Documente Academic
Documente Profesional
Documente Cultură
4, 2016 347
Department at VIT University Chennai Campus, India since 2012. She is the
author of about five scientific publications on journals and international
conferences. Her research interests include cloud computing, network security,
and cryptography. She has authored a journal paper in Science Direct which
has been the most downloaded article since 2012.
1 Introduction
The superabundant presence of digital contents and withal the ossification of the internet
technology has brought the concept of security and their attributes to the frontline. For
instance, telemedicine offers an interactive healthcare in remote locations where
the patient’s health related data and the medical images are transmitted across the
insecure channel. Secondly the satellite image furnishes time specific information which
is used in various applications such as defense, meteorology, remote sensing and
environmental protection. Finally the escalating growth of surveillance technology
favours the acute monitoring of personnel and public activity over the internet by the
government, private investigators and criminal organisations. In the aforementioned
applications, the quality of the service greatly relies on the security of image data during
its transmission and storage. The organisation or the government is obliged for holding
the data secure from unauthorised access for their systematic development. In this
perspective, cryptographic technique is the guideline which deals with the security issues
such as confidentiality, integrity, or authentication. The following are the four various
sub field of cryptography:
• modern cryptography
• quantum cryptography
• DNA cryptography
• chaotic cryptography.
The current cryptographic techniques is tabulated in Table 1 which shows that each
technique has its own strength and weakness with respect to security and efficiency. In
this respect, the exceptional performance of chaotic image encryption algorithms has
manifested itself in distinguished application. As depicted in Figure 1 the dynamical
properties of a chaotic system such as topological mixing, sensitivity to initial condition
and parameters, ergodicity, aperiodicity, deterministic characteristics synchronise with
those in cryptography. Evidently, it is also observed that the stability of the chaotic
encryption system does not depend on the environmental conditions and it is not device
dependant for its implementation. Apparently, chaotic-based encryption model are
preferred over the other types of the system. Hence the incorporation of chaotic dynamics
in cryptology, the science that deals with cryptography and cryptanalysis, is potentially a
new and effective way to deal with the highly secure image encryption.
A survey on security and efficiency issues in chaotic image encryption 349
Types of
Description Advantages Limitations
cryptography
Modern cryptography Algorithms operate Non-dependency on Absolutely
(DES (Tuchman, on strong the medium colossal impractical because
1997), IDES mathematical communication range of the inherent
(Dang and Chau, concepts that make multiple platforms properties of image
2000), AES (Zeghid them computationally for implementation. such as bulk data
et al., 1996), RSA efficient for very high security. capacity, strong
(Cormen et al., protection and correlation among
2001). secrecy of highly adjacent pixels and
sensitive. high redundancy.
Quantum Makes use of the The QKD would be Weak properties of
cryptography or secret key whose unconditionally coherent pulses and
quantum key randomness and secure even with the the detectors used in
distribution (QKD) secrecy are assured endurance of the implementation
based on the quantum computer of QKD (Valerio and
Heisenberg and with the users Christian, 2014).
uncertainty principle can perform QKD
of physics. without quantum
computers.
DNA cryptography The biological The adversary has to Don’t have enough
structure of DNA is fight against stability as the
used as an computational and biological molecules
information carrier to biological are tightly bounded
store and transmit burdensome to get with the
data. hold of the secret environmental
information. conditions such as
temperature,
moisture, pH, etc.
(Beenish, 2010).
Figure 1 Mapping between chaotic system and cryptography (see online version for colours)
350 J. Gayathri and S. Subashini
The utility of chaos in cryptography is established since 1989 with the best endeavours
from many different researchers. A huge number of image encryption algorithms have
been designed to ensure the security functionalities of information during its transmission
and storage. The description of these image encryption algorithms are given in Matthews
(1989), Wheeler (1989), Bianco and Mayhew (1994) and Biham (1991). These early
techniques till 1995 virtually represents all digital chaotic ciphers deployed the one time
pad. However, one time pad is not suitable for encrypting large amounts of data, such as
digital imagery, electronic databases and archives. Baptista et al. (1998) was the first to
explore the property of ergodicity of chaotic system in digital cryptography which
attracted much attention after its proposal. Alvarez et al. (1999) gave a second venture to
take advantage of the properties of chaotic ergodicity in cryptography. There after many
research efforts have been dedicated to the development of chaotic image encryption
algorithms. However these techniques do not fulfil the requirement of good cryptosystem
and are susceptible to different ambushes.
