conference on Systems, man and cybernatics. Hungary
Wu J, Liao X, Yang B (2017) Color image encryption based on chaotic systems and elliptic curve ElGamal scheme. Signal Process 141:109–124
Pareek NK, Patidar V, Sud KK (2003) Discrete chaotic cryptography using external key. Phys Lett A 309:75–82
Huang F, Guan ZH (2005) Cryptosystem using chaotic key. Chaos Solut Fractals 23:851–855
Pisarchik AN, Zanin M (2008) Image encryption with chaotically coupled chaotic maps. Physica D (Elsevier), 237:2364–2648
Amin M, Faragallah OS, El-Latif AAA (2010) A chaotic block cipher algorithm for image cryptosystems. Commun Nonlinear Sci Number Simulat 15:3484–3497
Gupta K, Silakari S (2011) A new approach for fast color image encryption using chaotic map. J Inf Secur 2:139–150
Fu C, Chen JJ, Zou H, Meng WH, Zhan YF, Yu YW (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Soc Am 20(3):2363–2378
Kanso A, Ghebleh M (2012) A novel image encryption algorithm based on a 3D chaotic map. Commun Nonlinear Sci Numer Simulat (Elsevier) 17:2943–2959
Slimane NB, Bouallegue K, Machhout M (2016) Nested chaotic image encryption scheme using two-diffusion process and the secure hash algorithm SHA-1. In: 4th IEEE international conference on control engineering and information technology. Tunisia
Chen J, Zhang Y, Qi L, Fu C, Xu L (2018) Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression. Opt Laser Technol 99:238–248
Mao Y, Chen G (2005) Chaos based image encryption. In: Handbook of geometric computing. Berlin Heidelberg, Springer
Zhang NA (2013) Colour image encryption algorithm combining compressive sensing with Arnold transform. J Comp 8(11):2857–2863
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Yadav, S., Tiwari, N. (2020). Recent Advancements in Chaos-Based Image Encryption Techniques: A Review. In: Shukla, R., Agrawal, J., Sharma, S., Chaudhari, N., Shukla, K. (eds) Social Networking and Computational Intelligence. Lecture Notes in Networks and Systems, vol 100. Springer, Singapore. https://doi.org/10.1007/978-981-15-2071-6_52
Download citation
DOI: https://doi.org/10.1007/978-981-15-2071-6_52
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-2070-9
Online ISBN: 978-981-15-2071-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)