CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Survey of Chaos based Image Encryption and Decryption Techniques

Published on January 2013 by Ephin M, Judy Ann Joy, N. A. Vasanthi
Amrita International Conference of Women in Computing - 2013
Foundation of Computer Science USA
AICWIC - Number 2
January 2013
Authors: Ephin M, Judy Ann Joy, N. A. Vasanthi
6887c7da-ed6a-4ce6-8e15-fad4bd880839

Ephin M, Judy Ann Joy, N. A. Vasanthi . Survey of Chaos based Image Encryption and Decryption Techniques. Amrita International Conference of Women in Computing - 2013. AICWIC, 2 (January 2013), 1-5.

@article{
author = { Ephin M, Judy Ann Joy, N. A. Vasanthi },
title = { Survey of Chaos based Image Encryption and Decryption Techniques },
journal = { Amrita International Conference of Women in Computing - 2013 },
issue_date = { January 2013 },
volume = { AICWIC },
number = { 2 },
month = { January },
year = { 2013 },
issn = 0975-8887,
pages = { 1-5 },
numpages = 5,
url = { /proceedings/aicwic/number2/9866-1308/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Amrita International Conference of Women in Computing - 2013
%A Ephin M
%A Judy Ann Joy
%A N. A. Vasanthi
%T Survey of Chaos based Image Encryption and Decryption Techniques
%J Amrita International Conference of Women in Computing - 2013
%@ 0975-8887
%V AICWIC
%N 2
%P 1-5
%D 2013
%I International Journal of Computer Applications
Abstract

Nowadays security becomes an important issue of communication and storage of images. One of the method used to ensure the high security of images is encryption. Images are used in many fields such as biometric authentication, medical science, military; they are stored or transferred through the network and the security of such image data is important. Due to some intrinsic features of the images, such as bulk data capacity and high correlation among pixels the earlier encryption techniques such as AES, DES, RSA, etc are not suitable for practical applications. The latest trend in encryption is chaos based. It has many unique characteristics such as the sensitive dependence on initial conditions, nonperiodicity, nonconvergence, and control parameters. In this paper survey of different chaos-based image encryption techniques has been discussed.

