SlideShare a Scribd company logo
1 of 6
Download to read offline
Bulletin of Electrical Engineering and Informatics
ISSN: 2302-9285
Vol. 6, No. 1, March 2017, pp. 99~104, DOI: 10.11591/eei.v6i1.599  99
Received December 11, 2016; Revised February 11, 2017; Accepted February 25, 2017
Chaos Image Encryption Methods: A Survey Study
Sabah Fadhel
1*
, Mohd Shafry
2
, Omar Farook
3
1, 3
Faculty of Computing-Universiti Teknologi Malaysia (UTM), Skudai, Johor, Malaysia
2
IRDA Digital Media Center, IHCE-Universiti Teknologi Malaysia (UTM)
*Corresponding author, email: sabahuqaidy@yahoo.com
*
Abstract
With increasing dependence on communications over internet and networks, secure data
transmission is coming under threat. One of the best solutions to ensure secure data transmissions is
encryption. Multiple forms of data, such as text, audio, image, and video can be digitally transmitted,
nowadays images being the most popular and old encryption techniques such as: AES, DES, RSA etc.,
show low security level when used for image encryption. This problem was resolved by using of chaos
encryption which is an acceptable form of encryption for image data. The sensitivity to initial conditions and
control parameters make chaos encryption suitable for image applications. This study discusses various
chaos encryption techniques.
Keywords: chaos, initial conditions, control parameters, map, permutation
1. Introduction
Multimedia technology, especially image technology is currently undergoing rapid
change and growth [6] due to increased adoption of internet communications [1]. Current
encryption techniques, such as AES, DES, and RSA are unsuitable for image data encrypting
and cannot guarantee data confidentiality and security [2] because of the size and redundancy
of images [3-5]. Over the last couple of decades numerous techniques have been proposed for
encrypting image data, of which Chaos based encryption has been proven to be the most
effective [7]. Chaos theory was first proposed in the 1970’s for use in physics, mathematics,
biology and engineering. It would not be until the 1980’s that chaos theory was found to have
cryptographic applications [8]. Chaos based encryption methods are popular due to their
randomness, unpredictability, sensitivity and topological transitivity [9-10].
Literature review that has been done author used in the chapter "Introduction" to explain
the difference of the manuscript with other papers, that it is innovative, it are used in the chapter
"Research Method" to describe the step of research and used in the chapter "Results and
Discussion" to support the analysis of the results [2]. If the manuscript was written really have
high originality, which proposed a new method or algorithm, the additional chapter after the
"Introduction" chapter and before the "Research Method" chapter can be added to explain
briefly the theory and/or the proposed method/algorithm [4].
2. Chaos Theory
A chaotic dynamical system is any deterministic system that is both highly random and
sensitive to initial conditions [11]. Chaotic systems are similar to noisy systems because both
are highly unpredictable. Chaotic systems have uses in cryptography because they are
pseudorandom, unpredictable and sensitive to initial condition (starting point) and control
parameters [1]. Chaotic systems are useful for encryption because they appear to be random
data and their sensitivity to initial conditions allows for this randomness to be unpredicted,
allowing a basis for decryption [12]. The main difference between chaos maps and chaos
cryptography is that chaos cryptography is defined by finite sets, while chaos maps are defined
by real numbers, as is shown in Table 1 [11]. Each chaos map has its own parameters and
encryption key.
 ISSN: 2089-3191
Bulletin of EEI Vol. 6, No. 1, March 2017 : 99 – 104
100
Table 1. Illustrate the Differences and Similarities Between Chaotic System and Cryptography
Algorithm
Chaotic System Cryptography Algorithm
Sensitive to the initial conditions and
control parameters
Diffusion
Iterations Rounds
Parameters Key
Set of real numbers Finite set of integer numbers
Chaos maps can be applied by the use of chaotic systems to generate a pseudorandom
key or the generation from a key or plain text. Generation from a pseudorandom key produces a
stream cipher and generation from plain text produces a block cipher [13].
3. Chaos-Based General Image Encryption Scheme
Many data encryption methods use chaotic maps [14-20] because it is widely applicable
and easy to understand. Chaotic based image encryption occurs in two stages, confusion and
diffusion.
Figure 1. 1Illustrates a Chaos-Based Image Encryption General Scheme
In the confusion stage, an image’s pixels are scrambled using a secret key based upon
control parameters. While in the diffusion stage, pixel values are changed using chaotically
generated sequences. Both these methods make chaotic encryption highly secure [21]. Figure 1
illustrates the chaotic encryption process.
4. Different Chaos-Based Encryption Techniques
[22] Proposed an image-scrambling algorithm that made use of chaotic mapping by
encaging each pair of pixels in an image with counterparts in the same image. Pixels are
exchanged using a scrambling matrix that is generated from logistic map principles. The
proposed algorithm is both simple and efficient. The proposed algorithm was evaluated using a
correlation algorithm that indicated the relationship between the degree of scrambling and the
scrambling numbers. From our view point the key space of proposed algorithm is not satisfy the
security requirement, because it is smaller than the acceptable one. Therefore the transmission
of ciphered image will be threatened by brute force attack.
In the algorithm proposed by [23], both a Rössler chaotic system and a Lorenz chaotic
system are used for encryption. The use of two or more chaotic systems in an algorithm is
highly unusual. Long-term chaotic behavior is periodic and dependent on initial variables [24].
Both of Rössler and Lorenz schemes are each dependent on three variables, make increasing
in the security of proposed chaotic system, because of the total parameters number dependent
on six variables, making it highly secure. This algorithm shuffles an image’s pixels and changes
its grayscale values for a set number of iterations before storing the randomized image data in a
chaotic matrix the same size as the original image. XOR operations are used for both encryption
and decryption. From our view point the key space of the proposed algorithm is good in terms of
Bulletin of EEI ISSN: 2302-9285 
Chaos Image Encryption Methods: A Survey Study (Sabah Fadhel)
101
increasing the total number of initial parameters to six instead of three for each chaotic system;
also the correlation of resulted ciphered image is better.
[25] Proposed an encryption method for colored images using a genetic operator and a
chaotic map to minimize the correlation coefficient of adjacent pixels. The proposed algorithm
has four steps. First, a logistical map is used to generate four different chaotic sequences by
using of four control parameters and four initial values to act as shared keys for the encryption
process. Second, quantification, which used to mapped the four sequences into key streams for
use in the remaining phases. Third, a crossover used to confuse the image row-by-row and
column-by-column. Fourth, a mutation phase used to implement XOR operator between the
intermediate image (resulted from crossover stage) and random image. From our view point the
