Image Encryption Based on the General Approach for Multiple Chaotic Systems
Qais H. Alsafasfeh, Aouda A. Arfoa
DOI: 10.4236/jsip.2011.23033   PDF   HTML     5,731 Downloads   11,327 Views   Citations


In the recent years, researchers developed image encryption methods based on chaotic systems. This paper proposed new image encryption technique based on new chaotic system by adding two chaotic systems: the Lorenz chaotic system and the Rössler chaotic system. The main advantage of this technique is stronger security, as is shown in the encryption tests.

Share and Cite:

Q. Alsafasfeh and A. Arfoa, "Image Encryption Based on the General Approach for Multiple Chaotic Systems," Journal of Signal and Information Processing, Vol. 2 No. 3, 2011, pp. 238-244. doi: 10.4236/jsip.2011.23033.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] Z. Guan, F. Huang and W. Guan, “Chaos-Based Image Encryption Algorithm,” Physics Letters A, Vol. 346, No. 1-3, 2005, pp. 153-157. doi:10.1016/j.physleta.2005.08.006
[2] H. H. Nien, C. K. Huang, S. K. Changchien, H. W. Shieh, C. T. Chen and Y. Y. Tuan, “Digital Color Image Encoding and Decoding Using a Novel Chaotic Random Generator,” Chaos Solitons and Fractals, Vol. 32, No. 3, 2005, pp. 1070-1080. doi:10.1016/j.chaos.2005.11.057
[3] Q. Alsafasfeh and A. Alshabatat, “Image Encryption Based on Synchronized Communication Chaotic Circuit,” Journal of Applied Sciences Research, Vol. 7, No. 4, 2011, pp. 392-399.
[4] H. Gao, Y. Zhang, S. Liang and D. Li, “A New Chaotic Algorithm for Image Encryption,” Chaos Solitons and Fractals, Vol. 29, No. 2, 2006, pp. 393-399. doi:10.1016/j.chaos.2005.08.110
[5] C. Fu, Z. Zhang and Y. Cao, “An Improved Image Encryption Algorithm Based on Chaotic Maps,” Third International Conference on Natural Computation, Vol. 3, Washington, 2007, pp. 24-27.
[6] L. Zhang, X. Liao and X. Wang, “An Image Encryption Approach Based on Chaotic Maps,” Chaos Solitons and Fractals, Vol. 24, No. 3, 2005, pp. 759-765. doi:10.1016/j.chaos.2004.09.035
[7] S. Bu and B. Wang, “Improving the Security of Chaotic Encryption by Using a Simple Modulating Method,” Chaos Solitons and Fractals, Vol. 19, No. 4, 2003, pp. 919-924. doi:10.1016/S0960-0779(03)00260-1
[8] X. Wu, H. Hu and B. Zhang, “Analyzing and Improving a Chaotic Encryption Method,” Chaos Solitons and Fractals, Vol. 22, No. 2, 2004, pp. 367-373. doi:10.1016/j.chaos.2004.02.009
[9] G. Chen, Y. Mao and C. K. Chui, “A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps,” Chaos Solitons and Fractals, Vol. 21, No. 3, 2003, pp. 749-761. doi:10.1016/j.chaos.2003.12.022
[10] F. Chiaraluce, L. Ciccarelli, E. Gambi, P. Pierleoni and M. Reginelli, “A New Chaotic Algorithm for Video Encryption,” IEEE Transactions on Consumer Electronics, Vol. 48, No. 4, 2002, pp. 838-844. doi:10.1109/TCE.2003.1196410
[11] K. Wong, B. Kwok and W. Law, “A Fast Image Encryption Scheme Based on Chaotic Standard Map,” City University of Hong Kong, Hong Kong.
[12] L. Wang, Q. Ye, Y. Xiao, Y. Zou and B. Zhang, “An Image Encryption Scheme Based on Cross Chaotic Map,” Congress on Image and Signal Processing, Sanya, 27-30 May 2008, pp. 27-26.
[13] Q. Alsafasfeh and M. Alarni, “A New Chaotic Attractor from Lorenz and Rossler Systems and Its Electronic Experimental Implementation,” Circuits and Systems, Vol. 2, No. 2, 2011, pp. 101-105. doi:10.4236/cs.2011.22015
[14] T. Ga and Z. Chen, “Image Encryption Based on a New Total Shuffling Algorithm,” Chaos Solitons & Fractals, Vol. 38, No. 1, 2008, pp. 213-220. doi:10.1016/j.chaos.2006.11.009
[15] N. K. Pareek, V. Patidar and K. K. Sud, “Image Encryption Using Chaotic Logistic Map,” Image and Vision Computing, Vol. 24, No. 9, 2006, pp. 926-934. doi:10.1016/j.imavis.2006.02.021
[16] V. Patidar, N. K. Pareek and K. K. Sud, “A New Substitution-Diffusion Based Image Encrypete Using Chaotic Standard and Logistic Maps,” Communications in Non-Linear Science and Numerical Simulation, Vol. 14, No. 7, 2009, pp. 3056-3075. doi:10.1016/j.cnsns.2008.11.005

Copyright © 2022 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.