Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

Image Encryption using Modified 4 out of 8 Code and Chaotic Map

International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 74 - Number 11
Year of Publication: 2013
Sunil Kumar K. M
Anand U. Hiremath

Sunil Kumar K M, Kiran and Anand U Hiremath. Article: Image Encryption using Modified 4 out of 8 Code and Chaotic Map. International Journal of Computer Applications 74(11):1-6, July 2013. Full text available. BibTeX

	author = {Sunil Kumar K. M and Kiran and Anand U. Hiremath},
	title = {Article: Image Encryption using Modified 4 out of 8 Code and Chaotic Map},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {74},
	number = {11},
	pages = {1-6},
	month = {July},
	note = {Full text available}


Recently, several image encryption schemes based on chaotic maps have been proposed. Most of them hinder the system performance, security, and suffer from the small key space problem. This paper presents a image encryption using modified 4 out of 8 code and chaotic map. Generally image encryption involves permutation and substitution network. Here permutation is done by using chaotic map and using modified 4 out of 8 code carrier image is generated with the help of alpha-numeric keywords and also special characters. Substitution done by performing XOR operation between permuted image and carrier image to get a encrypted image. Simulations have been carried out and the results demonstrate the superior security and high efficiency of the proposed scheme.


  • Zhi-liang Zhu , Wei Zhang, Kwok-wo Wong , Hai Yu ,A chaos-based symmetric image encryption scheme using a bit-level permutation,Information Sciences 181 (2011) 11711186.
  • G. A. Sathish Kumar , K. Bhoopathy Bagan, V. Vivekanand, A Novel algorithm for image encryption by integrated pixel scrambling plus diffusion [IISPD] utilizing duo chaos mapping applicability in wireless systems,Procedia Computer Science 3 (2011) 378387.
  • Prasanna SRM , An image encryption method with magnitude and phase manipulation using carrier images, IJCS 1(2):132137.
  • A. Kumar, M. K. Ghose, Communications in Nonlinear Science and Numerical Simulation 16 (2011) 372.
  • Ahmed A. Abd El-Latif , Xiamu Niu, A hybrid chaotic system and cyclic elliptic curve for image encryption Int. J. Electron. Commun. (AE) (2012). http://dx. doi. org/10. 1016/j. aeue. 2012. 07. 004.
  • Panduranga H. T, Naveenkumar S. K,A novel image encryption method using 4outof8 code, proc. CommV09, pp 460 - 462, 2009.
  • ZhiZhong, Double image encryption using double pixel scrambling and random phase encoding,Optics Communications 285 (2012) 584588.
  • Narendra K Pareek,Design and analysis of a novel digital image encryption scheme, IJNSA, Vol. 4, No. 2, March 2012, pp. 95-108.
  • YueWu, Joseph P. Noonan, Shannon Entropy based Randomness Measurement and Test for Image Encryption Information Sciences 00 (2011) 123
  • Yue Wu, Joseph P. Noonan, and Sos Agaian, NPCR and UACI Randomness Tests for Image Encryption Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), April Edition, 2011.