CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

A proficient Image Encryption using Chaotic Map Approach

by Deepshikha Rathore, Anil Suryavanshi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 134 - Number 10
Year of Publication: 2016
Authors: Deepshikha Rathore, Anil Suryavanshi
10.5120/ijca2016908122

Deepshikha Rathore, Anil Suryavanshi . A proficient Image Encryption using Chaotic Map Approach. International Journal of Computer Applications. 134, 10 ( January 2016), 20-24. DOI=10.5120/ijca2016908122

@article{ 10.5120/ijca2016908122,
author = { Deepshikha Rathore, Anil Suryavanshi },
title = { A proficient Image Encryption using Chaotic Map Approach },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 134 },
number = { 10 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 20-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume134/number10/23951-2016908122/ },
doi = { 10.5120/ijca2016908122 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:33:51.347935+05:30
%A Deepshikha Rathore
%A Anil Suryavanshi
%T A proficient Image Encryption using Chaotic Map Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 134
%N 10
%P 20-24
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Important information for general users, advanced data and multimedia, arts, entertainment, advertising, education, training and business sectors have, the faster and more digital and multimedia applications development are transmitted through the network that can be accessed by should not be. Therefore confidentiality, integrity, security, confidentiality, authenticity of the images as well as the issue of communication and storage of images has become an important issue for the defense. In recent years, the technology to protect confidential images are applied have developed various encryption and unauthorized users. Letter aspects and chaotic map based on a review of existing different image encryption technology. This paper introduces a general discussion of a technology for the first time to review and image encryption chaotic system and various chaotic image encryption technology based and related tasks. Finally, the main objective of this paper is designed to help new chaotic image encryption technology based on the future behavior of the current chaos-based image encryption algorithms studied.

References
  1. Mazleena Salleh, Subariah Ibrahim, Ismail Isnin,“Enhanced Chaotic Image Encryption Algorithm Based on Baker’s Map” IEEE 2003.
  2. Md. Billal Hossain, Md. Toufikur Rahman, A B M Saadmaan Rahman, Sayeed Islam, “A new Approach of Image Encryption Using 3D Chaotic Map to Enhance Security Of Multimedia Component” IEEE 2014.
  3. A. Kanso, M. Ghebleh, “A Novel Image Encryption Algorithm based on 3D Chaotic map” Commun Nonlinear SciNumerSimulat Elsevier 2011.
  4. Yicong Zhou, Long Bao, C.L. Phillip Chen, “A New 1D Chaotic System for Image Encryption” Signal Processing 2014.
  5. Ch.K. Volos, I.M. Kyprianidis, I.N. Stouboulos, “Image Encryption Process Based On chaotic Synchronixation Phenomena” 2013.
  6. SukalyanSom, SayaniSen, “A Non-adaptive Partial Encryption of grayscale Images based on Chaos” First International Conference on Computational Intelligence: modeling, techniques and Applications (CIMTA-2013).
  7. Xing-yuan Wang, Na Wei, Dou-dou Zhang, “A Novel Image Encryption Algorithm Based on Chaotic System and Improved Gravity model” 2014.
  8. Yicong Zhou, Weijia Cao, C.L. Philip, Chen, “Image Encryption Using Binary BitPlane” 2014.
  9. Motingsu, Wenying Wen, “An Analysis of Chaos based Security Solution for Fingerprint Data” 2014 Elsevier GmbH.
  10. Mrinal Kanti Mandal, Gourab Dutta Banik, Debassish Chattopadhyay and Debashis Nandi, “An Image Encryption Process Based on Chaotic Logistic Map” IETE Journal 2012.
  11. Jui Cheng and Jiun-In Guo, “A new chaotic key-based design for image encryption and decryption”, International Symposium on Circuits and Systems, IEEE, 2000, vol.4.
  12. Gabriel Peterson, “Arnold’s Cat Map”, Math 45 – Linear Algebra,Fall 1997.
  13. Robert M. May, “Simple mathematical models with very complicated dynamics”, Nature 261(5560), 1976.
  14. Jiri Fridrich,” Symmetric Ciphers based on Two-Dimensional Chaotic Maps”, International Journal of Bifurication and Chaos, vol. 8, no. 6, 1998.
  15. Ibrahim S. I. Abuhaiba1, Hanan M.Abuthraya, Huda B. Hubboub and Ruba A. Salamah, “Image Encryption Using Chaotic Map and Block Chaining”, I.J Computer Network and Information Security, vol.7, July 2012.
  16. David Arroyo, Chengqing Li,Shujun Li, Gonzalo Alvarez and Wolfgang A. Halang, “Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm”, Chaos, Solitons& Fractals, Elsevier, vol. 41, no. 5, 2008.
  17. Musheer Ahmad and M. ShamsherAlam, “A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping”, International Journal on Computer Science and Engineering, vol. 2(1), 2009.
  18. Ramesh Kumar Yadava, Dr. B. K.Singh, S. K. Sinha and K. K. Pandey, “A New Approach of Colour Image Encryption Based on Henon like Chaotic Map”, Journal of Information Engineering and Applications, vol. 3, no. 6, 2013.
  19. Alireza Jolfaei and Abdolrasoul Mirghadri, ”An Image Encryption Approach using Chaos and Stream Cipher”, Journal of Theoretical and Applied Information Technology”, 2010.
  20. Chittaranjan Pradhan, Shibani Rath and Ajay Kumar Bisoi, “Non Blind Digital Watermarking Technique Using DWT and Cross Chaos”, 2ndInternational Conference on Communication, Computing & Security, Elsevier, 2012.
  21. Uanrong Chen, Yaobin Mao and Charles K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps”, Chaos, Solitons and Fractals, Elseiver (21), 2004.
  22. Mei Jiansheng, Li Sukang and Tan Xiaomei, “A Digital Watermarking Algorithm Based On DCT and DWT”, International Symposium on Web Information Systems and Applications, May 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Image encryption chaotic map Logistic map Arnold cat map Baker map.