proposed image is good in both of correlation coefficient and key space size. Therefore, it highly
resist against the brute force attack.
New image encryption scheme based on one of three chaotic systems (Lorenz, Chen or
Lu) was proposed by [26] to shuffle the positions of images’ pixels by selecting a chaotic system
based on a 16-byte key length. Another chaotic system is used to create a chaotic map to
disturb the relationship between the encrypted image and the original image. From our view
point, the proposed scheme produces large key space and good results in terms of the resulted
correlation coefficient.
A new image encryption scheme was proposed by [2] using a combination of W7 and
pixel shuffling. A chaotic Henon map is used to generate a permutation matrix using W7 as a
secret key and for initial conditions. Pixels shuffling was achieved using horizontal and vertical
permutations. Pixel correlations were scattered using a shuffling process. From our view point
the proposed scheme has long key space; therefore it is good in brute force resistance. Also it
shows good resistance against statistical attack.
A colored image encryption algorithm based on chaotic map and spatial bit-level
permutations (SBLP) was proposed by [27]. Image pixel positions were shuffled using a
sequence generated from a chaotic logistical map before the shuffled image is transformed into
binary matrix. A permutation of the binary matrix is created by scrambling the map generated
from the (SBLP) process. A second sequence was generated from a chaotic logistical map to
rearrange the new images pixel positions. From our view point, the proposed algorithm is robust
against brute force attack because of suitable size of key space also it deal with bit level
permutation. Also because of low complexity ant fast implementation time the proposed
algorithm can be used in surveillance video systems.
An Enhancement of Advanced Encryption Standard (AES) was proposed by [28]. AES
has many drawbacks such as high computational costs, predictable patterns and fixed S-box
weak points. The proposed algorithm mitigates these drawbacks using a chaotic map and a
XOR operator. The proposed method was tested by using several images and the results show
very small correlation coefficients, improved encryption speed and high security. From our view
point the proposed algorithm show good adaption for AES algorithm to be implemented in
image encryption field.
To reduce the complexity of image encryption, [29] proposed a scheme based on dual-
tree complex wavelet transformations (DT-CWT).First stage in this scheme is to transform plain
image using wavelet transformation, then a pixel chaotic scrambling is used for approximation
and an Arnold transformation is used for the details. From our view point the proposed scheme
is suitable, in terms of the key space and correlation coefficient.
An algorithm for generating random bit sequences based on chaotic maps was
proposed by [30]. This algorithm uses random bit sequence generated from tent and chaotic
logistic maps. The permutation of plain image pixels was done by these chaotic functions, after
which the image was divided into eight-bit map planes. Bits were replaced by another bits value
according to a chaotic ergodic matrix. From our view point the performance of this algorithm is
good in terms of both key sensitivity and key space. Therefore this algorithm is highly resist
against brute force attack and statistical attack.
5. Performance Analysis Of Chaotic Cryptography Systems
After Pecora and Carroll discovered synchronization in chaotic systems in 1990 [31],
chaotic dynamics has received significant attention due to its use in securing communications
 ISSN: 2089-3191
Bulletin of EEI Vol. 6, No. 1, March 2017 : 99 – 104
102
[33-35]. Chaotic signal encoding was first used in 1990 [36]. Some of the most important ways
that the strength of chaotic encryption methods has been evaluated are [13], [32]:
5.1. Key Sensitivity Analysis
The use of a secret key for encryption produces strong encryption, as any change in the
secret key produces another encrypted image. Secure image cryptosystems makes use of
secret keys to evaluate the robustness of an encryption scheme. In a cryptosystem, an image
cannot be decrypted if there is any difference between the encryption and decryption keys [37].
In a strong encryption algorithm, key sensitivity should be greater than 50% [38].
5.2. Key Space Analysis
Key space is the number of attempts necessary to guess a correct decryption key.
Strong encryption should have an encryption key no smaller than 2
100
[39], with the exponent
indicating the number of bits in a key. Large encryption keys provide greater security against
brute force attacks [1].
5.3. Correlation Coefficient Analysis
The correlation coefficient measures similarities between a plain or an encrypted
images pixels in the horizontal, vertical and diagonal directions. In a plain image, the correlation
coefficient should be high. In an encrypted image, a smaller correlation coefficient indicates
higher security [40]. Smaller correlation coefficients are produced from the confusion and
diffusion methods.
5.4. Statistical Analysis
Statistical analysis is the most common cryptanalysis technique, and it is used to
measure the relationship between a plain image and a ciphered image. Strong cryptographic
techniques, when statistically analyzed, show large differences between the plain and ciphered
image.
5.5. Image Entropy Analysis
Entropy is used to measure uncertain associations between random variables [41]. A
grayscale image has a theoretical entropy value of 8 Sh, or bits. Image encryption algorithms
should produce an encrypted image with an entropy value similar to grayscale values [42]. The
closer an encrypted images’ entropy value is to 8 Sh, the more robust it is against entropy-
based attacks.
6. Conclusion
The expansion of the internet and digital communications has increased the need for
data protection. The high usage of images for communication means that secure image
encryption is necessary. Chaotic based image encryption is one of the best ways to encrypt an
image file. In this study, multiple chaotic image encryption methods are discussed and
evaluated. Image security can be increased through the application of multiple chaotic image
encryption methods.
Acknowledgements
Sabah Fadhel is grateful to the ministry of Sciences and Technology (Baghdad-Iraq), for
providing study leave to continue his (Ph. D.).
References
[1] Sankpal, Priya R, PA Vijaya. Image Encryption Using Chaotic Maps: A Survey. Signal and Image
Processing (ICSIP). Fifth International Conference on. IEEE, Jan 8 2014: 102-107.
[2] Jolfaei Alireza, AbdolrasoulMirghadri. An image encryption approach using chaos and stream cipher.
Journal of Theoretical and Applied Information Technology. 2010; 19(2): 117-125.
[3] Wang, Xingyuan, Lin Teng, Xue Qin. A novel colour image encryption algorithm based on chaos.
Signal Processing. 2012; 92(4): 1101-1108.
Bulletin of EEI ISSN: 2302-9285 
Chaos Image Encryption Methods: A Survey Study (Sabah Fadhel)
103
[4] Chen, Caisen, Tao Wang, Yingzhan Kou, Xiaocen Chen, Xiong Li. Improvement of trace-driven I-
Cache timing attack on the RSA algorithm. Journal of Systems and Software. 2013; 86(1): 100-107.
[5] Coppersmith Don. The Data Encryption Standard (DES) and its strength against attacks. IBM Journal
of Research and Development. 1994; 38(3): 243-250.
[6] Bashardoost, Morteza, MohdShafryMohd Rahim, Ayman Altameem, Amjad Rehman. A Novel
Approach to Enhance the Security of the LSB Image Steganography. Research Journal of Applied
Sciences, Engineering and Technology. 2014; 7(19): 3957-3963.
[7] Jain A. Pixel chaotic shuffling and Arnold map based Image Security Using Complex Wavelet
Transform. Journal of Network Communications and Emerging Technologies (JNCET). 2016; 6(5): 8-
11.
[8] Liu, Shubo, Jing Sun, ZhengquanXu. An improved image encryption algorithm based on chaotic
system. Journal of Computers. 2009; 4(11): 1091-1100.
[9] Alsafasfeh, Qais H, Aouda A. Arfoa. Image encryption based on the general approach for multiple
chaotic systems. Journal of Intelligent Learning Systems and Applications. 2011; 3(3): 238-244.
[10] Liu, Lingfeng, Suoxia Miao. A new image encryption algorithm based on logistic chaotic map with
varying parameter. SpringerPlus. 2016; 5(1): 1.
[11] Priya R. Sankpal, PA Vijaya. Image Encryption Using Chaotic Maps: A Survey. In Signal and Image
Processing (ICSIP), 2014 Fifth International Conference. 2014: 102-107.
[12] Somaya Al-Maadeed, Afnan Al-Ali, Turki Abdalla. A new chaos-based image-encryption and
compression algorithm. Journal of Electrical and computer Engineering. 2012: 15.
[13] Ali Soleymani, ZulkarnainMd Ali, Md Jan Nordin. A survey on principal aspects of secure image
transmission. World Academy of Science, Engineering and Technology. 2012; 66.
[14] ToshikiHabutsu, Yoshifumi Nishio, Iwao Sasase, Shinsaku Mori. A secret key cryptosystem by
iterating a chaotic map. In Workshop on the Theory and Application of Cryptographic Techniques.
Springer Berlin Heidelberg: 1991: 127-140.
[15] Franz Pichler, Josef Scharinger. Finite dimensional generalized baker dynamical systems for
cryptographic applications. In International Conference on Computer Aided Systems Theory. Springer
Berlin Heidelberg: 1995: 465-476.
[16] Naoki Masuda, Kazuyuki Aihar. Cryptosystems with discretized chaotic maps. IEEE Transactions on
Circuits and Systems I: Fundamental Theory and Applications. 2002; 49(1): 28-40.
[17] J-C, Yeo, J-I Guo. Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation.
IEE Proceedings-vision, image and signal processing. 2000; 147(2): 167-175.
[18] Yen JC, Guo JI. A new chaotic key-based design for image encryption and decryption. ISCAS, IEEE
International Symposium on Circuits and Systems. 2000; 4: 49-52.
[19] Chen Guanrong, Yaobin Mao, Charles K Chui. A symmetric image encryption scheme based on 3D
chaotic cat maps. Chaos, Solitons & Fractals. 2004; 21(3): 749-761.
[20] ShiguoLian, Jinsheng Sun, Zhiquan Wang. Security analysis of a chaos-based image encryption
algorithm. Physica A: Statistical Mechanics and its Applications. 2005; 351(2): 645-661.
[21] Image Encryption and Decryption of Digital Color Images. International Journal of information and
Education Technology. June 2011; 1(2): 137.
[22] Yupu Dong, Jiasheng Liu, Canyan Zhu, Yiming Wang. Image encryption algorithm based on chaotic
mapping. (ICCSIT), 2010 3rd IEEE International Conference. 2010; 1: 289-291.
[23] Qais H Alsafasfeh, Aouda A Arfoa. Image encryption based on the general approach for multiple
chaotic systems. Journal of Intelligent Learning Systems and Applications. 2011; 3(3): 238-244.
[24] Ling Wang, Qun Ye, Yaoqiang Xiao, YongxingZou, Bo Zhang. An image encryption scheme based on
cross chaotic map. Congress onImage and Signal Processing. 2008; 3: 22-26.
[25] ES El-Alfy, K Al-Utaibi. An Encryption Scheme for Color Images Based on Chaotic Maps and Genetic
Operators. The Seventh International Conference on Networking and Services. 2011: 92-97.
[26] K Sakthidasan, BV Santhosh Krishna. A new chaotic algorithm for image encryption and decryption of
digital color images. International Journal of Information and Education Technology. 2011; 1(2): 137-
141.
[27] Rui Liu, Xiaoping Tian. New Algorithm for Color Image Encryption Using Chaotic Map and Spatial Bit-
Level Permutation. Journal of Theoretical & Applied Information Technology. 2012; 43(1): 89-93.
[28] Ali Abdulgader, Mahamod Ismail, Nasharuddin Zainal, TarikIdbeaa. Enhancement of AES algorithm
based on chaotic maps and shift operation for image encryption. Journal of Theoretical and Applied
Information Technology. 2015; 71(1): 1-12.
[29] Abhinav Jain, ArjunVerma. Pixel chaotic shuffling and Arnold map based Image Security Using
Complex Wavelet Transform. Journal of Network Communications and Emerging Technologies
(JNCET). 2016; 6(5): pp. 8-11.
[30] HimanKhanzadi, Mohammad Eshghi, ShahramEtemadiBorujeni. Image encryption using random bit
sequence based on chaotic maps. Arabian Journal for Science and engineering. 2014; 39(2): 1039-
1047.
[31] Pecora, Louis M, Thomas L Carroll. Synchronization in chaotic systems. Physical review letters. 1990;
64(8): 821.
 ISSN: 2089-3191
Bulletin of EEI Vol. 6, No. 1, March 2017 : 99 – 104
104
[32] D Chattopadhyay, MK Mandal, D Nandi. Symmetric key chaotic image encryption using circle map.
Indian Journal of Science and Technology. 2011; 4(5): 593-599.
[33] Gonzalo Alvarez, Shujun Li. Some basic cryptographic requirements for chaos-based cryptosystems.
International Journal of Bifurcation and Chaos. 2006; 16(8): 2129-2151.
[34] L Gámez-Guzmán, C Cruz-Hernández, RM López-Gutiérrez, EE. Garcia-Guerrero. Synchronization of
multi-scroll chaos generators: application to private communication. Revistamexicana de física. 2008;
54(4): 299-305.
[35] L Gámez-Guzmán, C Cruz-Hernández, RM López-Gutiérrez, EE García-Guerrero. Synchronization of
Chua’s circuits with multi-scroll attractors: application to communication. Communications in Nonlinear
Science and Numerical Simulation. 2009; 14(6): 2765-2775.
[36] César Cruz-Hernández, Didier López-Mancilla, V García-Gradilla, H Serrano-Guerrero, R Núñez-
Pérez. Experimental realization of binary signals transmission using chaos. Journal of Circuits,
Systems, and Computers. 2005; 14(3): 453-468.
[37] Belmeguenaï Aïssa, Derouiche Nadir, Redjimi Mohamed. Image encryption using stream cipher
based on nonlinear combination generator with enhanced security. New Trends in Mathematical
Sciences. 2013; 1(1): 10-19.
[38] Ali ShakirMahmood, MohdShafryMohd Rahim, NurZuraifahSyazrah Othman. Implementation of the
Binary Random Number Generator Using the Knight Tour Problem. Modern Applied Science. 2016;
10(4): 35-46.
[39] Narendra K Pareek. Design and analysis of a novel digital image encryption scheme. International
Journal of Network Security & Its Applications (IJNSA). March 2012; 4(2): 95-108.
[40] Mohit Kumar, AnjuChahal. Effect of Encryption Technique and Size of Image on Correlation
Coefficient in Encrypted Image. International Journal of Computer Applications. 2014; 97(12): 23-27.
[41] Jamal N BaniSalameh, PO Mu'tah–Karak. An Investigation of the Use of MJEA in Image Encryption.
WSEAS TRANSACTIONS on COMPUTERS. 2016; 15: 12-23.
[42] T Sivakumar, R Venkatesan. A New Image Encryption Method Based on Knight’s Travel Path and
True Random Number. Journal of Information Science and Engineering. 2016; 32(1): 133-152.
BIOGRAPHIES OF AUTHORS
Sabah Fadhel Hamood
1. B. Sc. Physics Science – Al-Nahrain University / Baghdad – Iraq (1995)
2. High Diploma. Computer Since– National Computer Center / Baghdad Iraq(1999)
3. M. Sc. Computer Science – (UTM) / Johor Malaysia (2013)
Dr.Mohd Shafry Mohd Rahim
1. Ph.D (Spatial Modeling) (UPM)
2. M. Comp. Sci. (UTM)
3. B. Comp. Sci. (Computer Graphics) (UTM)
4. Dip. Comp. Sc. (UTM)
Omar FarookMohammado
1. B. Sc. Computer Science – University of Mosul / Mosul – Iraq (2005)
2. M. Sc. Computer Sciences – Hamdard University / New Delhi – India (2011)