References
  1. Chen, L. , & Zhao, D. 2008. Image encryption with fractional wavelet packet method. Optik-International Journal for Light and Electron Optics, 119(6), 286-291.
  2. Gao, H. , Zhang, Y. , Liang, S. , & Li, D. 2006. A new chaotic algorithm for image encryption. Chaos, Solitons & Fractals, 29(2), 393-399
  3. Sun, F. , Liu, S. , Li, Z. , & Lü, Z. 2008. A novel image encryption scheme based on spatial chaos map. Chaos, Solitons & Fractals, 38(3), 631-640.
  4. Pareek, N. K. , Patidar, V. , & Sud, K. K. 2006. Image encryption using chaotic logistic map. Image and Vision Computing, 24(9), 926-934.
  5. Chen, G. , Mao, Y. , & Chui, C. K. 2004. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals, 21(3), 749-761
  6. Mao, Y. , Chen, G. , & Lian, S. 2004. A novel fast image encryption scheme based on 3D chaotic Baker maps. International Journal of Bifurcation and Chaos, 14(10), 3613-3624.
  7. Lai, J. , Liang, S. , Cui, D. 2010. A Novel Image Encryption Algorithm Based on Fractional Fourier Transform and Chaotic System. In Multimedia Communications (Mediacom), 2010 International Conference on (pp. 24-27). IEEE.
  8. Song, Z. , Hengjian, L. , & Xu, Y. 2008. A secure and efficient fingerprint images encryption scheme. In Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for (pp. 2803-2808). IEEE.
  9. Moon, D. , Chung, Y. , Pan, S. B. , Moon, K. , & Chung, K. I. 2006. An efficient selective encryption of fingerprint images for embedded processors. ETRI journal, 28(4), 444-452.
  10. Gao, T. , & Chen, Z. 2008. Image encryption based on a new total shuffling algorithm. Chaos, solitons & fractals, 38(1), 213-220
  11. Cui, D. 2010. A novel fingerprint encryption algorithm based on chaotic system and fractional Fourier transform. In Machine Vision and Human-Machine Interface (MVHI), 2010 International Conference on (pp. 168-171). IEEE.
  12. Sharma, M. , & Kowar, M. K. 2010. Image encryption techniques using chaotic schemes: A review.
  13. Bhatnagar, G. , & Wu, Q. 2012. Chaos-Based Security Solution for Fingerprint Data During Communication and Transmission. Instrumentation and Measurement, IEEE Transactions on, 61(4), 876-887.
  14. Nemade, V. S. , & Wagh, R. B. 2012. Review of different image encryption techniques. World Journal of Science and Technology, 2(3).
  15. Srivastava, A. 2012. A survey report on Different Techniques of Image Encryption. International Journal of Emerging Technology and Advanced engineering. Vol. 2, pp. 163-167.
  16. Han, F. , Hu, J. , Yu, X. , & Wang, Y. 2007. Fingerprint images encryption via multi-scroll chaotic attractors. Applied mathematics and computation, 185(2), 931-939.
  17. Behnia, S. , Akhshani, A. , Mahmodi, H. , Akhavan, A. 2008. A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons & Fractals, 35(2), 408-419.
  18. Chang, C. C. , Hwang, M. S. , Chen, T. S. 2001. A new encryption algorithm for image cryptosystems. Journal of Systems and Software, 58(2), 83-91.
  19. Bandyopadhyay, T. , Bandyopadhyay, B. , Chatterji, B. N. 2012. Secure Image encryption through key hashing and wavelet transform techniques. International Journal of Emerging Technology and Advanced Engineering. Vol. 2, pp. 26-31
  20. Acharya, B. , Panigrahy, S. K. , Patra, S. K. , Panda, G. 2009. Image encryption using advanced hill cipher algorithm. International Journal of Recent Trends in Engineering, 1(1), 663-667.
  21. Kwok, H. S. , & Tang, W. K. 2007. A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons & Fractals,32(4), 1518-1529.
  22. Sharma, P. , Godara, M. , Singh, R. 2012. Digital Image encryption techniques: A Review. International Journal of Computing & Business Research. ISSN: 2229-6166.
  23. Zhang, L. , Liao, X. , & Wang, X. 2005. An image encryption approach based on chaotic maps. Chaos, Solitons & Fractals, 24(3), 759-765.
  24. Huang, Y. , Suter, B. 1998. The fractional wave packet transform. Multidimensional Systems and Signal Processing, 9(4), 399-402.
  25. Hao B. 1993. Starting with parabolas: an introduction to chaotic dynamics. Shanghai China: Shanghai Scientific and Technological Education Publishing House.
  26. Lorenz EN. 1993. The Essence of Chaos. University of Washington Press, Seattle, WA.
  27. Brown, R. , Leon, O. 1996. Clarifying chaos: Examples and counterexamples. International Journal of Bifurcation and Chaos, 6(02), 219-249.
  28. Fridrich, J. 1998. Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 8(06), 1259-1284.
  29. Dachselt, F. , Schwarz, W. 2001. Chaos and cryptography. Circuits and Systems I: Fundamental Theory and Applications, IEEE Transactions on,48(12), 1498-1509.
  30. Kocarev, L. 2001. Chaos-based cryptography: a brief overview. Circuits and Systems Magazine, IEEE, 1(3), 6-21.
  31. Jakimoski, G. , & Kocarev, L. 2001. Chaos and cryptography: Block encryption ciphers based on chaotic maps. Circuits and Systems I: Fundamental Theory and Applications, IEEE Transactions on, 48(2), 163-169
  32. Schmitz, R. 2001. Use of chaotic dynamical systems in cryptography. Journal of the Franklin Institute, 338(4), 429-441.
  33. Kocarev, L. , Jakimoski, G. , Stojanovski, T. , & Parlitz, U. 1998. From chaotic maps to encryption schemes. In Circuits and Systems, ISCAS'98. Proceedings of the 1998 IEEE International Symposium on (Vol. 4, pp. 514-517). IEEE.
  34. John Justin, M. , Manimurugan, S. 2012. A Survey on Various Encryption Techniques. International Journal of Soft Computing. Volume-2. Issue-1, pp. 429-432 Mao, Y. , & Chen, G. 2005. Chaos-based image encryption. Handbook of Geometric Computing, 231-265.
Index Terms

Computer Science
Information Sciences

Keywords

Chaos Image Encryption Image Decryption