Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

A Novel Encryption Scheme based on Piecewise Linear Chaotic Maps for Multimedia Data

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 95 - Number 7
Year of Publication: 2014
Vikas Mittal

Vikas Mittal. Article: A Novel Encryption Scheme based on Piecewise Linear Chaotic Maps for Multimedia Data. International Journal of Computer Applications 95(7):6-11, June 2014. Full text available. BibTeX

	author = {Vikas Mittal},
	title = {Article: A Novel Encryption Scheme based on Piecewise Linear Chaotic Maps for Multimedia Data},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {95},
	number = {7},
	pages = {6-11},
	month = {June},
	note = {Full text available}


In recent years, many multimedia and image encryption techniques based on chaotic maps have been proposed. In this paper, we propose a novel multimedia data encryption technique called MDEA (Multimedia Data Encryption Algorithm). Proposed encryption scheme is based on two digital chaotic maps, which in turn are used to generate two different chaotic sequences. Detail description of the proposed encryption technique and performance analysis of MDEA on various parameters of security is given in later sections of this paper.


  • H. C. Chen, J. I. Guo, L. C. Huang, and J. C. Yen, "Design and realization of a new signal security system for multimedia data transmission," EURASIP Journal of Applied Signal Processing. vol. 2003, no. 13, pp. 1291–1305, 2003.
  • N. K. Pareek, Vinod Patidar, "Image encryption using chaotic logistic map", Image and Vision Computing 24 (2006) 926–934.
  • J. C. Yen and J. I. Guo, "Design of a new signal security system," in Proc. IEEE International Symposium on Circuits and Systems (ISCAS '02), vol. 4, pp. 121–124, Scottsdale, Ariz, USA, May 2002.
  • J. C. Yen and J. I. Guo, "A new image encryption algorithm and its VLSI architecture," In Proceedings IEEE Workshop on Signal Processing Systems (SiPS '99), pages. 430–437, Taipei, Taiwan, October 1999.
  • K. L. Chung and L. C. Chang, "Large encrypting binary images with Higher security," Pattern Recognition Letters, vol. 19, no. 5-6, pages 461–468, 1998.
  • N. Bourbakis and C. Alexopoulos, "Picture data encryption using scan patterns," Pattern Recognition, vol. 25, no. 6, pp. 567–581, 1992.
  • C. Alexopoulos, N. Bourbakis, and N. Ioannou, "Image encryption method using a class of fractals," J. of Electronic Imaging, vol. 4, no. 3, pp. 251–259, 1995. Australia, December 2000.
  • Li Shujun, "Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems," IJBC, vol. 16, no. 8, pages 2129-2151, 2006.
  • Coppersmith, D. "The Data Encryption Standard and Its Strength Against Attacks. " IBM journal Of Research and Development, May 1994.
  • Rivest, R. ; Shamir, A. ; and Adleman, L. "A Method for Obtaining Digital Signatures and Public Key Cryptosystems. " Communications of ACM, February 1978.
  • Daemen, J. , and Rijmen, V. "Rijndael: The Advanced Encryption Standard. "Dr. Dobb's Journal, March 2001.
  • William Stallings, " Cryptography and Network Security, Principles and Practices", third edition.