Image Encryption Using New Chaotic Map Algorithm

  • S. SubashanthiniEmail author
  • Aswani Kumar Cherukuri
  • M. Pounambal
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 941)


In this digital era, all the information takes the form of various media during communication. This leads to the need for more concern on the security measures so that the data being transmitted is resilient to various malicious attacks. In this paper, a modified line map algorithm is proposed and it is considered as a chaotic map to scramble the image. The resultant chaotic Line map has been employed to permute the image pixels, whereas diffusion is performed by XOR operation to completely encrypt the image. The robustness of the image against attacks has been increased by repeated permutation-diffusion round for ‘n’ number of times. Histogram analysis, Number of pixels change rate and correlation analysis has been performed to analyze the robustness of the proposed technique. Simulation results proves that this methodology can be implemented in real time applications.


Chaotic map Cryptography Image encryption Line map Scrambling UACI 


  1. 1.
    Zhou, G., Zhang, D., Liu, Y., Yuan, Y., Liu, Q.: A novel encryption method based on chaos and line map. Neurocomputing 169, 150–157 (2015)CrossRefGoogle Scholar
  2. 2.
    Murillo, Escobar: A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Process. 109, 119–131 (2015)Google Scholar
  3. 3.
    Huang, F., Lei, F.: A novel symmetric image encryption approach based on a new invertible two-dimensional map. In: Intelligent Information Hiding and Multimedia Signal Processing (2008)Google Scholar
  4. 4.
    Feng, Y., Li, L., Huang, F.: A symmetric image encryption approach based on line maps. In: Systems and Control in Aerospace and Astronautics 2006. ISSCAA 2006 (2006)Google Scholar
  5. 5.
    Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption. Cyber J.: Multi. J. Sci. Technol., J. Sel. Areas Telecommun. (JSAT), Apr. Ed. (2011)Google Scholar
  6. 6.
    Jun, Y., Na, L., Jun, D.: A design and implementation of high-speed 3DES algorithm system. In: Future Information Technology and Management Engineering 2009. FITME ‘09 (2009)Google Scholar
  7. 7.
    Yajam, H.A., Ahmadabadi, Y.K., Akhaee, M.: Deniable encryption based on standard RSA with OAEP. In: 2016 8th International Symposium on Telecommunications (IST’2016) (2016)Google Scholar
  8. 8.
    Bora, S., Sen, P., Pradhan, C.: Novel color image encryption technique using blowfish and cross chaos map. In: IEEE ICCSP 2015 Conference (2015)Google Scholar
  9. 9.
    Zhang, Q., Ding, Q.: Digital image encryption based on advanced encryption standard (AES) algorithm. In: Communication and Control (IMCCC) (2015)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • S. Subashanthini
    • 1
    Email author
  • Aswani Kumar Cherukuri
    • 1
  • M. Pounambal
    • 1
  1. 1.VIT UniversityVelloreIndia

Personalised recommendations