The concrete motive of the research on chaotic image encryption extracts from the
gap between the level of security in the prevalent image encryption applications and the
computation time of the encryption algorithms. Based on the level of security, image
applications are divided into two classes such as commercial applications and sensitive
application (Fuwen and Koenig, 2010). Sensitive applications such as confidential video
conferences, military and telemedicine have stronger security requirements same as that
of text encryption. In contrast, commercial applications such as mobile apps and pay TV
highly depend on the timeliness of the content. A chaotic image encryption should serve
as a significant outcome to bridging the gap and fade away the outrageous hindrances. A
decade ago, people were not concerned about the efficiency of the algorithm because the
intelligibility of the olden day applications did not show much demand for the speed of
the system. Along with the rapid advent of technology the gap expanded which caused a
serious impediment in the popularity of chaotic image encryption techniques. A host of
research has been established to ossify the growth of chaotic image encryption. Although
the development of chaotic image encryption is extremely striking, certain issues,
essentially the speed that restricts the penetration of these techniques into real world
application. Thus the exploration and study of chaotic system with respect to its security
and efficiency is considered as an integral part of deploying it in the cryptographic
applications.
The encryption algorithms are divided according to the type of chaotic system
employed so as to identify the features of chaos-based encryption algorithm. Based on
this classification, image encryption algorithms are inspected by considering various
aspects, such as security, encryption efficiency, and compression efficiency. The core
idea of the existing cryptosystems is focused to give a better understanding of the
approaches. The characteristic features and weaknesses of the algorithms in all the
categories are analysed to define a new encryption model. The paper is structured as
follows. Section 2 is devoted to the classification of image encryption schemes based on
the type of chaotic system employed in the three groups. The following three sub-sections
describe the working of the cryptosystems in all three groups with respect to the security
and efficiency. Section 3 summarises the challenges and future directions of the chaotic
image encryption algorithms. Section 4 provides final marks and conclusions derived
from this survey.
A survey on security and efficiency issues in chaotic image encryption 351
Figure 2 Classification of chaotic systems with examples (see online version for colours)
During the past decade, chaotic system has been propounded as a research component
and explored extensively to develop the cryptosystems for multimedia data. Chaotic
cryptography has taken two distinct directions with almost no interaction between
them, such as analogue chaotic communication (Mata-Machuca et al., 2012; Bai et al.,
2005; Samuel et al., 2007) and digital chaotic ciphers (Kanso and Ghebleh, 2012;
Xu et al., 2012; Behnia et al., 2008). The major difference between these two directions is
that in the former case a cipher requires a predetermined secret key, while the key in the
latter is the system itself. Based on the deployment of chaotic system, cryptosystems can
be classified into three categories namely chaotic maps described by difference equations,
hyper chaotic systems which are modelled by differential equations and spatiotemporal
chaotic systems represented by partial differential equations or difference equations
as in Figure 2. In the next section, discussion is restricted to the first class of chaotic
cryptosystems, i.e., ciphers based on chaotic maps (discrete systems). Table 2
summarises the relative comparison for various image encryption algorithm based on
chaotic maps discussed in literature.
Table 2 Feature comparison of various image encryption algorithm based on chaotic maps
Table 2 Feature comparison of various image encryption algorithm based on chaotic maps
(continued)
• the non-uniform data distribution of output chaotic sequences (Arroyo et al., 2008b)
• the system has limited or/and discontinuous range of chaotic behaviours
(Arroyo et al., 2008a).
On the other hand, the multidimensional chaotic maps have a much complex structures
and multiple parameters (Kanso and Ghebleh, 2012; Xu et al., 2012; Behnia et al., 2008)
due to which they have a promising application in image cryptosystems. However, their
hardware/software implementations burden and computational complexity increases with
the multiple parameters (Ye et al., 2010). Hence, implementation of a new chaotic
cryptosystem with better security and performance is a challenging task.
