In recent years, a variety of chaos-based image cryptosystems have been proposed. An architecture of such kind of cryptosystems is composed of multiple rounds of substitution and diffusion. In the substitution stage, a two- or higher-dimensional chaotic map is employed to shuffle the image pixels for confusion purpose. In the diffusion process, the pixel values are altered sequentially so that the change made to a particular pixel depends on the accumulated effect of all the previous pixels. The design of this class of chaos-based image cryptosystems, together with the security evaluations, will be discussed in this chapter.
In substitution-diffusion type chaos-based image cryptosystems, the confusion and diffusion effects are solely contributed by the substitution and the diffusion stages, respectively. This design leads to the weakness that the two stages are attacked separately. Moreover, the required overall rounds of operations in achieving a certain security level is found more than necessary. A modified architecture is then suggested so that certain diffusion effect is introduced in the substitution stage by simple sequential add-and-shift operations. The resistance to attacks is enhanced. The encryption efficiency is also improved as fewer operation rounds are required.
- Image Encryption
- Adjacent Pixel
- Cipher Image
- Image Cryptosystems
- Permute Image
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, access via your institution.
Tax calculation will be finalised at checkout
Purchases are for personal use onlyLearn about institutional subscriptions
Unable to display preview. Download preview PDF.
Schneier, B.: Cryptography: Theory and Practice. CRC Press, Boca Raton (1995)
Baptista, M.S.: Phys. Lett. A 240, 50–54 (1998)
Wong, K.W.: Phys. Lett. A 298, 238–242 (2002)
Pareek, N.K., Patidar, V., Sud, K.K.: Phys. Lett. A 309, 75–82 (2003)
Fridrich, J.: Int. J. Bifurcat Chaos 8, 1259–1284 (1998)
Chen, G., Mao, Y., Chui, C.K.: Chaos, Solitons and Fractals 21, 749–761 (2004)
Mao, Y., Chen, G., Lian, S.: Int. J. Bifurcat Chaos 14, 3613–3624 (2004)
Guan, Z.H., Huang, F., Guan, W.: Phys. Lett. A 346, 153–157 (2005)
Lian, S., Sun, J., Wang, Z.: Chaos, Solitons and Fractals 26, 117–129 (2005)
Pisarchik, A.N., Flores-Camona, N.J., Carpio-Valadez, M.: Chaos 16, 033118-1-6 (2006)
Pareek, N.K., Patidar, V., Sud, K.K.: Image and Vision Computing 24, 926–934 (2006)
Kwok, H.S., Tang, K.S.: Chaos, Solitons and Fractals 32, 1518–1529 (2007)
Lian, S., Sun, J., Wang, Z.: Physica A 351, 645–661 (2005)
Mao, Y., Chen, G.: Chaos-based image encryption. In: Bayro-Corrochano, E. (ed.) Handbook of computational geometry for pattern recognition, computer vision, neural computing and robotics. Springer, Heidelber (2003)
Xiao, D., Liao, X., Wei, P.: Chaos, Solitons and Fractals (2007) doi:10.1016/j.chaos.2007.10.009
Wang, K., Pei, W., Zou, L., Song, A., He, Z.: Phys. Lett. A 343, 432–439 (2005)
Wong, K.W., Kwok, S.H., Law, W.S.: Phys. Lett. A 372, 2645–2652 (2008)
Editors and Affiliations
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Wong, KW. (2009). Image Encryption Using Chaotic Maps. In: Kocarev, L., Galias, Z., Lian, S. (eds) Intelligent Computing Based on Chaos. Studies in Computational Intelligence, vol 184. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-95972-4_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-95971-7
Online ISBN: 978-3-540-95972-4