Subject Review: Image Encryption Techniques based on Chaotic Systems

Authors

  • Donia Fadhil Chalob Mustansiyiah University Iraq
  • Zynab M. Jasim Mustansiyiah University Iraq
  • Zainab Mohammed Essa Mustansiyiah University Iraq
  • Ziad M. Abood Mustansiyiah University Iraq

DOI:

https://doi.org/10.31695/IJERAT.2021.3727

Keywords:

Chaos Theory, Image Encryption, DNA, Security

Abstract

The exchange of information over open networks and the internet has grown rapidly. Digital images occupy a major role in multimedia communication. Images are utilized in a variety of fields, including biometric authentication, military, medical science; hence, their security become a major concern. The best solution for securing the data (in any form) is encryption. The recent encryption trend is chaos-based encryption. Image encryption approaches based on chaos have essential merits l. This paper surveys various aspects and approaches of chaos maps image encryption like piecewise linear chaotic map (PWLCM), logistic map, skew tent map. Considering parameters such as correlation analysis and keyspace when comparing image encryption techniques that use different chaotic maps.

References

G. Veena and M. Ramakrishna, “A Survey on Image Encryption using Chaos-based Techniques”, Int. J. Adv. Comput. Sci. Appl., vol. 12, no. 1, pp. 379–384, 2021, DOI: 10.14569/IJACSA.2021.0120145.

Ziad M. Abood, Zainab M. Essa, "Increase Security of Image Encryption Depends on Change Pixel Location". J College of Basic Education J., Mustansiriyah University, vol. 23, No. 98, 2017.

A. A. Maryoosh, R. A. Mustafa, and Z. S. Dhaief, “Review: Image Encryption Techniques based on Chaotic Map”, Int. J. Eng. Res. Adv. Technol., vol. 05, no. 09, pp. 01–05, 2019, DOI: 10.31695/ijerat.2019.3559.

X. Y. Wang, Y. Q. Zhang, and X. M. Bao, “A novel chaotic image encryption scheme using DNA sequence operations”, Opt. Lasers Eng., vol. 73, pp. 53–61, 2015, DOI: 10.1016/j.optlaseng.2015.03.022.

L. Xu, X. Gou, Z. Li, and J. Li, “A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion”, Opt. Lasers Eng., vol. 91, no. April 2016, pp. 41–52, 2017, doi: 10.1016/j.optlaseng.2016.10.012.

R. Zahmoul, R. Ejbali, and M. Zaied, “Image encryption based on new Beta chaotic maps”, Opt. Lasers Eng., vol. 96, no. January, pp. 39–49, 2017, DOI: 10.1016/j.optlaseng.2017.04.009.

Y. Zhou, L. Bao, and C. L. P. Chen, “A new 1D chaotic system for image encryption”, Signal Processing, vol. 97, pp. 172–182, 2014, DOI: 10.1016/j.sigpro.2013.10.034.

X. Chai, Y. Chen, and L. Broyde, “A novel chaos-based image encryption algorithm using DNA sequence operations”, Opt. Lasers Eng., vol. 88, pp. 197–213, 2017, DOI: 10.1016/j.optlaseng.2016.08.009.

S. F. Chiou, H. T. Pan, E. F. Cahyadi, and M.S. Hwang, “Cryptanalysis of the Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications”, Int. J. Netw. Secur., vol. 21, no. 1, p. 100, 2019, DOI: 10.6633/IJNS.201901.

R. H. Al-Hashemy and S. A. Mehdi, “A new algorithm based on magic square and a novel chaotic system for image encryption”, J. Intell. Syst., vol. 29, no. 1, pp. 1202–1215, 2020, DOI: 10.1515/jisys-2018-0404.

R. Enayatifar, H. J. Sadaei, A. H. Abdullah, M. Lee, and I. F. Isnin, “A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata”, Opt. Lasers Eng., vol. 71, pp. 33–41, 2015, DOI: 10.1016/j.optlaseng.2015.03.007.

K. Gupta and S. Silakari, “New Approach for Fast Color Image Encryption Using Chaotic Map”, J. Inf. Secur., vol. 02, no. 04, pp. 139–150, 2011, DOI: 10.4236/jis.2011.24014.

R. E. Boriga, A. C. Dăscălescu, and A. V. Diaconu, “A new fast image encryption scheme based on 2D chaotic maps”, IAENG Int. J. Comput. Sci., vol. 41, no. 4, pp. 249–258, 2014.

A. Arab, M. J. Rostami, and B. Ghavami, “An image encryption method based on chaos system and AES algorithm”, J. Supercomput., vol. 75, no. 10, pp. 6663–6682, 2019, DOI: 10.1007/s11227-019-02878-7.

R. Hamza and F. Titouna, “A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map”, Inf. Secur. J., vol. 25, no. 4–6, pp. 162–179, 2016, DOI: 10.1080/19393555.2016.1212954.

K. Jiao, G. Ye, Y. Dong, X. Huang, and J. He, “Image Encryption Scheme Based on a Generalized Arnold Map and RSA Algorithm”, Secur. Commun. Networks, vol. 2020, 2020, DOI: 10.1155/2020/9721675.

M. Kaur and V. Kumar, “Beta Chaotic Map Based Image Encryption Using Genetic Algorithm”, Int. J. Bifurc. Chaos, vol. 28, no. 11, 2018, DOI: 10.1142/S0218127418501328.

U. S. Choi, S. J. Cho, and S. W. Kang, “New color image encryption for medical images based on three dimensional generalized chaotic cat map and Combined Cellular Automata”, Adv. Sci. Technol. Eng. Syst., vol. 5, no. 2, pp. 104–110, 2020, doi: 10.25046/aj050213.

Hao. Li, L. Deng, and Z. Gu, “A Robust Image Encryption Algorithm Based on a 32-bit Chaotic System”, IEEE Access, vol. 8, pp. 30127–30151, 2020, DOI: 10.1109/ACCESS.2020.2972296.

Y. Zhang and Y. Tang, “A plaintext-related image encryption algorithm based on chaos”, Multimed. Tools Appl., vol. 77, no. 6, pp. 6647–6669, 2018, DOI: 10.1007/s11042-017-4577-1.

Heba G. Mohamed, Dalia H. El-Kamchouchi and Karim H. Moussa, "A Novel Color Image Encryption Algorithm Based on Hyperchaotic Maps and Mitochondrial DNA Sequences", Entropy 2020, 22(2), 158; https://doi.org/10.3390/e22020158

Rui Wang, Guo Qiang, and Xue Feng Duan, “An image encryption scheme based on double chaotic cyclic shift and Josephus problem”, Journal of Information Security and Applications, vol. 58, 2021, doi:10.1016/j.jisa.2020.102699.

I. Yasser, M. A. Mohamed, A. S. Samra, and F. Khalifa, “A chaotic-based encryption/decryption framework for secure multimedia communications”, Entropy, vol. 22, no. 11, pp. 1–23, 2020, DOI: 10.3390/e22111253.

Downloads

Published

2021-07-16

Issue

Section

Articles

How to Cite

Subject Review: Image Encryption Techniques based on Chaotic Systems. (2021). International Journal of Engineering Research and Advanced Technology (ijerat) (E-ISSN 2454-6135) , 7(7), 9-14. https://doi.org/10.31695/IJERAT.2021.3727