Research Article
PDF EndNote BibTex RIS Cite

Year 2020, Volume 2, Issue 1, 17 - 22, 30.06.2020

Abstract

References

  • Ahmad, J. and S. O. Hwang, 2015 Chaos-based diffusion for highly autocorrelated data in encryption algorithms. Nonlinear Dynamics 82: 1839–1850.
  • Ahmad, J. and S. O. Hwang, 2016 A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools and Applications 75: 13951–13976.
  • Ahmad, J., A. Tahir, J. S. Khan, M. A. Khan, F. A. Khan, et al., 2019 A partial ligt-weight image encryption scheme. In 2019 UK/China Emerging Technologies (UCET), pp. 1–3, IEEE.
  • Al-Maadeed, S., A. Al-Ali, and T. Abdalla, 2012 A new chaosbased image-encryption and compression algorithm. Journal of Electrical and computer Engineering 2012.
  • Anter, A. M. and M. Ali, 2020 Feature selection strategy based on hybrid crow search optimization algorithm integrated with chaos theory and fuzzy c-means algorithm for medical diagnosis problems. Soft Computing 24: 1565– 1584.
  • Aziz Shah, S., J. Ahmad, A. Tahir, F. Ahmed, G. Russel, et al., 2020 Privacy-preserving non-wearable occupancy monitoring system exploiting wi-fi imaging for next-generation body centric communication. Micromachines 11: 379.
  • Cai, Q., 2019 A secure image encryption algorithm based on composite chaos theory. Traitement du Signal 36: 31–36.
  • Chai, X., Z. Gan, Y. Lu, Y. Chen, and D. Han, 2017 Anovel image encryption algorithm based on the chaotic system and dna computing. International Journal of Modern Physics C 28: 1750069.
  • Chand, S., R. Aggarwal, and E. Dubey, 2015 A review of image encryption using chaos based techniques. International Journal of Science and Research 7: 1871–1875.
  • Dooley, K. J., 2009 The butterfly effect of the" butterfly effect". Nonlinear dynamics, psychology, and life sciences 13: 279.
  • Fridrich, J., 1998 Symmetric ciphers based on twodimensional chaotic maps. International Journal of Bifurcation and chaos 8: 1259–1284.
  • Hamid, H., F. Ahmed, and J. Ahmad, 2020 Robust image hashing scheme using laplacian pyramids. Computers & Electrical Engineering 84: 106648.
  • Hasanzadeh, E. and M. Yaghoobi, 2019 A novel color image encryption algorithm based on substitution box and hyper-chaotic system with fractal keys. Multimedia Tools and Applications pp. 1–19.
  • Huang, H. and S. Yang, 2016 Colour image encryption based on logistic mapping and double random-phase encoding. IET Image Processing 11: 211–216.
  • Khellat, F., 2015 Delayed feedback control of bao chaotic system based on hopf bifurcation analysis. Journal of Engineering Science and Technology Review 8: 7–11.
  • Lee, K.W. and S. N. Singh, 2011 Non-certainty-equivalent adaptive control of chaos in lorenz system. International Journal of Modelling, Identification and Control 13: 310– 318.
  • Li, C., G. Luo, and C. Li, 2019 An image encryption scheme based on the three-dimensional chaotic logistic map. IJ Network Security 21: 22–29.
  • Li, C., G. Luo, K. Qin, and C. Li, 2017 An image encryption scheme based on chaotic tent map. Nonlinear Dynamics 87: 127–133.
  • Liu, Y., Z. Jiang, X. Xu, F. Zhang, and J. Xu, 2020 Optical image encryption algorithm based on hyper-chaos and public-key cryptography. Optics & Laser Technology 127: 106171.
  • Masood, F., J. Ahmad, S. A. Shah, S. S. Jamal, and I. Hussain, 2020a A novel hybrid secure image encryption based on julia set of fractals and 3d lorenz chaotic map. Entropy 22: 274.
  • Masood, F., J. Ahmad, S. A. Shah, S. S. Jamal, and I. Hussain, 2020b A novel secure occupancy monitoring scheme based on multi-chaos mapping. Symmetry 12: 350.
  • Patel, S., R. K. Muthu, et al., 2020 Image encryption decryption using chaotic logistic mapping and dna encoding. arXiv preprint arXiv:2003.06616 .
  • Šarlošia, J., J. Bockob, and R. Suroveca, 2014 Deterministic chaos. Procedia Engineering 96: 458–466.
  • Schuster, H. G. and W. Just, 2006 Deterministic chaos: an introduction. JohnWiley & Sons.
  • Seyedzadeh, S. M. and S. Mirzakuchaki, 2012 A fast color image encryption algorithm based on coupled twodimensional piecewise chaotic map. Signal processing 92: 1202–1215.
  • Shah, S. I., S. Y. Shah, and S. A. Shah, 2019 Intrusion detection through leaky wave cable in conjunction with channel state information. In 2019 UK/China Emerging Technologies (UCET), pp. 1–4, IEEE.
  • Stöckmann, H.-J., 2000 Quantum chaos: an introduction. Thietart, R.-A. and B. Forgues, 1995 Chaos theory and organization Organization science 6: 19–31.
  • Yassen, M., 2003 Chaos control of chen chaotic dynamical system. Chaos, Solitons & Fractals 15: 271–283.
  • Yildiz, M. Z., O. Boyraz, E. Guleryuz, A. Akgul, and I. Hussain, 2019 A novel encryption method for dorsal hand vein images on a microcomputer. IEEE Access 7: 60850– 60867.
  • Zhu, H., X. Zhang, H. Yu, C. Zhao, and Z. Zhu, 2016 A novel image encryption scheme using the composite discrete chaotic system. Entropy 18: 276.

Chaos Theory and its Application: An Essential Framework for Image Encryption

Year 2020, Volume 2, Issue 1, 17 - 22, 30.06.2020

Abstract

With the advancement in digital technologies and the demand for secure communication, there is an increased interest in the design and implementation of reliable image encryption schemes. This paper presents a thorough review of chaos theory and its application in image encryption schemes. Due to ergodicity and initial key sensitivity, chaos-based image encryption schemes have several advantages over traditional encryption schemes. The paper discusses the major applications of chaos theory, particularly in mage encryption area. The use of different chaotic maps such as one and multi-dimensional chaos, hyper and composite chaos in image encryption have been presented. The paper also discusses current trends and future research directions in the field of chaotic image encryption. This work provides a foundation for future research work along with providing basic understanding to new researchers. Several recommendations have been suggested that can improve a chaos-based cryptosystem.

References

  • Ahmad, J. and S. O. Hwang, 2015 Chaos-based diffusion for highly autocorrelated data in encryption algorithms. Nonlinear Dynamics 82: 1839–1850.
  • Ahmad, J. and S. O. Hwang, 2016 A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools and Applications 75: 13951–13976.
  • Ahmad, J., A. Tahir, J. S. Khan, M. A. Khan, F. A. Khan, et al., 2019 A partial ligt-weight image encryption scheme. In 2019 UK/China Emerging Technologies (UCET), pp. 1–3, IEEE.
  • Al-Maadeed, S., A. Al-Ali, and T. Abdalla, 2012 A new chaosbased image-encryption and compression algorithm. Journal of Electrical and computer Engineering 2012.
  • Anter, A. M. and M. Ali, 2020 Feature selection strategy based on hybrid crow search optimization algorithm integrated with chaos theory and fuzzy c-means algorithm for medical diagnosis problems. Soft Computing 24: 1565– 1584.
  • Aziz Shah, S., J. Ahmad, A. Tahir, F. Ahmed, G. Russel, et al., 2020 Privacy-preserving non-wearable occupancy monitoring system exploiting wi-fi imaging for next-generation body centric communication. Micromachines 11: 379.
  • Cai, Q., 2019 A secure image encryption algorithm based on composite chaos theory. Traitement du Signal 36: 31–36.
  • Chai, X., Z. Gan, Y. Lu, Y. Chen, and D. Han, 2017 Anovel image encryption algorithm based on the chaotic system and dna computing. International Journal of Modern Physics C 28: 1750069.
  • Chand, S., R. Aggarwal, and E. Dubey, 2015 A review of image encryption using chaos based techniques. International Journal of Science and Research 7: 1871–1875.
  • Dooley, K. J., 2009 The butterfly effect of the" butterfly effect". Nonlinear dynamics, psychology, and life sciences 13: 279.
  • Fridrich, J., 1998 Symmetric ciphers based on twodimensional chaotic maps. International Journal of Bifurcation and chaos 8: 1259–1284.
  • Hamid, H., F. Ahmed, and J. Ahmad, 2020 Robust image hashing scheme using laplacian pyramids. Computers & Electrical Engineering 84: 106648.
  • Hasanzadeh, E. and M. Yaghoobi, 2019 A novel color image encryption algorithm based on substitution box and hyper-chaotic system with fractal keys. Multimedia Tools and Applications pp. 1–19.
  • Huang, H. and S. Yang, 2016 Colour image encryption based on logistic mapping and double random-phase encoding. IET Image Processing 11: 211–216.
  • Khellat, F., 2015 Delayed feedback control of bao chaotic system based on hopf bifurcation analysis. Journal of Engineering Science and Technology Review 8: 7–11.
  • Lee, K.W. and S. N. Singh, 2011 Non-certainty-equivalent adaptive control of chaos in lorenz system. International Journal of Modelling, Identification and Control 13: 310– 318.
  • Li, C., G. Luo, and C. Li, 2019 An image encryption scheme based on the three-dimensional chaotic logistic map. IJ Network Security 21: 22–29.
  • Li, C., G. Luo, K. Qin, and C. Li, 2017 An image encryption scheme based on chaotic tent map. Nonlinear Dynamics 87: 127–133.
  • Liu, Y., Z. Jiang, X. Xu, F. Zhang, and J. Xu, 2020 Optical image encryption algorithm based on hyper-chaos and public-key cryptography. Optics & Laser Technology 127: 106171.
  • Masood, F., J. Ahmad, S. A. Shah, S. S. Jamal, and I. Hussain, 2020a A novel hybrid secure image encryption based on julia set of fractals and 3d lorenz chaotic map. Entropy 22: 274.
  • Masood, F., J. Ahmad, S. A. Shah, S. S. Jamal, and I. Hussain, 2020b A novel secure occupancy monitoring scheme based on multi-chaos mapping. Symmetry 12: 350.
  • Patel, S., R. K. Muthu, et al., 2020 Image encryption decryption using chaotic logistic mapping and dna encoding. arXiv preprint arXiv:2003.06616 .
  • Šarlošia, J., J. Bockob, and R. Suroveca, 2014 Deterministic chaos. Procedia Engineering 96: 458–466.
  • Schuster, H. G. and W. Just, 2006 Deterministic chaos: an introduction. JohnWiley & Sons.
  • Seyedzadeh, S. M. and S. Mirzakuchaki, 2012 A fast color image encryption algorithm based on coupled twodimensional piecewise chaotic map. Signal processing 92: 1202–1215.
  • Shah, S. I., S. Y. Shah, and S. A. Shah, 2019 Intrusion detection through leaky wave cable in conjunction with channel state information. In 2019 UK/China Emerging Technologies (UCET), pp. 1–4, IEEE.
  • Stöckmann, H.-J., 2000 Quantum chaos: an introduction. Thietart, R.-A. and B. Forgues, 1995 Chaos theory and organization Organization science 6: 19–31.
  • Yassen, M., 2003 Chaos control of chen chaotic dynamical system. Chaos, Solitons & Fractals 15: 271–283.
  • Yildiz, M. Z., O. Boyraz, E. Guleryuz, A. Akgul, and I. Hussain, 2019 A novel encryption method for dorsal hand vein images on a microcomputer. IEEE Access 7: 60850– 60867.
  • Zhu, H., X. Zhang, H. Yu, C. Zhao, and Z. Zhu, 2016 A novel image encryption scheme using the composite discrete chaotic system. Entropy 18: 276.

Details

Primary Language English
Subjects Engineering, Electrical and Electronic
Journal Section Research Articles
Authors

Arshad . This is me
University of Strathclyde
0000-0001-8621-2773
United Kingdom


Shahtaj SHAUKAT This is me
HITEC University
0000-0001-6727-9980
Pakistan


Arshid ALİ This is me
University of Engineering and Technology, Peshawar
0000-0002-7813-846X
Pakistan


Amna ELEYAN This is me
Manchester Metropolitan University
0000-0002-2025-3027
United Kingdom


Syed Aziz SHAH This is me
Manchester Metropolitan University
0000-0003-2052-1121
United Kingdom


Jawad AHMAD> (Primary Author)
Edinburgh Napier University, United Kingdom
0000-0001-6289-8248
United Kingdom

Publication Date June 30, 2020
Published in Issue Year 2020, Volume 2, Issue 1

Cite

APA ., A. , Shaukat, S. , Ali, A. , Eleyan, A. , Shah, S. A. & Ahmad, J. (2020). Chaos Theory and its Application: An Essential Framework for Image Encryption . Chaos Theory and Applications , 2 (1) , 17-22 . Retrieved from https://dergipark.org.tr/en/pub/chaos/issue/53876/718656

Chaos Theory and Applications in Applied Sciences and Engineering: An interdisciplinary journal of nonlinear science 23830