Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 7 SI
Page No. 5490 - 5497

Chaos-Based Image Encryption Methods: A Survey Study

Authors : Sabah Fadhel, Mohd Shafry Mohd Rahim and Omar Farook Mohammad

References

Abdulgader, A., M. Ismail, N. Zainal, T. Idbeaa and K.S. Yoyon et al., 2015. Enhancement of AES algorithm based on chaotic maps and shift operation for image encryption. J. Theor. Appl. Inf. Technol., 71: 1-12.
Direct Link  |  

Aissa, B., D. Nadir and R. Mohamed, 2013. Image encryption using stream cipher based on nonlinear combination generator with enhanced security. New Trends Math. Sci., 1: 10-19.
Direct Link  |  

Alfy, E.E.S. and A.K. Utaibi, 2011. An encryption scheme for color images based on chaotic maps and genetic operators. Proceedings of the 7th International Conference on Networking and Services, May 22-27, 2011, ICNS, Venice, Italy, ISBN:978-1-61208-133-5, pp: 92-97.

Alsafasfeh, Q.H. and A.A. Arfoa, 2011. Image encryption based on the general approach for multiple chaotic systems. J. Signal Inf. Process., 2: 238-244.
CrossRef  |  Direct Link  |  

Alvarez, G. and S. Li, 2006. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcation Chaos, 16: 2129-2151.
Direct Link  |  

Bashardoost, M., M.S.M. Rahim, A. Altameem and A. Rehman, 2014. A novel approach to enhance the security of the LSB image steganography. Res. J. Appl. Sci. Eng. Technol., 7: 3957-3963.
Direct Link  |  

Chen, C., T. Wang, Y. Kou, X. Chen and X. Li, 2013. Improvement of trace-driven I-Cache timing attack on the RSA algorithm. J. Syst. Software, 86: 100-107.
Direct Link  |  

Chen, G., Y. Mao and C.K. Chui, 2004. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals, 21: 749-761.
CrossRef  |  

Coppersmith, D., 1994. The data encryption standard (DES) and its strength against attacks. IBM. J. Res. Dev., 38: 243-250.
CrossRef  |  Direct Link  |  

Dong, Y., J. Liu, C. Zhu and Y. Wang, 2010. Image encryption algorithm based on chaotic mapping. Proceedings of the 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT) Vol. 1, July 9-11, 2010, IEEE, Chengdu, China, ISBN:978-1-4244-5537-9, pp: 289-291.

Gao, H., Y. Zhang, S. Liang and D. Li, 2006. A new chaotic algorithm for image encryption. Chaos Solitons Fractals, 29: 393-399.

Guzman, G.L., C.C. Hernandez, G.R.M. Lopez and G.E.E. Garcia, 2008. Synchronization of multi-scroll chaos generators: Application to private communication. Rev. Mex. Phys., 54: 299-305.
Direct Link  |  

Guzman, G.L., C.C. Hernandez, G.R.M. Lopez and G.E.E. Garcia, 2009. Synchronization of chua’s circuits with multi-scroll attractors: Application to communication. Commun. Nonlinear Sci. Numer. Simul., 14: 2765-2775.
Direct Link  |  

Habutsu, T., Y. Nishio, I. Sasase and S. Mori, 1991. A secret key cryptosystem by iterating a chaotic map. Proceedings of the Workshop on Advances in Cryptology Eurocrypt Theory and Application of Cryptographic Techniques Eurocrypt Vol. 91, April 8-11, 1991, Springer, Brighton, England, pp: 127-136.

Hernandez, C.C., M.D. Lopez, G.V. Garcia, G.H. Serrano and P.R. Nunez, 2005. Experimental realization of binary signals transmission using chaos. J. Circuits Syst. Comput., 14: 453-468.
Direct Link  |  

Jain, A., 2016. Pixel chaotic shuffling and Arnold map based image security using complex wavelet transform. J. Network Commun. Emerging Technol. JNCET., 6: 8-11.
Direct Link  |  

Jain, Y., R. Bansal, G. Sharma, B. Kumar and S. Gupta, 2016. Image encryption schemes: A complete survey. Intl. J. Signal Process. Image Process. Pattern Recognit., 9: 157-192.
Direct Link  |  

Jolfaei, A. and A. Mirghadri, 2010. An image encryption approach using chaos and stream cipher. J. Theor. Applied Inform. Technol., 19: 117-125.
Direct Link  |  

Kamali, S.H., R. Shakerian, M. Hedayati and M. Rahmani, 2010. A new modified version of advanced encryption standard based algorithm for image encryption. Proceedings of the 2010 International Conference On Electronics and Information Engineering (ICEIE), August 1-3, 2010, IEEE, Kyoto, Japan, ISBN:978-1-4244-7679-4, pp: V1-141-V1-141.

Khanzadi, H., M. Eshghi and S. Borujeni, 2014. Image encryption using random bit sequence based on chaotic maps. Arabian J. Sci. Eng. Springer Sci. Bus. Media BV., 39: 1039-1047.
Direct Link  |  

Li, S.J., X. Zheng, X.Q. Mou and Y.L. Cai, 2002. Chaotic encryption scheme for real-time digital video. Real Time Imaging, 6: 149-160.
Direct Link  |  

Lian, S., J. Sun and Z. Wang, 2005. Security analysis of a chaos-based image encryption algorithm. Phys. A. Stat. Mech. Appl., 351: 645-661.
Direct Link  |  

Liu, R. and X. Tian, 2012. New algorithm for color image encryption using chaotic map and spatial bit-level permutation. J. Theor. Appl. Inf. Technol., 43: 89-93.
Direct Link  |  

Liu, S., J. Sun and Z. Xu, 2009. An improved image encryption algorithm based on chaotic system. J. Comput., 4: 1091-1100.
CrossRef  |  

Maadeed, A.S., A.A. Ali and T. Abdalla, 2012. A new chaos-based image-encryption and compression algorithm. J. Electr. Comput. Eng., 2012: 1-11.
Direct Link  |  

Mahmood, A.S., M.S.M. Rahim and N.Z.S. Othman, 2016. Implementation of the binary random number generator using the knight tour problem. Mod. Appl. Sci., 10: 35-46.
Direct Link  |  

Masuda, N. and K. Aihara, 2002. Cryptosystems with discretized chaotic maps. IEEE Trans. Circuits Syst. I: Fundam. Theory Appl., 49: 28-40.
CrossRef  |  

Min, L. and H. Lu, 2010. Design and analysis of a novel chaotic image encryption. Proceedings of the 2nd International Conference on Computer Modeling and Simulation (ICCMS'10) Vol. 1, January 22-24, 2010, IEEE, Sanya, Hainan, China, ISBN:978-1-4244-5643-7, pp: 517-520.

Nesakumari, G.R. and S. Maruthuperumal, 2012. Normalized image watermarking scheme using chaotic system. Intl. J. Inf. Network Secur., Vol. 1,

Norouzi, B., S. Mirzakuchaki, S.M. Seyedzadeh and M.R. Mosavi, 2014. A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimedia Tools Appl., 71: 1469-1497.
Direct Link  |  

Norouzi, B., S.M. Seyedzadeh, S. Mirzakuchaki and M.R. Mosavi, 2014. A novel image encryption based on hash function with only two-round diffusion process. Multimedia Syst., 20: 45-64.
CrossRef  |  

Pareek, N.K., 2012. Design and analysis of a novel digital image encryption scheme. Int. J. Netw. Secur. Applic., 4: 95-108.
CrossRef  |  Direct Link  |  

Pecora, L.M. and T.L. Carroll, 1990. Synchronization in chaotic systems. Phys. Rev. Lett., 64: 821-830.
CrossRef  |  Direct Link  |  

Pichler, F. and J. Scharinger, 1995. Finite dimensional generalized baker dynamical systems for cryptographic applications. Proceedings of the International Conference on Computer Aided Systems Theory, May 22-25, 1995, Springer, Berlin, Germany, pp: 465-476.

Salameh, J.N.B. and M.P.O. Karak, 2016. An investigation of the use of MJEA in image encryption. Wseas Trans. Comput., 15: 12-23.

Sankaran, K.S. and B.V.S. Krishna, 2011. A new chaotic algorithm for image encryption and decryption of digital color images. Int. J. Inform. Educ. Technol., 1: 137-141.
CrossRef  |  Direct Link  |  

Sankaran, K.S. and B.V.S. Krishna, 2011. A new chaotic algorithm for image encryption and decryption of digital color images. Int. J. Inform. Educ. Technol., 1: 137-141.
CrossRef  |  Direct Link  |  

Sankpal, P.R. and P.A. Vijaya, 2014. Image encryption using chaotic maps: A survey. Proceedings of the 2014 5th International Conference on Signal and Image Processing (ICSIP), January 8-10, 2014, IEEE, Jeju Island, South Korea, ISBN:978-0-7695-5100-5, pp: 102-107.

Sharifara, A., M.S.M. Rahim and M. Bashardoost, 2013. A novel approach to enhance robustness in digital image watermarking using multiple bit-planes of intermediate significant bits. Proceedings of the 2013 International Conference on Informatics and Creative Multimedia (ICICM), September 4-6, 2013, IEEE, Kuala Lumpur, Malaysia, ISBN:978-0-7695-5133-3, pp: 22-27.

Shuangshuang, H. and L.Q. Min, 2014. A color image encryption scheme based on generalized synchronization theorem. Indonesian J. Electr. Eng. Comput. Sci., 12: 685-692.
Direct Link  |  

Sivakumar, T. and R. Venkatesan, 2016. A new image encryption method based on knight's travel path and true random number. J. Inf. Sci. Eng., 32: 133-152.
Direct Link  |  

Soleymani, A., Z.M. Ali and M.J. Nordin, 2012. A survey on principal aspects of secure image transmission. World Acad. Sci. Eng. Technol., 66: 1-8.
Direct Link  |  

Su, Y., C. Tang, X. Chen, B. Li and W. Xu et al., 2017. Cascaded fresnel holographic image encryption scheme based on a constrained optimization algorithm and henon map. Opt. Lasers Eng., 88: 20-27.
Direct Link  |  

Wang, L., Q. Ye, Y. Xiao, Y. Zou and B. Zhang, 2008. An image encryption scheme based on cross chaotic map. Proceedings of the Congress on Image and Signal Processing, Volume 3, May 27-30, 2008, Sanya, China, pp: 22-26.

Wang, X., L. Teng and X. Qin, 2012. A novel colour image encryption algorithm based on chaos. Signal Process., 92: 1101-1108.
Direct Link  |  

Yen, J.C. and J.I. Guo, 2000. Efficient hierarchical chaotic image encryption algorithm and its VLSI realization. IEE Proc. Vision Image Signal Process., 147: 167-175.
Direct Link  |  

Yen, J.C. and J.I. Guo, 2000. A new chaotic key-based design for image encryption and decryption. Proceedings of the IEEE International Symposium on Circuits and Systems, Volume 4, May 28-31, 2000, Geneva, Switzerland, pp: 49-52.

Zhang, Y., 2014. Plaintext related image encryption scheme using chaotic map. Indonesian J. Electr. Eng. Comput. Sci., 12: 635-643.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved