Call for Paper - September 2022 Edition
IJCA solicits original research papers for the September 2022 Edition. Last date of manuscript submission is August 22, 2022. Read More

An Improved Cryptography Scheme for Secure Image Communication

International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 67 - Number 18
Year of Publication: 2013
Bhaskar Mondal
Akash Priyadarshi
D. Hariharan

Bhaskar Mondal, Akash Priyadarshi and D Hariharan. Article: An Improved Cryptography Scheme for Secure Image Communication. International Journal of Computer Applications 67(18):23-27, April 2013. Full text available. BibTeX

	author = {Bhaskar Mondal and Akash Priyadarshi and D. Hariharan},
	title = {Article: An Improved Cryptography Scheme for Secure Image Communication},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {67},
	number = {18},
	pages = {23-27},
	month = {April},
	note = {Full text available}


The traditional chaos algorithm is based on the logistic maps and has some drawbacks. In order to enhance the security, improved chaos system is used. It is based on location Transform and pixel value alteration using random sequence. The proposed algorithm shuffles the image based on the chaotic sequence and change the value of each pixel. The key generates 16 chaotic sequences from given sequence using a secret look-up matrix. Key used for encryption improves efficiency by acting on n sub-parts of image. The Matlab is used for simulation of image encryption algorithm. The algorithm's safety is analyzed from different aspects such as histogram comparison, correlation coefficient and secret key sensitivity. The algorithm proposed is robust against statistical attack, brute force attack and plain text attack.


  • Philip P. Dang and Paul M. Chau. Image Encryption for Secure Internet Multimedia Applications [J]. IEEE Transactions on consumer electronics 2000, 395-443.
  • HuaZhong Based on the chaotic image encryption technology research [D]. Changsha Polytechnic University, Master's Thesis, Hunan, Changsha, 5-6.
  • R. A. J. Matthews. On the derivation of a chaotic encryption algorithm [J]. Cryptologia. 1989, 13(1): 29- 42.
  • Fredrich J. Image Encryption Based on Chaotic Maps[C] , IEEE , 1997 , 1105-1110.
  • T. Habutsu, Y. Nishio, I. Sasase, et al. A secret cryptosystem by iterating a chaotic map [A]. Advances in Cryptology EURCRYPT'91[C]. Berlin: Springer-Verlag. 1991:127-140.
  • Zhang Han, Wang XiuFenget al. A new image encryption algorithm based on chaos system[C]. Proc. IEEEInt. Conf. Robotics, Intelligent Systems and Signal Processing. Changsha, China, October 2003:778-782.
  • Ellis Horowitz, SartajSahni, and Dinesh Mehta. Fundamentals of Data Structures in C++[M]. W H Freeman , NY. 1995.
  • Ai-hong Zhu and Lian Liu. Improving for chaos Image Encryption Algorithm based on logistic maps[C]. Environmental Science and Information Application Technology (ESIAT), 2010 International Conference. Page(s): c1 - c4
  • Shannon CE. Communication theory of security systems [J]. the Bell System Tech J, 1949,28, pp. 656-715.
  • Zhang Jun, Li Jinping, Wang Luqian. A New Compound Chaos Encryption Algorithm for Digital Images[C]. Information Technology and Applications (IFITA), 2010 International Forum. 2010 , Page(s): 277 – 279