More Related Content

What's hot

A hybrid security and compressive sensing based sensor data gathering scheme
A hybrid security and compressive sensing based sensor data gathering schemeA hybrid security and compressive sensing based sensor data gathering scheme
A hybrid security and compressive sensing based sensor data gathering schemeredpel dot com
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling cscpconf
 
Classification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computingClassification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computingeSAT Journals
 
AN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHMAN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHMIJNSA Journal
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionIRJET Journal
 
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region IJECEIAES
 
A FRACTAL BASED IMAGE CIPHER USING KNUTH SHUFFLE METHOD AND DYNAMIC DIFFUSION
A FRACTAL BASED IMAGE CIPHER USING KNUTH SHUFFLE METHOD AND DYNAMIC DIFFUSIONA FRACTAL BASED IMAGE CIPHER USING KNUTH SHUFFLE METHOD AND DYNAMIC DIFFUSION
A FRACTAL BASED IMAGE CIPHER USING KNUTH SHUFFLE METHOD AND DYNAMIC DIFFUSIONIJCNCJournal
 
Phase one image steganography_batu
Phase one image steganography_batuPhase one image steganography_batu
Phase one image steganography_batuABHIJEET KHIRE
 
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...IJCSIS Research Publications
 
Steganalysis of lsb matching steganography
Steganalysis of lsb matching steganographySteganalysis of lsb matching steganography
Steganalysis of lsb matching steganographyAnnsona Ansilon
 
Multi Object Tracking Methods Based on Particle Filter and HMM
Multi Object Tracking Methods Based on Particle Filter and HMMMulti Object Tracking Methods Based on Particle Filter and HMM
Multi Object Tracking Methods Based on Particle Filter and HMMIJTET Journal
 
Kernel based similarity estimation and real time tracking of moving
Kernel based similarity estimation and real time tracking of movingKernel based similarity estimation and real time tracking of moving
Kernel based similarity estimation and real time tracking of movingIAEME Publication
 

What's hot (16)

A hybrid security and compressive sensing based sensor data gathering scheme
A hybrid security and compressive sensing based sensor data gathering schemeA hybrid security and compressive sensing based sensor data gathering scheme
A hybrid security and compressive sensing based sensor data gathering scheme
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
Ijcatr04021016
Ijcatr04021016Ijcatr04021016
Ijcatr04021016
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
 
Classification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computingClassification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computing
 
AN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHMAN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHM
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
 
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region
 
Ay33292297
Ay33292297Ay33292297
Ay33292297
 
A FRACTAL BASED IMAGE CIPHER USING KNUTH SHUFFLE METHOD AND DYNAMIC DIFFUSION
A FRACTAL BASED IMAGE CIPHER USING KNUTH SHUFFLE METHOD AND DYNAMIC DIFFUSIONA FRACTAL BASED IMAGE CIPHER USING KNUTH SHUFFLE METHOD AND DYNAMIC DIFFUSION
A FRACTAL BASED IMAGE CIPHER USING KNUTH SHUFFLE METHOD AND DYNAMIC DIFFUSION
 
Phase one image steganography_batu
Phase one image steganography_batuPhase one image steganography_batu
Phase one image steganography_batu
 
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
 
Steganalysis of lsb matching steganography
Steganalysis of lsb matching steganographySteganalysis of lsb matching steganography
Steganalysis of lsb matching steganography
 
Multi Object Tracking Methods Based on Particle Filter and HMM
Multi Object Tracking Methods Based on Particle Filter and HMMMulti Object Tracking Methods Based on Particle Filter and HMM
Multi Object Tracking Methods Based on Particle Filter and HMM
 
50120140501016
5012014050101650120140501016
50120140501016
 
Kernel based similarity estimation and real time tracking of moving
Kernel based similarity estimation and real time tracking of movingKernel based similarity estimation and real time tracking of moving
Kernel based similarity estimation and real time tracking of moving
 