Zhou et al. (2014) proposed a flawless image encryption algorithm to counteract the
detriments caused by the 1D chaotic maps. The proposed new chaotic maps
such as the logistic-tent system [LTS – equation (1)], the logistic-sine system
[LSS – equation (2)], the tent-sine system [TSS – equation (3)] have oblivious superior
properties compared to the existing 1D chaotic map. The reconstructed property includes
more uniform density function, wider chaotic range and higher Lyapunov exponents. The
encryption procedure of the cryptosystem is iterated for four rounds which includes six
steps.
1 random pixel insertion: a random pixel is inserted in the start of each row to the plain
image of size M * N using a random function
2 row separation: each row is converted into a 1D matrix of length (N + 1)
3 1D supersession: a bit level XOR operation is performed between the data values in
each 1D matrix and the desultory sequence produced by the new chaotic system LTS
4 row accumulation: after processing the data value in each matrix, all the 1D matrices
are then combined to form a 2D image matrix C
5 image rotation: the 2D image matrix is then rotated counter clock-wise by 90 degrees
6 S-box substitution: the each pixel value of the 2D image matrix is replaced with the
values in the S-box.
Finally, being a symmetric encryption model, the decryption procedure is the inverse of
the encryption algorithm. Scrutinisation results and security dissection demonstrate the
effectiveness of the system, as well as the robustness against data loss and noise attacks.
⎧(rX n (1 − X ) + (4 − r ) X n / 2) mod1 X i < 0.5
X n +1 = ⎨ (1)
⎩(rX n (1 − X ) + (4 − r )(1 − X n ) / 2) mod1 X i ≥ 0.5
cryptosystem design based on 2D and 3D chaotic maps was made by Fridrich (1998). As
illustrated in Figure 3, the cryptosystem is based on the iteration of two processes such as
permutation and substitution. This architecture served as the fundamental structure for
many chaos-based ciphers that were proposed subsequently. In the permutation stage, the
pixel positions are shuffled by means of some chaotic map, but the histogram of the plain
image is same as that of the encrypted image due to the fact that the pixel values remain
the same. Therefore this method is not immune to statistical analysis. In the substitution
stage, the pixel values of the images are modified sequentially to ensure the avalanche
effect that a small change in one pixel of the plain image causes the corresponding
encrypted image to be entirely different. Thus the permutation–substitution process
repeats for a number of times to attain an admissible degree of security and performance.
This sub section is concentrated towards encryption approaches based on
multidimensional chaotic maps which focus on achieving better security.
⎡ x j +1 ⎤ ⎡1 u ⎤ ⎡xj ⎤
⎢ ⎥=⎢ ⎥ ⎢ ⎥ mod N (4)
⎣ y j +1 ⎦ ⎣v uv + 1⎦ ⎣ y j ⎦
N N ⎧k1 + k2 + … + kt = N
x j +1 = ( x j − N j ) + y j mod ⎪N = k + k +… + k
kj kj ⎪ i 1 2 i −1
With ⎨ (5)
y j +1 =
kj ⎛ N ⎞ ⎪ N i ≤ x j < Ni + ki
⎜ y j − y j mod ⎟Nj ⎪⎩0 ≤ y j ≤ N
N ⎝ k j ⎠
x j +1 = ( x j + y j ) mod N
⎛ x j +1 N ⎞ (6)
y j +1 = ⎜ y j + k sin mod N
⎝ 2Π ⎟⎠
different control parameters, thereby enabling the diffusion effect in the permutation
stage. After discretisation of the chaotic map, one has to confront the issue of periodicity.
A substitution process is supported by a logistic map (7) is initiated to address the issue
of periodicity. The diffusion effect is contributed by both permutation and substitution
process and thus the overall number of rounds to reach a high level of security is reduced.
Apart from security concerns, their experimental results show that the speed of the
conventional DES encryption algorithm is three times slower than their cipher and also
the speed of the algorithm is not linear with respect to the image size which makes it
suitable for fast real-world applications.
Due to the fact that the output of the 3D cat map was directly adopted (Fridrich, 1998;
Guanrong, et al., 2004) the chaotic map have not provided enough randomness, which
significantly decreases the resistance against various attacks (Wang et al., 2005;
Solak et al., 2010; Li et al., 2010). To counteract this problem, Kanso and Ghebleh
(2012) presented a novel encryption scheme based on 3D Arnold cat map (Figure 6).
According to three search rules, CR, DR and MR, the orbits of the 3D chaotic map is
irregularly decimated and then applied in the encryption process. The three phases of the
algorithm are:
1 Permutation is based on a 3D chaotic cat map under the search rule CR.
2 Under the mixing rule MR, the 3D chaotic map is iterated to obtain the random
sequence for scrambling and mixing of the permutated image.
3 Finally the scrambled image is subjected to substitution stage based on the output of
the chaotic map from rule DR. Their demonstrations show that the scheme offers
high security against crypt analytical attacks.
358 J. Gayathri and S. Subashini
⎧ xn +1 = 1 + yn − axn2
H ( x) = ⎨ (8)
⎩ yn +1 = bxn
362 J. Gayathri and S. Subashini
(10), a typical example of spatiotemporal system and widely used in image encryptions
techniques is not perfect (Rhouma and Belghith, 2008b, 2009). The limited and/or
discontinuous range of chaotic behaviours in its bifurcation diagram and the range of
control parameters is still restricted in many lattices of the CML. The existence of these
windows in the bifurcation diagram degrades the spatial ergodicity of the randomness of
the time sequence generated from CML. To counteract these limitations, a CML system
with new superior features for secure communication such as fewer periodic windows in
bifurcation diagrams, lower mutual information between lattices and a wide range of
parameters for chaotic behaviours, is proposed in Zhang and Wang (2014b), Ying and
Xing (2013), Sahar and Eftekhari-Moghadam (2009) and Ping et al. (2010). Thus the
exploration and study of spatiotemporal system (CML) is considered as an integral part
of deploying it in the cryptographic applications (Ping et al., 2010). In addition, the
design and assessment of CML systems with the following constraints are still open
issues.
• changing the type of coupling in the CML system
• changing the dimension of the CML system
• usage of non-identical local maps
• introduction of time delays in the CML system.
Though the aforementioned scheme focuses on the validation of the keystream to ensure
good cryptographic properties. The lattice initialisation which is closely tied to system
security is not considered (Lian, 2007).
368 J. Gayathri and S. Subashini
Lian (2007) came up with an idea of a stream cipher to target the aforementioned
issues. The cryptosystem is based on the pseudorandom sequences generated by the
spatiotemporal lattices [equation (15)]. The scheme performs the following three
individual operations: lattice initialisation, lattice iteration and sequence quantisation.
The resultant quantised sequence or the key stream obtained after the three phases is used
to encrypt the plain image:
⎧ i, j 1
⎪ yn +1 = (1 − ε ) f ( yn ) + ε [ f ( yn ) + f ( yn )
i, j i +1, j i , j +1
⎨ 2 (15)
⎪⎩ f ( x) = μ x(1 − x)
The obvious advantage of the scheme is that the encryption and compression processes
are done simultaneously. Compared to video compression, the computation time is very
less and considered to a better choice for real-time applications. However, this scheme
did not completely withstand chosen cipher text/plaintext attacks as it reuses the key
stream more than once. The key stream is independent of the plaintext and cipher text
which makes the key stream remain the same in every encryption process. This security
weakness was claimed by Rhouma and Belghith (2008) and they introduced an enhanced
cryptosystem to be robust against the aforementioned attacks by making it in a
propagating cipher-block chaining (PCBC) mode design. The generated keystream in the
enhanced version has good diffusion effect to suppress the potential attacks.
The undesirable cryptographic features of logistic map are small key space, non
uniform distribution and discontinuous chaotic behaviour which demotes them practical
application (Arroyo et al., 2008). Gao et al. (2006) presented an image encryption
algorithm based on a new chaotic map called the nonlinear chaotic algorithm (NCA)
[equation (16)] to tackle the problem of small key space. The nonlinear chaotic equation
replaces the linear function with power function and tangent function. Additionally, the
cipher designed in a one-time-one password fashion, that is, the plain image is encrypted
with different keys for different images. Though the scheme has large key space and
acceptable efficiency, it cannot resist the chosen-plaintext attack and known plaintext
attack as claimed by Alvarez and Li (2009). The author has shown that the new chaotic
map’s distribution is not close to ideal and has bad statistical properties which make it a
bad candidate for cryptographic application.
