Skip to main content

Recent Advancements in Chaos-Based Image Encryption Techniques: A Review

  • Conference paper
  • First Online:
Social Networking and Computational Intelligence

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 100))

Abstract

The transmission rate of multimedia data becomes exponential due to the tremendous development in network and communication facilities in last decades. Legitimate and illegitimate both kind of users can access these facilities easily 24 × 7. During transmission of data, protecting the authenticity, confidentiality and integrity of data is paramount because it affects the privacy as well as reputation of the person. Data encryption method is used to provide secure transmission of data among end devices. With the revolution in digital photography, image authenticity and integrity problems are hot topics. This paper reviews the resources offered within scope of research community so far to cover recent developments in chaotic image encryption field.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lorenz EN (1963) Deterministic non periodic flow. J Atmos Sci

    Google Scholar 

  2. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715

    Article  MathSciNet  Google Scholar 

  3. Wang X, Teng L, Qin X (2012) A novel color image encryption algorithm based on chaos. Signal Process 1101–1108

    Article  MathSciNet  Google Scholar 

  4. Bhatnagar QG (2012) Selective image encryption based on pixels of interest and singular value decomposition. Digit Signal Process 648–663

    Article  MathSciNet  Google Scholar 

  5. Jakimoski G, Subbalakshmi KP (2007) Discrete lyapunov exponent and differential cryptanalysis. IEEE Trans Circuits Syst II, pp 499–501

    Article  Google Scholar 

  6. Zhu ZL, Wang C, Chai H, Yu H (2011) A chaotic image encryption scheme based on magic cube transformation. In: IEEE fourth international workshop on chaos-fractals theories and applications. China

    Google Scholar 

  7. Chen RJ, Horng SJ (2010) Novel SCAN-CA-based image security system using scan and 2-D von Neumann cellular automata. Signal Process Image Commun 413–426

    Google Scholar 

  8. Li L, El-Latif AAA, Niu X (2012) Elliptic curve Elgamal based homomorphic image encryption scheme for sharing secret images. Signal Process 1069–1078

    Article  Google Scholar 

  9. Chen TH, Tsao KH, Lee YS (2012) Yet another multiple-image encryption by rotating random grid. Signal Process 2229–2237

    Article  Google Scholar 

  10. Yang S, Sun S (2008) A video encryption method based on chaotic maps in DCT domain. Sci Direct Prog Nat Sci 18

    Article  Google Scholar 

  11. Pecora LM, Carroll TL (1990) Synchronization in chaotic systems. Phys Rev Lett 64:821

    Article  MathSciNet  Google Scholar 

  12. Bradley E (1995) Causes and effects of chaos. Comput Graph Elsevier Sci Ltd. 19(5):755–778

    Google Scholar 

  13. Baptista MS (1998) Cryptography with chaos. Phys Lett A 50

    Google Scholar 

  14. Bose R, Banerjee A (1999) Implementing symmetric cryptography using chaos function. In: 7th international conference on advanced computing and communications. Roorkee

    Google Scholar 

  15. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness test for image encryption. J Sel Areas Telecommun (JSAT) 31(8)

    Google Scholar 

  16. Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model (Elsevier) 52:2028–2035

    Article  MathSciNet  Google Scholar 

  17. Zhu ZL, Wang C, Chai H, Yu H (2011) A chaotic image encryption scheme based on magic cube transformation. In: Fourth international workshop on chaos-fractals theories and applications. China

    Google Scholar 

  18. Ye G, Huang X (2016) A secure image encryption algorithm based on chaotic maps and SHA-3. Secur Commun Netw, Wiley online library, pp 2015–2023

    Google Scholar 

  19. Zahmoul R, Zaied M (2016) Toward new family beta maps for chaotic image encryption. In: IEEE international conference on Systems, man and cybernatics. Hungary

    Google Scholar 

  20. Wu J, Liao X, Yang B (2017) Color image encryption based on chaotic systems and elliptic curve ElGamal scheme. Signal Process 141:109–124

    Article  Google Scholar 

  21. Pareek NK, Patidar V, Sud KK (2003) Discrete chaotic cryptography using external key. Phys Lett A 309:75–82

    Article  MathSciNet  Google Scholar 

  22. Huang F, Guan ZH (2005) Cryptosystem using chaotic key. Chaos Solut Fractals 23:851–855

    Article  Google Scholar 

  23. Pisarchik AN, Zanin M (2008) Image encryption with chaotically coupled chaotic maps. Physica D (Elsevier), 237:2364–2648

    Article  MathSciNet  Google Scholar 

  24. Amin M, Faragallah OS, El-Latif AAA (2010) A chaotic block cipher algorithm for image cryptosystems. Commun Nonlinear Sci Number Simulat 15:3484–3497

    Article  MathSciNet  Google Scholar 

  25. Gupta K, Silakari S (2011) A new approach for fast color image encryption using chaotic map. J Inf Secur 2:139–150

    Article  Google Scholar 

  26. Fu C, Chen JJ, Zou H, Meng WH, Zhan YF, Yu YW (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Soc Am 20(3):2363–2378

    Article  Google Scholar 

  27. Kanso A, Ghebleh M (2012) A novel image encryption algorithm based on a 3D chaotic map. Commun Nonlinear Sci Numer Simulat (Elsevier) 17:2943–2959

    Article  MathSciNet  Google Scholar 

  28. Slimane NB, Bouallegue K, Machhout M (2016) Nested chaotic image encryption scheme using two-diffusion process and the secure hash algorithm SHA-1. In: 4th IEEE international conference on control engineering and information technology. Tunisia

    Google Scholar 

  29. Chen J, Zhang Y, Qi L, Fu C, Xu L (2018) Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression. Opt Laser Technol 99:238–248

    Article  Google Scholar 

  30. Mao Y, Chen G (2005) Chaos based image encryption. In: Handbook of geometric computing. Berlin Heidelberg, Springer

    Google Scholar 

  31. Zhang NA (2013) Colour image encryption algorithm combining compressive sensing with Arnold transform. J Comp 8(11):2857–2863

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Snehlata Yadav .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yadav, S., Tiwari, N. (2020). Recent Advancements in Chaos-Based Image Encryption Techniques: A Review. In: Shukla, R., Agrawal, J., Sharma, S., Chaudhari, N., Shukla, K. (eds) Social Networking and Computational Intelligence. Lecture Notes in Networks and Systems, vol 100. Springer, Singapore. https://doi.org/10.1007/978-981-15-2071-6_52

Download citation

Publish with us

Policies and ethics