Similar to Chaos Image Encryption Methods: A Survey Study

Medical image encryption using multi chaotic maps
Medical image encryption using multi chaotic mapsMedical image encryption using multi chaotic maps
Medical image encryption using multi chaotic mapsTELKOMNIKA JOURNAL
 
A new four-dimensional hyper-chaotic system for image encryption
A new four-dimensional hyper-chaotic system for image encryption A new four-dimensional hyper-chaotic system for image encryption
A new four-dimensional hyper-chaotic system for image encryption IJECEIAES
 
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...sipij
 
Asymmetric image encryption scheme based on Massey Omura scheme
Asymmetric image encryption scheme based on Massey Omura scheme Asymmetric image encryption scheme based on Massey Omura scheme
Asymmetric image encryption scheme based on Massey Omura scheme IJECEIAES
 
Three Dimensional Chaotic System for Color Image Scrambling Algorithm
Three Dimensional Chaotic System for Color Image Scrambling AlgorithmThree Dimensional Chaotic System for Color Image Scrambling Algorithm
Three Dimensional Chaotic System for Color Image Scrambling AlgorithmIJCSIS Research Publications
 
Extended of TEA: A 256 bits block cipher algorithm for image encryption
Extended of TEA: A 256 bits block cipher algorithm for image encryption Extended of TEA: A 256 bits block cipher algorithm for image encryption
Extended of TEA: A 256 bits block cipher algorithm for image encryption IJECEIAES
 
Hybrid chaos-based image encryption algorithm using Chebyshev chaotic map wit...
Hybrid chaos-based image encryption algorithm using Chebyshev chaotic map wit...Hybrid chaos-based image encryption algorithm using Chebyshev chaotic map wit...
Hybrid chaos-based image encryption algorithm using Chebyshev chaotic map wit...IJECEIAES
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET Journal
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplicationijcsit
 
37de29c2ae88c046317fcfbebd7a66784874
37de29c2ae88c046317fcfbebd7a6678487437de29c2ae88c046317fcfbebd7a66784874
37de29c2ae88c046317fcfbebd7a66784874hemant gupta
 
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...IJERA Editor
 
Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...Akash Rawat
 
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...CSCJournals
 
New Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image EncryptionNew Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image Encryptiontayseer Karam alshekly
 
Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF irjes
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...CSCJournals
 

Similar to Chaos Image Encryption Methods: A Survey Study (20)

Medical image encryption using multi chaotic maps
Medical image encryption using multi chaotic mapsMedical image encryption using multi chaotic maps
Medical image encryption using multi chaotic maps
 
A new four-dimensional hyper-chaotic system for image encryption
A new four-dimensional hyper-chaotic system for image encryption A new four-dimensional hyper-chaotic system for image encryption
A new four-dimensional hyper-chaotic system for image encryption
 
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
 
Asymmetric image encryption scheme based on Massey Omura scheme
Asymmetric image encryption scheme based on Massey Omura scheme Asymmetric image encryption scheme based on Massey Omura scheme
Asymmetric image encryption scheme based on Massey Omura scheme
 
Thesis Background
Thesis BackgroundThesis Background
Thesis Background
 
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
 
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
 
Three Dimensional Chaotic System for Color Image Scrambling Algorithm
Three Dimensional Chaotic System for Color Image Scrambling AlgorithmThree Dimensional Chaotic System for Color Image Scrambling Algorithm
Three Dimensional Chaotic System for Color Image Scrambling Algorithm
 
Extended of TEA: A 256 bits block cipher algorithm for image encryption
Extended of TEA: A 256 bits block cipher algorithm for image encryption Extended of TEA: A 256 bits block cipher algorithm for image encryption
Extended of TEA: A 256 bits block cipher algorithm for image encryption
 
Hybrid chaos-based image encryption algorithm using Chebyshev chaotic map wit...
Hybrid chaos-based image encryption algorithm using Chebyshev chaotic map wit...Hybrid chaos-based image encryption algorithm using Chebyshev chaotic map wit...
Hybrid chaos-based image encryption algorithm using Chebyshev chaotic map wit...
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
 
37de29c2ae88c046317fcfbebd7a66784874
37de29c2ae88c046317fcfbebd7a6678487437de29c2ae88c046317fcfbebd7a66784874
37de29c2ae88c046317fcfbebd7a66784874
 
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
 
Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...
 
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
 
New Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image EncryptionNew Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image Encryption
 
Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
 

More from journalBEEI

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherjournalBEEI
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksjournalBEEI
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkjournalBEEI
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headjournalBEEI
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...journalBEEI
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)journalBEEI
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...journalBEEI
 

More from journalBEEI (20)

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipher
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networks
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural network
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithm
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antenna
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human head
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting application
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentation
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...
 

Recently uploaded

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 

Recently uploaded (20)

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 

Chaos Image Encryption Methods: A Survey Study

  • 1. Bulletin of Electrical Engineering and Informatics ISSN: 2302-9285 Vol. 6, No. 1, March 2017, pp. 99~104, DOI: 10.11591/eei.v6i1.599  99 Received December 11, 2016; Revised February 11, 2017; Accepted February 25, 2017 Chaos Image Encryption Methods: A Survey Study Sabah Fadhel 1* , Mohd Shafry 2 , Omar Farook 3 1, 3 Faculty of Computing-Universiti Teknologi Malaysia (UTM), Skudai, Johor, Malaysia 2 IRDA Digital Media Center, IHCE-Universiti Teknologi Malaysia (UTM) *Corresponding author, email: sabahuqaidy@yahoo.com * Abstract With increasing dependence on communications over internet and networks, secure data transmission is coming under threat. One of the best solutions to ensure secure data transmissions is encryption. Multiple forms of data, such as text, audio, image, and video can be digitally transmitted, nowadays images being the most popular and old encryption techniques such as: AES, DES, RSA etc., show low security level when used for image encryption. This problem was resolved by using of chaos encryption which is an acceptable form of encryption for image data. The sensitivity to initial conditions and control parameters make chaos encryption suitable for image applications. This study discusses various chaos encryption techniques. Keywords: chaos, initial conditions, control parameters, map, permutation 1. Introduction Multimedia technology, especially image technology is currently undergoing rapid change and growth [6] due to increased adoption of internet communications [1]. Current encryption techniques, such as AES, DES, and RSA are unsuitable for image data encrypting and cannot guarantee data confidentiality and security [2] because of the size and redundancy of images [3-5]. Over the last couple of decades numerous techniques have been proposed for encrypting image data, of which Chaos based encryption has been proven to be the most effective [7]. Chaos theory was first proposed in the 1970’s for use in physics, mathematics, biology and engineering. It would not be until the 1980’s that chaos theory was found to have cryptographic applications [8]. Chaos based encryption methods are popular due to their randomness, unpredictability, sensitivity and topological transitivity [9-10]. Literature review that has been done author used in the chapter "Introduction" to explain the difference of the manuscript with other papers, that it is innovative, it are used in the chapter "Research Method" to describe the step of research and used in the chapter "Results and Discussion" to support the analysis of the results [2]. If the manuscript was written really have high originality, which proposed a new method or algorithm, the additional chapter after the "Introduction" chapter and before the "Research Method" chapter can be added to explain briefly the theory and/or the proposed method/algorithm [4]. 2. Chaos Theory A chaotic dynamical system is any deterministic system that is both highly random and sensitive to initial conditions [11]. Chaotic systems are similar to noisy systems because both are highly unpredictable. Chaotic systems have uses in cryptography because they are pseudorandom, unpredictable and sensitive to initial condition (starting point) and control parameters [1]. Chaotic systems are useful for encryption because they appear to be random data and their sensitivity to initial conditions allows for this randomness to be unpredicted, allowing a basis for decryption [12]. The main difference between chaos maps and chaos cryptography is that chaos cryptography is defined by finite sets, while chaos maps are defined by real numbers, as is shown in Table 1 [11]. Each chaos map has its own parameters and encryption key.
  • 2.  ISSN: 2089-3191 Bulletin of EEI Vol. 6, No. 1, March 2017 : 99 – 104 100 Table 1. Illustrate the Differences and Similarities Between Chaotic System and Cryptography Algorithm Chaotic System Cryptography Algorithm Sensitive to the initial conditions and control parameters Diffusion Iterations Rounds Parameters Key Set of real numbers Finite set of integer numbers Chaos maps can be applied by the use of chaotic systems to generate a pseudorandom key or the generation from a key or plain text. Generation from a pseudorandom key produces a stream cipher and generation from plain text produces a block cipher [13]. 3. Chaos-Based General Image Encryption Scheme Many data encryption methods use chaotic maps [14-20] because it is widely applicable and easy to understand. Chaotic based image encryption occurs in two stages, confusion and diffusion. Figure 1. 1Illustrates a Chaos-Based Image Encryption General Scheme In the confusion stage, an image’s pixels are scrambled using a secret key based upon control parameters. While in the diffusion stage, pixel values are changed using chaotically generated sequences. Both these methods make chaotic encryption highly secure [21]. Figure 1 illustrates the chaotic encryption process. 4. Different Chaos-Based Encryption Techniques [22] Proposed an image-scrambling algorithm that made use of chaotic mapping by encaging each pair of pixels in an image with counterparts in the same image. Pixels are exchanged using a scrambling matrix that is generated from logistic map principles. The proposed algorithm is both simple and efficient. The proposed algorithm was evaluated using a correlation algorithm that indicated the relationship between the degree of scrambling and the scrambling numbers. From our view point the key space of proposed algorithm is not satisfy the security requirement, because it is smaller than the acceptable one. Therefore the transmission of ciphered image will be threatened by brute force attack. In the algorithm proposed by [23], both a Rössler chaotic system and a Lorenz chaotic system are used for encryption. The use of two or more chaotic systems in an algorithm is highly unusual. Long-term chaotic behavior is periodic and dependent on initial variables [24]. Both of Rössler and Lorenz schemes are each dependent on three variables, make increasing in the security of proposed chaotic system, because of the total parameters number dependent on six variables, making it highly secure. This algorithm shuffles an image’s pixels and changes its grayscale values for a set number of iterations before storing the randomized image data in a chaotic matrix the same size as the original image. XOR operations are used for both encryption and decryption. From our view point the key space of the proposed algorithm is good in terms of
  • 3. Bulletin of EEI ISSN: 2302-9285  Chaos Image Encryption Methods: A Survey Study (Sabah Fadhel) 101 increasing the total number of initial parameters to six instead of three for each chaotic system; also the correlation of resulted ciphered image is better. [25] Proposed an encryption method for colored images using a genetic operator and a chaotic map to minimize the correlation coefficient of adjacent pixels. The proposed algorithm has four steps. First, a logistical map is used to generate four different chaotic sequences by using of four control parameters and four initial values to act as shared keys for the encryption process. Second, quantification, which used to mapped the four sequences into key streams for use in the remaining phases. Third, a crossover used to confuse the image row-by-row and column-by-column. Fourth, a mutation phase used to implement XOR operator between the intermediate image (resulted from crossover stage) and random image. From our view point the proposed image is good in both of correlation coefficient and key space size. Therefore, it highly resist against the brute force attack. New image encryption scheme based on one of three chaotic systems (Lorenz, Chen or Lu) was proposed by [26] to shuffle the positions of images’ pixels by selecting a chaotic system based on a 16-byte key length. Another chaotic system is used to create a chaotic map to disturb the relationship between the encrypted image and the original image. From our view point, the proposed scheme produces large key space and good results in terms of the resulted correlation coefficient. A new image encryption scheme was proposed by [2] using a combination of W7 and pixel shuffling. A chaotic Henon map is used to generate a permutation matrix using W7 as a secret key and for initial conditions. Pixels shuffling was achieved using horizontal and vertical permutations. Pixel correlations were scattered using a shuffling process. From our view point the proposed scheme has long key space; therefore it is good in brute force resistance. Also it shows good resistance against statistical attack. A colored image encryption algorithm based on chaotic map and spatial bit-level permutations (SBLP) was proposed by [27]. Image pixel positions were shuffled using a sequence generated from a chaotic logistical map before the shuffled image is transformed into binary matrix. A permutation of the binary matrix is created by scrambling the map generated from the (SBLP) process. A second sequence was generated from a chaotic logistical map to rearrange the new images pixel positions. From our view point, the proposed algorithm is robust against brute force attack because of suitable size of key space also it deal with bit level permutation. Also because of low complexity ant fast implementation time the proposed algorithm can be used in surveillance video systems. An Enhancement of Advanced Encryption Standard (AES) was proposed by [28]. AES has many drawbacks such as high computational costs, predictable patterns and fixed S-box weak points. The proposed algorithm mitigates these drawbacks using a chaotic map and a XOR operator. The proposed method was tested by using several images and the results show very small correlation coefficients, improved encryption speed and high security. From our view point the proposed algorithm show good adaption for AES algorithm to be implemented in image encryption field. To reduce the complexity of image encryption, [29] proposed a scheme based on dual- tree complex wavelet transformations (DT-CWT).First stage in this scheme is to transform plain image using wavelet transformation, then a pixel chaotic scrambling is used for approximation and an Arnold transformation is used for the details. From our view point the proposed scheme is suitable, in terms of the key space and correlation coefficient. An algorithm for generating random bit sequences based on chaotic maps was proposed by [30]. This algorithm uses random bit sequence generated from tent and chaotic logistic maps. The permutation of plain image pixels was done by these chaotic functions, after which the image was divided into eight-bit map planes. Bits were replaced by another bits value according to a chaotic ergodic matrix. From our view point the performance of this algorithm is good in terms of both key sensitivity and key space. Therefore this algorithm is highly resist against brute force attack and statistical attack. 5. Performance Analysis Of Chaotic Cryptography Systems After Pecora and Carroll discovered synchronization in chaotic systems in 1990 [31], chaotic dynamics has received significant attention due to its use in securing communications
  • 4.  ISSN: 2089-3191 Bulletin of EEI Vol. 6, No. 1, March 2017 : 99 – 104 102 [33-35]. Chaotic signal encoding was first used in 1990 [36]. Some of the most important ways that the strength of chaotic encryption methods has been evaluated are [13], [32]: 5.1. Key Sensitivity Analysis The use of a secret key for encryption produces strong encryption, as any change in the secret key produces another encrypted image. Secure image cryptosystems makes use of secret keys to evaluate the robustness of an encryption scheme. In a cryptosystem, an image cannot be decrypted if there is any difference between the encryption and decryption keys [37]. In a strong encryption algorithm, key sensitivity should be greater than 50% [38]. 5.2. Key Space Analysis Key space is the number of attempts necessary to guess a correct decryption key. Strong encryption should have an encryption key no smaller than 2 100 [39], with the exponent indicating the number of bits in a key. Large encryption keys provide greater security against brute force attacks [1]. 5.3. Correlation Coefficient Analysis The correlation coefficient measures similarities between a plain or an encrypted images pixels in the horizontal, vertical and diagonal directions. In a plain image, the correlation coefficient should be high. In an encrypted image, a smaller correlation coefficient indicates higher security [40]. Smaller correlation coefficients are produced from the confusion and diffusion methods. 5.4. Statistical Analysis Statistical analysis is the most common cryptanalysis technique, and it is used to measure the relationship between a plain image and a ciphered image. Strong cryptographic techniques, when statistically analyzed, show large differences between the plain and ciphered image. 5.5. Image Entropy Analysis Entropy is used to measure uncertain associations between random variables [41]. A grayscale image has a theoretical entropy value of 8 Sh, or bits. Image encryption algorithms should produce an encrypted image with an entropy value similar to grayscale values [42]. The closer an encrypted images’ entropy value is to 8 Sh, the more robust it is against entropy- based attacks. 6. Conclusion The expansion of the internet and digital communications has increased the need for data protection. The high usage of images for communication means that secure image encryption is necessary. Chaotic based image encryption is one of the best ways to encrypt an image file. In this study, multiple chaotic image encryption methods are discussed and evaluated. Image security can be increased through the application of multiple chaotic image encryption methods. Acknowledgements Sabah Fadhel is grateful to the ministry of Sciences and Technology (Baghdad-Iraq), for providing study leave to continue his (Ph. D.). References [1] Sankpal, Priya R, PA Vijaya. Image Encryption Using Chaotic Maps: A Survey. Signal and Image Processing (ICSIP). Fifth International Conference on. IEEE, Jan 8 2014: 102-107. [2] Jolfaei Alireza, AbdolrasoulMirghadri. An image encryption approach using chaos and stream cipher. Journal of Theoretical and Applied Information Technology. 2010; 19(2): 117-125. [3] Wang, Xingyuan, Lin Teng, Xue Qin. A novel colour image encryption algorithm based on chaos. Signal Processing. 2012; 92(4): 1101-1108.