β
⎛ α ⎞⎛ 1⎞
xn +1 = (1 − β ).cot ⎜
−4
⎟ ⎜1 + ⎟ tg (α xn )(1 − xn )
β (16)
⎝1+ β ⎠⎝ β ⎠
Chun et al. (2013) constructed a new spatiotemporal chaotic map based on the NCA map
and developed a cryptosystem based on the constructed spatiotemporal chaotic map. The
cryptosystem followed the typical permutation-diffusion architecture which makes use of
NCA map for permutation stage and constructed spatiotemporal map for diffusion
process. Based on their experimental analysis, the author has claimed that the cipher is of
high key space, high key sensitivity and is secure enough to withstand various
crypto-analytical attacks. However the claim by the author is unfound as the underlying
NCA map used for permutation purpose has bad statistical characteristics (Alvarez and
Li, 2009). The ciphers built on this map are breakable through various complex attacks
(Rabei et al., 2015).
A survey on security and efficiency issues in chaotic image encryption 369
⎧ xi xi ≤ b
⎪ b
xi = ⎨ (17)
⎪(
1 − xi )
xi > b
⎩ (1 − b)
The security of the cryptosystem strongly relies on the dynamics of the chaotic system
employed and henceforth the crucial analysis of their dynamics becomes obligatory in the
design of a cryptosystem. As a proof-of-concept, Ying and Xing (2013) exploited the
dynamics of the spatiotemporal system by introducing the idea of non neighbourhood
A survey on security and efficiency issues in chaotic image encryption 371
coupling. The new features of the proposed system such as fewer periodic windows in
bifurcation diagrams, lower mutual information between lattices and a wide range of
parameters for chaotic behaviours are more suitable for cryptographic design. The new
spatiotemporal system based on non-adjacent coupling is utilised in the article proposed
by Zhang and Wang (2015). This article proposes an innovative design based on bit-level
permutation algorithm to improve its efficiency. The following are the major
contributions of the article.
• The crucial analysis of underlying chaotic dynamics [equation (18)] is done to
improve the suitability of the system for cryptographic application.
xn +1 (i ) = (1 − ε ) f ( xn (i )) + ε ( f ( xn ( j )) + f ( xn (k ))) (18)
2
• The algorithm incorporates bit level pixel permutation strategy to depute mutual
permutation of bit planes without using extra space. Zhang et al. (2013) proposed
expand-and-shrink strategy based on bit plane permutation which needs four times
extra space for bit-level permutations to break the statistical information in the bit
planes.
• The sensitivity of initial condition of the chaotic system is improved through Q(i)
which is formulated from the distinct combinations of secret key K.
• The algorithm avoids the problem of image size restriction and can be easily applied
for colour images also.
To get the ciphered image of a greyscale image P of size H * W (height * width), where it
is considered as a segment of S components of pixels column. Now the image will have
8*S bit components of N bits each. The cryptosystem consists of three phases: secret key
formation, bit-level permutation and diffusion phase respectively.
1 Secret key formulation: The cryptosystem employs a secret key of length longer than
400 bits (K) which is in turn divided into ten components of 40 bit each.
2 Bit-level permutation phase: The permuted image is generated by applying the
following equation:
⎡ j ⎤ ⎡1 p ⎤ ⎡i ⎤
⎢k ⎥ = ⎢q pq + 1⎥⎦ ⎢⎣i ⎥⎦
mod(8* S ) (19)
⎣ ⎦ ⎣
where i is the original bit group index in the P image (i = 0, 1, 2,. . ., 8 × S − 1);
j (j = 0, 1, 2, . . ., 8 × S − 1) is the location index of i bit group after permutation; k is
the number of times of rotation upward in the jth bit group; p and q are the control
parameters of the Arnold cat map. Each component (8 * S) will follow two steps.
• the j bit group of shuffled image m is obtained by mapping i bit group
• rotating upward k times of the plain image P.
