CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Survey: Image Encryption using Chaotic Cryptography Schemes

Published on None 2011 by Mintu Philip, Asha Das
Computational Science - New Dimensions & Perspectives
Foundation of Computer Science USA
NCCSE - Number 1
None 2011
Authors: Mintu Philip, Asha Das
f7a6ec3c-cd69-4433-be0d-b021a3e596b5

Mintu Philip, Asha Das . Survey: Image Encryption using Chaotic Cryptography Schemes. Computational Science - New Dimensions & Perspectives. NCCSE, 1 (None 2011), 1-4.

@article{
author = { Mintu Philip, Asha Das },
title = { Survey: Image Encryption using Chaotic Cryptography Schemes },
journal = { Computational Science - New Dimensions & Perspectives },
issue_date = { None 2011 },
volume = { NCCSE },
number = { 1 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /specialissues/nccse/number1/1849-151/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Computational Science - New Dimensions & Perspectives
%A Mintu Philip
%A Asha Das
%T Survey: Image Encryption using Chaotic Cryptography Schemes
%J Computational Science - New Dimensions & Perspectives
%@ 0975-8887
%V NCCSE
%N 1
%P 1-4
%D 2011
%I International Journal of Computer Applications
Abstract

Chaotic Encryption Method seems to be much better than traditional encryption methods used today. Chaotic encryption is the new direction of cryptography. It makes use of chaotic system properties such as sensitive to initial condition and loss of information. Many chaos-based encryption methods have been presented and discussed in the last two decades. In order to reach higher performance, these methods take advantage of the more and more complex behavior of chaotic signals. This paper contributes by comparing and analyzing the performance of the past chaotic image encryption schemes.

References
  1. Jakimoski, G. and L. Kocarev. 2001. “Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps”. IEEE Transactions on Circuits and Systems—I: Fundamental Theory and Applications. 48(2): 163-169.
  2. Y.B. Mao, G. Chen, S.G. Lian, “A novel fast image Encryption scheme based on the 3D chaotic baker map,” Int. J. Bifurcate Chaos, vol. 14, pp. 3613–3624, 2004.
  3. H. Gao, Y. Zhang, S. Liang, and D. Li, “A new chaotic algorithm for image encryption,” Chaos, Solutions &Fractals, vol. 29, no. 2, pp. 393–399, 2006.
  4. Su Su Maung, and Myitnt Myint Sein, “A Fast Encryption Scheme Based on Chaotic Maps”, GMSARN International Conference on Sustainable Development: Issues and Prospects for the GMS, 2008.
  5. Musheer Ahmad and M. Shamsher Alam, “A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping”, Musheer Ahmad et al /International Journal on Computer Science and Engineering, Vol.2(1), 2009, 46-50.
  6. Fengjian Wang, Yongping Zhang and Tianjie Cao “Research of chaotic block cipher algorithm based on Logistic map”, 2009 Second International Conference on Intelligent Computation Technology and Automation, 2009: 678 – 681.
  7. Jui-Cheng Yen, and Jiun-In Guo, “A New Chaotic Key-Based Design for Image Encryption and Decryption”, IEEE International Symposium on ISCAS 2000, Geneva, pp. IV-49-IV-52, May. 2000.
  8. Po-Han Lee,Soo-Chang Pei and Yih-Yuh Chen, “Generating Chaotic Stream Ciphers Using Chaotic Systems”, Chinese Journal Of Physics Vol. 41 , No. 6, 2003.
  9. Socek, D., Shujun Li, Magliveras, S.S. and Furht, B, “Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption”, First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005:406-407.
  10. Deergha Rao and K. Gangadhar, “Modified Chaotic Key-Based Algorithm for Image Encryption And Its VLSI Realization”, International Conference on Digital Signal Processing, 2007.
  11. H.E.H. Ahmed, H.M. Kalash, and O.S.F. Allah, “An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption", presented at Informatica (Slovenia), 2007, pp.121-129.
  12. Shubo Liu, Jing Sun, Zhengquan Xu “An Improved Image Encryption Algorithm based on Chaotic System”, journal of computers, vol. 4, no. 11, 2009, pp.1091-1100.
  13. Abir Awad, Abdelhakim Saadane, “Efficient Chaotic Permutations for Image Encryption Algorithms”, Proceedings of the World Congress on Engineering Vol I, 2010.
  14. Ai-hongZhu, Lia Li, “Improving for Chaotic Image Encryption Algorithm Based on Logistic Map”, 2nd Conference on Environmental Science and Information Application Technology, 2010.
  15. G. Chen, Y. Mao, C.K. Chui, “A symmetric image encryption based on 3D chaotic maps”, Chaos Solutions Fractals, vol. 21, pp. 749–761, 2004.
  16. S. E. Borujeni, M. Eshghi1, “Chaotic Image Encryption Design Using Tompkins-Paige Algorithm”, Hindawi Publishing Corporation, Mathematical Problems in Engineering, Article ID 762652, 22 pages, 2009.
  17. Mazleena Salleh, Subariah Ibrahim, Ismail Fauzi Isnin, “Image encryption algorithm based on chaotic mapping”, Journal Teknologi, 2003, pp: 1–12.
  18. Shubo Liu, Jing Sun, Zhengquan Xu, “An Improved Image Encryption Algorithm based on chaotic system”, Journal of Computers, vol. 4, no. 11, November 2009, pp: 1091-1100.
  19. Noura, H. El Assad, S. Vlădeanu, C, “Design of a fast and robust chaos-based crypto-system for image encryption”, 8th International Conference on Communications (COMM), 2010, pp: 423 – 426.
Index Terms

Computer Science
Information Sciences

Keywords

Chaotic algorithm logistic map perturbation Baker map cipher