  • 5. Bulletin of EEI ISSN: 2302-9285  Chaos Image Encryption Methods: A Survey Study (Sabah Fadhel) 103 [4] Chen, Caisen, Tao Wang, Yingzhan Kou, Xiaocen Chen, Xiong Li. Improvement of trace-driven I- Cache timing attack on the RSA algorithm. Journal of Systems and Software. 2013; 86(1): 100-107. [5] Coppersmith Don. The Data Encryption Standard (DES) and its strength against attacks. IBM Journal of Research and Development. 1994; 38(3): 243-250. [6] Bashardoost, Morteza, MohdShafryMohd Rahim, Ayman Altameem, Amjad Rehman. A Novel Approach to Enhance the Security of the LSB Image Steganography. Research Journal of Applied Sciences, Engineering and Technology. 2014; 7(19): 3957-3963. [7] Jain A. Pixel chaotic shuffling and Arnold map based Image Security Using Complex Wavelet Transform. Journal of Network Communications and Emerging Technologies (JNCET). 2016; 6(5): 8- 11. [8] Liu, Shubo, Jing Sun, ZhengquanXu. An improved image encryption algorithm based on chaotic system. Journal of Computers. 2009; 4(11): 1091-1100. [9] Alsafasfeh, Qais H, Aouda A. Arfoa. Image encryption based on the general approach for multiple chaotic systems. Journal of Intelligent Learning Systems and Applications. 2011; 3(3): 238-244. [10] Liu, Lingfeng, Suoxia Miao. A new image encryption algorithm based on logistic chaotic map with varying parameter. SpringerPlus. 2016; 5(1): 1. [11] Priya R. Sankpal, PA Vijaya. Image Encryption Using Chaotic Maps: A Survey. In Signal and Image Processing (ICSIP), 2014 Fifth International Conference. 2014: 102-107. [12] Somaya Al-Maadeed, Afnan Al-Ali, Turki Abdalla. A new chaos-based image-encryption and compression algorithm. Journal of Electrical and computer Engineering. 2012: 15. [13] Ali Soleymani, ZulkarnainMd Ali, Md Jan Nordin. A survey on principal aspects of secure image transmission. World Academy of Science, Engineering and Technology. 2012; 66. [14] ToshikiHabutsu, Yoshifumi Nishio, Iwao Sasase, Shinsaku Mori. A secret key cryptosystem by iterating a chaotic map. In Workshop on the Theory and Application of Cryptographic Techniques. Springer Berlin Heidelberg: 1991: 127-140. [15] Franz Pichler, Josef Scharinger. Finite dimensional generalized baker dynamical systems for cryptographic applications. In International Conference on Computer Aided Systems Theory. Springer Berlin Heidelberg: 1995: 465-476. [16] Naoki Masuda, Kazuyuki Aihar. Cryptosystems with discretized chaotic maps. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications. 2002; 49(1): 28-40. [17] J-C, Yeo, J-I Guo. Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation. IEE Proceedings-vision, image and signal processing. 2000; 147(2): 167-175. [18] Yen JC, Guo JI. A new chaotic key-based design for image encryption and decryption. ISCAS, IEEE International Symposium on Circuits and Systems. 2000; 4: 49-52. [19] Chen Guanrong, Yaobin Mao, Charles K Chui. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals. 2004; 21(3): 749-761. [20] ShiguoLian, Jinsheng Sun, Zhiquan Wang. Security analysis of a chaos-based image encryption algorithm. Physica A: Statistical Mechanics and its Applications. 2005; 351(2): 645-661. [21] Image Encryption and Decryption of Digital Color Images. International Journal of information and Education Technology. June 2011; 1(2): 137. [22] Yupu Dong, Jiasheng Liu, Canyan Zhu, Yiming Wang. Image encryption algorithm based on chaotic mapping. (ICCSIT), 2010 3rd IEEE International Conference. 2010; 1: 289-291. [23] Qais H Alsafasfeh, Aouda A Arfoa. Image encryption based on the general approach for multiple chaotic systems. Journal of Intelligent Learning Systems and Applications. 2011; 3(3): 238-244. [24] Ling Wang, Qun Ye, Yaoqiang Xiao, YongxingZou, Bo Zhang. An image encryption scheme based on cross chaotic map. Congress onImage and Signal Processing. 2008; 3: 22-26. [25] ES El-Alfy, K Al-Utaibi. An Encryption Scheme for Color Images Based on Chaotic Maps and Genetic Operators. The Seventh International Conference on Networking and Services. 2011: 92-97. [26] K Sakthidasan, BV Santhosh Krishna. A new chaotic algorithm for image encryption and decryption of digital color images. International Journal of Information and Education Technology. 2011; 1(2): 137- 141. [27] Rui Liu, Xiaoping Tian. New Algorithm for Color Image Encryption Using Chaotic Map and Spatial Bit- Level Permutation. Journal of Theoretical & Applied Information Technology. 2012; 43(1): 89-93. [28] Ali Abdulgader, Mahamod Ismail, Nasharuddin Zainal, TarikIdbeaa. Enhancement of AES algorithm based on chaotic maps and shift operation for image encryption. Journal of Theoretical and Applied Information Technology. 2015; 71(1): 1-12. [29] Abhinav Jain, ArjunVerma. Pixel chaotic shuffling and Arnold map based Image Security Using Complex Wavelet Transform. Journal of Network Communications and Emerging Technologies (JNCET). 2016; 6(5): pp. 8-11. [30] HimanKhanzadi, Mohammad Eshghi, ShahramEtemadiBorujeni. Image encryption using random bit sequence based on chaotic maps. Arabian Journal for Science and engineering. 2014; 39(2): 1039- 1047. [31] Pecora, Louis M, Thomas L Carroll. Synchronization in chaotic systems. Physical review letters. 1990; 64(8): 821.
  • 6.  ISSN: 2089-3191 Bulletin of EEI Vol. 6, No. 1, March 2017 : 99 – 104 104 [32] D Chattopadhyay, MK Mandal, D Nandi. Symmetric key chaotic image encryption using circle map. Indian Journal of Science and Technology. 2011; 4(5): 593-599. [33] Gonzalo Alvarez, Shujun Li. Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos. 2006; 16(8): 2129-2151. [34] L Gámez-Guzmán, C Cruz-Hernández, RM López-Gutiérrez, EE. Garcia-Guerrero. Synchronization of multi-scroll chaos generators: application to private communication. Revistamexicana de física. 2008; 54(4): 299-305. [35] L Gámez-Guzmán, C Cruz-Hernández, RM López-Gutiérrez, EE García-Guerrero. Synchronization of Chua’s circuits with multi-scroll attractors: application to communication. Communications in Nonlinear Science and Numerical Simulation. 2009; 14(6): 2765-2775. [36] César Cruz-Hernández, Didier López-Mancilla, V García-Gradilla, H Serrano-Guerrero, R Núñez- Pérez. Experimental realization of binary signals transmission using chaos. Journal of Circuits, Systems, and Computers. 2005; 14(3): 453-468. [37] Belmeguenaï Aïssa, Derouiche Nadir, Redjimi Mohamed. Image encryption using stream cipher based on nonlinear combination generator with enhanced security. New Trends in Mathematical Sciences. 2013; 1(1): 10-19. [38] Ali ShakirMahmood, MohdShafryMohd Rahim, NurZuraifahSyazrah Othman. Implementation of the Binary Random Number Generator Using the Knight Tour Problem. Modern Applied Science. 2016; 10(4): 35-46. [39] Narendra K Pareek. Design and analysis of a novel digital image encryption scheme. International Journal of Network Security & Its Applications (IJNSA). March 2012; 4(2): 95-108. [40] Mohit Kumar, AnjuChahal. Effect of Encryption Technique and Size of Image on Correlation Coefficient in Encrypted Image. International Journal of Computer Applications. 2014; 97(12): 23-27. [41] Jamal N BaniSalameh, PO Mu'tah–Karak. An Investigation of the Use of MJEA in Image Encryption. WSEAS TRANSACTIONS on COMPUTERS. 2016; 15: 12-23. [42] T Sivakumar, R Venkatesan. A New Image Encryption Method Based on Knight’s Travel Path and True Random Number. Journal of Information Science and Engineering. 2016; 32(1): 133-152. BIOGRAPHIES OF AUTHORS Sabah Fadhel Hamood 1. B. Sc. Physics Science – Al-Nahrain University / Baghdad – Iraq (1995) 2. High Diploma. Computer Since– National Computer Center / Baghdad Iraq(1999) 3. M. Sc. Computer Science – (UTM) / Johor Malaysia (2013) Dr.Mohd Shafry Mohd Rahim 1. Ph.D (Spatial Modeling) (UPM) 2. M. Comp. Sci. (UTM) 3. B. Comp. Sci. (Computer Graphics) (UTM) 4. Dip. Comp. Sc. (UTM) Omar FarookMohammado 1. B. Sc. Computer Science – University of Mosul / Mosul – Iraq (2005) 2. M. Sc. Computer Sciences – Hamdard University / New Delhi – India (2011)