The above two steps are repeated for 8*S times to complete the bit level permutation.
3 Diffusion phase: The permuted image will be diffused by chaotic sequences of the
NCML system [equation (18)] to obtain the ciphered image. To improve the
sensitivity of initial condition, distinct combinations of secret key is formulated. As
372 J. Gayathri and S. Subashini
3 Summary
Before concluding this paper, in this section the challenges, research issues, and future
directions in the area of chaos based image cryptosystem are discussed. Generally, an
effective image cryptosystem is often evaluated by a number of security measures. All
these measures are done to uphold the confusion and diffusion properties so as to thrash
the potential attacks. Table 7 summarises the efficiency comparison of image encryption
algorithms based on different chaotic systems using the identified criteria given in
Table 6. Thus the analysis shows that each algorithm has its own strength and weakness
with respect to security and efficiency. The indispensable problems of these algorithms
are linked to three aspects (Arroyo et al., 2008b).
A survey on security and efficiency issues in chaotic image encryption 373
Table 7
Chaotic systems Approaches Key space Entropy Encryption speed (ms) Image constraints
Chaotic maps Xiaojun et al. (2009) 4 * 1028 7.999205 121.7448027 Applicable for encryption of watermarks
systems
Wong et al. (2009) 3.43 * 10520 - 40.37 It can only encrypt standard images of N × N pixels
Kanso et al. (2012) > = 2480 7.9997 1.93 MB/s Algorithm takes an input of any size of colour and greyscale image
Fu et al. (2013) >2146 - 11 Suitable for both medical images and standard test images
Fu et al. (2012) 2167 7.9902 78 It can only encrypt images standard of N × N pixels
Tong (2013) 1056 7.9991736 181.09548
Chen et al. (2014) > 2149 7.997503 41 It can only encrypt standard images of N × N pixels
J. Gayathri and S. Subashini
Zhou et al. (2014) 1084 7.9982 407.1 Applicable to greyscale images, colour images, biometrics, and binary
images
Chen et al. (2015) 2197 7.999220 Acceptable speed Suitable for both medical images and standard test images
Hyper chaotic Gao et al. (2008) 1070 - Acceptable speed Encrypts only standard test images of square and non-square in size
systems Zhu et al. (2012) 2186. 7.9977 32 Encrypts only standard test images of square and non-square in size
Norouzi et al. (2012) 2186 7.9980 400 It can only encrypt standard images of N × N pixels.
Hegui et al. (2013) 10154 7.9973160 18 1 Encrypts only standard test images of square and non-square in size.
2 Fails to encrypt the fixed plaintext having only zero value
Xiao et al. (2015) 18 × 1056 7.9891 341.9 Encrypts only standard test images of square and non-square in size
Spatiotemporal Wang et al. (2011) 128-bit 7.9994 Acceptable speed It can only encrypt standard images of N × N pixels.
systems Chun et al. (2013) 1065 7.997 Acceptable speed Encrypts only standard test images of square and non-square in size
Zhu et al. (2011) - 7.9993097 36.1 Does not hold for medical images
Zhang et al. (2013) - 7.9993573 67 It can only encrypt images of N × N pixels.
Zhang and Wang (2014a) 10120 - 224.1 Encrypts only grey and colour images of square and non-square in size
Efficiency comparison of image encryption algorithms based on different chaotic
A survey on security and efficiency issues in chaotic image encryption 375
4 Conclusions
The encryption technology based on chaotic systems has been an active topic for more
than a decade due to its high expectations regarding a proliferation of applications in
various fields. This necessitates the design of a new encryption algorithm to meet the
376 J. Gayathri and S. Subashini
References
Alvarez, G. and Li, S. (2006) ‘Some basic cryptographic requirements for chaos-based
cryptosystem’, Int. J. Bifurcat. Chaos, Vol. 16, No. 8, pp.2129–2151.
Alvarez, G. and Li, S. (2009) ‘Crypt analyzing a nonlinear chaotic algorithm (NCA) for image
encryption’ analysis and control of chaotic system’, Queen Mary, University of London,
Communications in Nonlinear Science and Numerical Simulations, Vol. 14, No. 11,
pp.3743–3749.
