Share This Article:

Image Encryption Algorithm Based on a Chaotic Iterative Process

Abstract Full-Text HTML Download Download as PDF (Size:1322KB) PP. 1910-1920
DOI: 10.4236/am.2012.312262    4,517 Downloads   7,120 Views   Citations


The paper describes a symmetric encryption algorithm based on bit permutations and using an iterative process combined with a chaotic function. The main advantages of such a cryptosystem is its ability to encrypt securely bit sequences and assuring confusion, diffusion and indistinguishability properties in the cipher. The algorithm is applied on the image encryption where the plain-image is viewed as binary sequence. The results of statistical analysis about randomness, sensitivity and correlation on the cipher-images show the relevance of the proposed cryptosystem.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

M. François, T. Grosges, D. Barchiesi and R. Erra, "Image Encryption Algorithm Based on a Chaotic Iterative Process," Applied Mathematics, Vol. 3 No. 12, 2012, pp. 1910-1920. doi: 10.4236/am.2012.312262.


[1] R. L. Rivest, A. Shamir and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communication ACM, Vol. 21, No. 2, 1978, pp. 120-126. doi:10.1145/359340.359342
[2] B. Schneier and P. Sutherland, “Applied Cryptography: Protocols, Algorithms, and Source Code in C,” John Wiley & Sons, Inc., Hoboken, 1995.
[3] NIST, “Announcing the Advanced Encryption Standard (AES),” 2001.
[4] C. C. Chang, M. S. Hwang and T. S. Chen, “A New Encryption Algorithm for Image Cryptosystems,” Journal of Systems and Software, Vol. 58, No. 2, 2001, pp. 83-91. doi:10.1016/S0164-1212(01)00029-2
[5] G. Chen, Y. Mao and C. K. Chui, “A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps,” Chaos Solitons and Fractals, Vol. 21, No. 3, 2004, pp. 749-761. doi:10.1016/j.chaos.2003.12.022
[6] Z. Zhu, W. Zhang, K. Wong and H. Yu, “A Chaos-Based Symmetric Image Encryption Scheme Using a Bit-Level Permutation,” Information Sciences, Vol. 181, No. 6, 2011, pp. 1171-1186. doi:10.1016/j.ins.2010.11.009
[7] N. K. Pareek, V. Patidar and K. K Sud, “Image Encryption Using Chaotic Logistic Map, Image and Vision Computing,” Vol. 24, No. 9, 2006, pp. 926-934. doi:10.1016/j.imavis.2006.02.021
[8] Y. Wang, K. W. Wong, X. Liao, T. Xiang and G. Chen, “A Chaos-Based Image Encryption Algorithm with Variable Control Parameters,” Chaos Solitons and Fractals, Vol. 41, No. 4, 2009, pp. 1773-1783. doi:10.1016/j.chaos.2008.07.031
[9] A. K. Acharya, “Image Encryption Using a New Chaos Based Encryption Algorithm,” Proceedings of the International Conference on Communication, Computing and Security, New York, 12-14 February 2011, pp. 577-581. doi:10.1145/1947940.1948060
[10] A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, A. Heckert, J. Dray and S. Vo, “Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications,” Special Publication 800-22 Revision 1a, National Institute of Standards and Technology, 2010.
[11] Y. Wu, J. Noonan and S. Agaian, “Npcr and Uaci Randomness Tests for Image Encryption,” Cyber Journals: Multidisciplinary, Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), 2011, pp. 31-38.
[12] G. álvarez and S. Li, “Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems,” International Journal of Bifurcation and Chaos, Vol. 16, No. 8, 2006, pp. 2129-2151.
[13] T. Gao and Z. Chen, “Image Encryption Based on a New Total Shuffling Algorithm,” Chaos, Solitons and Fractals, Vol. 38, No. 1, 2008, pp. 213-220. doi:10.1016/j.chaos.2006.11.009
[14] X. Wang and J. Zhang, “An Image Scrambling Encryption Using Chaos-Controlled Poker Shuffle Operation,” Proceedings of International Symposium on Biometrics and Security Technologies, Islamabad, 23-24 April 2008, pp. 1-6.

comments powered by Disqus

Copyright © 2018 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.