Skip to main content

Image Encryption Using Chaotic Maps

  • Chapter
Intelligent Computing Based on Chaos

Part of the book series: Studies in Computational Intelligence ((SCI,volume 184))

Abstract

In recent years, a variety of chaos-based image cryptosystems have been proposed. An architecture of such kind of cryptosystems is composed of multiple rounds of substitution and diffusion. In the substitution stage, a two- or higher-dimensional chaotic map is employed to shuffle the image pixels for confusion purpose. In the diffusion process, the pixel values are altered sequentially so that the change made to a particular pixel depends on the accumulated effect of all the previous pixels. The design of this class of chaos-based image cryptosystems, together with the security evaluations, will be discussed in this chapter.

In substitution-diffusion type chaos-based image cryptosystems, the confusion and diffusion effects are solely contributed by the substitution and the diffusion stages, respectively. This design leads to the weakness that the two stages are attacked separately. Moreover, the required overall rounds of operations in achieving a certain security level is found more than necessary. A modified architecture is then suggested so that certain diffusion effect is introduced in the substitution stage by simple sequential add-and-shift operations. The resistance to attacks is enhanced. The encryption efficiency is also improved as fewer operation rounds are required.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schneier, B.: Cryptography: Theory and Practice. CRC Press, Boca Raton (1995)

    Google Scholar 

  2. Baptista, M.S.: Phys. Lett. A 240, 50–54 (1998)

    Google Scholar 

  3. Wong, K.W.: Phys. Lett. A 298, 238–242 (2002)

    Google Scholar 

  4. Pareek, N.K., Patidar, V., Sud, K.K.: Phys. Lett. A 309, 75–82 (2003)

    Google Scholar 

  5. Fridrich, J.: Int. J. Bifurcat Chaos 8, 1259–1284 (1998)

    Google Scholar 

  6. Chen, G., Mao, Y., Chui, C.K.: Chaos, Solitons and Fractals 21, 749–761 (2004)

    Google Scholar 

  7. Mao, Y., Chen, G., Lian, S.: Int. J. Bifurcat Chaos 14, 3613–3624 (2004)

    Google Scholar 

  8. Guan, Z.H., Huang, F., Guan, W.: Phys. Lett. A 346, 153–157 (2005)

    Google Scholar 

  9. Lian, S., Sun, J., Wang, Z.: Chaos, Solitons and Fractals 26, 117–129 (2005)

    Google Scholar 

  10. Pisarchik, A.N., Flores-Camona, N.J., Carpio-Valadez, M.: Chaos 16, 033118-1-6 (2006)

    Google Scholar 

  11. Pareek, N.K., Patidar, V., Sud, K.K.: Image and Vision Computing 24, 926–934 (2006)

    Google Scholar 

  12. Kwok, H.S., Tang, K.S.: Chaos, Solitons and Fractals 32, 1518–1529 (2007)

    Google Scholar 

  13. Lian, S., Sun, J., Wang, Z.: Physica A 351, 645–661 (2005)

    Google Scholar 

  14. Mao, Y., Chen, G.: Chaos-based image encryption. In: Bayro-Corrochano, E. (ed.) Handbook of computational geometry for pattern recognition, computer vision, neural computing and robotics. Springer, Heidelber (2003)

    Google Scholar 

  15. Xiao, D., Liao, X., Wei, P.: Chaos, Solitons and Fractals (2007) doi:10.1016/j.chaos.2007.10.009

    Google Scholar 

  16. Wang, K., Pei, W., Zou, L., Song, A., He, Z.: Phys. Lett. A 343, 432–439 (2005)

    Google Scholar 

  17. Wong, K.W., Kwok, S.H., Law, W.S.: Phys. Lett. A 372, 2645–2652 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Wong, KW. (2009). Image Encryption Using Chaotic Maps. In: Kocarev, L., Galias, Z., Lian, S. (eds) Intelligent Computing Based on Chaos. Studies in Computational Intelligence, vol 184. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-95972-4_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-95972-4_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-95971-7

  • Online ISBN: 978-3-540-95972-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics