Recent Advancements in Chaos-Based Image Encryption Techniques: A Review

  • Snehlata YadavEmail author
  • Namita Tiwari
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 100)


The transmission rate of multimedia data becomes exponential due to the tremendous development in network and communication facilities in last decades. Legitimate and illegitimate both kind of users can access these facilities easily 24 × 7. During transmission of data, protecting the authenticity, confidentiality and integrity of data is paramount because it affects the privacy as well as reputation of the person. Data encryption method is used to provide secure transmission of data among end devices. With the revolution in digital photography, image authenticity and integrity problems are hot topics. This paper reviews the resources offered within scope of research community so far to cover recent developments in chaotic image encryption field.


Image encryption Chaotic system Cat map 


  1. 1.
    Lorenz EN (1963) Deterministic non periodic flow. J Atmos SciGoogle Scholar
  2. 2.
    Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715MathSciNetCrossRefGoogle Scholar
  3. 3.
    Wang X, Teng L, Qin X (2012) A novel color image encryption algorithm based on chaos. Signal Process 1101–1108MathSciNetCrossRefGoogle Scholar
  4. 4.
    Bhatnagar QG (2012) Selective image encryption based on pixels of interest and singular value decomposition. Digit Signal Process 648–663MathSciNetCrossRefGoogle Scholar
  5. 5.
    Jakimoski G, Subbalakshmi KP (2007) Discrete lyapunov exponent and differential cryptanalysis. IEEE Trans Circuits Syst II, pp 499–501CrossRefGoogle Scholar
  6. 6.
    Zhu ZL, Wang C, Chai H, Yu H (2011) A chaotic image encryption scheme based on magic cube transformation. In: IEEE fourth international workshop on chaos-fractals theories and applications. ChinaGoogle Scholar
  7. 7.
    Chen RJ, Horng SJ (2010) Novel SCAN-CA-based image security system using scan and 2-D von Neumann cellular automata. Signal Process Image Commun 413–426Google Scholar
  8. 8.
    Li L, El-Latif AAA, Niu X (2012) Elliptic curve Elgamal based homomorphic image encryption scheme for sharing secret images. Signal Process 1069–1078CrossRefGoogle Scholar
  9. 9.
    Chen TH, Tsao KH, Lee YS (2012) Yet another multiple-image encryption by rotating random grid. Signal Process 2229–2237CrossRefGoogle Scholar
  10. 10.
    Yang S, Sun S (2008) A video encryption method based on chaotic maps in DCT domain. Sci Direct Prog Nat Sci 18CrossRefGoogle Scholar
  11. 11.
    Pecora LM, Carroll TL (1990) Synchronization in chaotic systems. Phys Rev Lett 64:821MathSciNetCrossRefGoogle Scholar
  12. 12.
    Bradley E (1995) Causes and effects of chaos. Comput Graph Elsevier Sci Ltd. 19(5):755–778Google Scholar
  13. 13.
    Baptista MS (1998) Cryptography with chaos. Phys Lett A 50Google Scholar
  14. 14.
    Bose R, Banerjee A (1999) Implementing symmetric cryptography using chaos function. In: 7th international conference on advanced computing and communications. RoorkeeGoogle Scholar
  15. 15.
    Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness test for image encryption. J Sel Areas Telecommun (JSAT) 31(8)Google Scholar
  16. 16.
    Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model (Elsevier) 52:2028–2035MathSciNetCrossRefGoogle Scholar
  17. 17.
    Zhu ZL, Wang C, Chai H, Yu H (2011) A chaotic image encryption scheme based on magic cube transformation. In: Fourth international workshop on chaos-fractals theories and applications. ChinaGoogle Scholar
  18. 18.
    Ye G, Huang X (2016) A secure image encryption algorithm based on chaotic maps and SHA-3. Secur Commun Netw, Wiley online library, pp 2015–2023Google Scholar
  19. 19.
    Zahmoul R, Zaied M (2016) Toward new family beta maps for chaotic image encryption. In: IEEE international conference on Systems, man and cybernatics. HungaryGoogle Scholar
  20. 20.
    Wu J, Liao X, Yang B (2017) Color image encryption based on chaotic systems and elliptic curve ElGamal scheme. Signal Process 141:109–124CrossRefGoogle Scholar
  21. 21.
    Pareek NK, Patidar V, Sud KK (2003) Discrete chaotic cryptography using external key. Phys Lett A 309:75–82MathSciNetCrossRefGoogle Scholar
  22. 22.
    Huang F, Guan ZH (2005) Cryptosystem using chaotic key. Chaos Solut Fractals 23:851–855CrossRefGoogle Scholar
  23. 23.
    Pisarchik AN, Zanin M (2008) Image encryption with chaotically coupled chaotic maps. Physica D (Elsevier), 237:2364–2648MathSciNetCrossRefGoogle Scholar
  24. 24.
    Amin M, Faragallah OS, El-Latif AAA (2010) A chaotic block cipher algorithm for image cryptosystems. Commun Nonlinear Sci Number Simulat 15:3484–3497MathSciNetCrossRefGoogle Scholar
  25. 25.
    Gupta K, Silakari S (2011) A new approach for fast color image encryption using chaotic map. J Inf Secur 2:139–150CrossRefGoogle Scholar
  26. 26.
    Fu C, Chen JJ, Zou H, Meng WH, Zhan YF, Yu YW (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Soc Am 20(3):2363–2378CrossRefGoogle Scholar
  27. 27.
    Kanso A, Ghebleh M (2012) A novel image encryption algorithm based on a 3D chaotic map. Commun Nonlinear Sci Numer Simulat (Elsevier) 17:2943–2959MathSciNetCrossRefGoogle Scholar
  28. 28.
    Slimane NB, Bouallegue K, Machhout M (2016) Nested chaotic image encryption scheme using two-diffusion process and the secure hash algorithm SHA-1. In: 4th IEEE international conference on control engineering and information technology. TunisiaGoogle Scholar
  29. 29.
    Chen J, Zhang Y, Qi L, Fu C, Xu L (2018) Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression. Opt Laser Technol 99:238–248CrossRefGoogle Scholar
  30. 30.
    Mao Y, Chen G (2005) Chaos based image encryption. In: Handbook of geometric computing. Berlin Heidelberg, SpringerGoogle Scholar
  31. 31.
    Zhang NA (2013) Colour image encryption algorithm combining compressive sensing with Arnold transform. J Comp 8(11):2857–2863Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Maulana Azad National Institute of TechnologyBhopalIndia

Personalised recommendations