Alvarez, E., Fernandez, A., Garcıa, P., Jiménez, J. and Marcano, A. (1999) ‘New approach to
chaotic encryption’, Physics Letters A, Vol. 263, No. 4, pp.373–375.
Alvarez, G., Montoya, F., Romera, M. and Pastor, G. (2003) ‘Cryptanalysis of a discrete chaotic
cryptosystem using external key’, Physics Letters A, Vol. 319, Nos. 3–4, pp.334–339.
Arroyo, D., Alvarez, G. and Fernandez, V. (2008a) ‘On the inadequacy of the logistic map for
cryptographic applications’, in L. Hernandez and A. Martin (Eds.): X Reunin Espanola sobre
Criptologıa y Seguridad de la Informaci´on (X RECSI), pp.77–82, Universidad de Salamanca,
Salamanca, Spain, ISBN 978–84– 691–5158–7.
Arroyo, D., Alvarez, G. and Li, S. (2008b) ‘Some hints for the design of digital chaos-based
cryptosystems: lessons learned from cryptanalysis’, in Second IFAC Conference on.
Arroyo, D., Diaz, J. and Rodriguez, F.B. (2013) ‘Cryptanalysis of a one round chaos-based
substitution permutation network’, Signal Processing, Vol. 93, No. 5, pp.1358–1364.
Arroyo, D., Li, C., Li, S., Alvarez, G. and Halang, WA. (2009) ‘Cryptanalysis of an image
encryption scheme based on a new total shuffling algorithm’, Chaos, Solitons & Fractals,
Vol. 41, No. 5, pp.2613–2616.
Bai, E-W., Lonngren, K.E. and Uçar, A. (2005) ‘Secure communication via multiple parameter
modulation in a delayed chaotic system’, Chaos, Solitons & Fractals, February, Vol. 23,
No. 3, pp.1071–1076.
Baptista, M.S. (1998) Phys. Lett. A, Vol. 240, Nos. 1–2, pp.50–54.
Behnia, S., Akhshani, A., Mahmodi, H. and Akhavan, A. (2008a) ‘A novel algorithm for image
encryption based on mixture of chaotic maps’, Chaos Solitons Fractals, Vol. 35, No. 2,
pp.408–419.
A survey on security and efficiency issues in chaotic image encryption 377
Behnia, S., Akhshania, A., Akhavanb, A. and Mahmodi, H. (2008b) ‘Chaotic cryptographic scheme
based on composition maps’, International Journal of Bifurcation and Chaos, Vol. 18, No. 1,
pp.251–261.
Belkhouche, F., Gokcen, I. and Qidwai, U. (2005) ‘Chaotic gray-level image transformation’, J.
Electron. Imaging, Vol. 14, No. 4, 043001.
Benrhouma, O., Houcemeddine, H. and Safya, B. (2013) ‘Security analysis and improvement of a
partial encryption scheme’, Multimed. Tools Appl., Vol. 74, No. 11, pp.3617–3634,
DOI: 10.1007/s11042-013-1790-4.
Bhatnagar, G. and Wu, Q.M.J. (2012) ‘Selective image encryption based on pixels of interest and
singular value decomposition’, Digit. Signal Process., Vol. 22, No. 4, pp.648–663.
Bianco, M.E. and Mayhew, G.L. (1994) High Speed Encryption System and Method, US Patent
No. 5365588, November 15.
Biham, E. (1991) ‘Cryptanalysis of the chaoticmap cryptosystem suggested at EUROCRYPT ‘91,
in Davies, D.W. (Ed.): Advances in Cryptology, EUROCRYPT, LNCS, Vol. 547, pp.532–534,
Springer-Verlag, Berlin.
Chen, J-x., Zhu, Z-l. and Yu, H. (2014) ‘A fast chaos-based symmetric image cryptosystem with an
improved diffusion scheme’, Optik, June, Vol. 125, No. 11, pp.2472–2478.
Chen, J-x., Zhu, Z-l., Fu, C., Zhang, L-b. and Zhang, Y. (2015) ‘An image encryption scheme using
nonlinear inter-pixel computing and swapping based permutation approach’ Commun.
Nonlinear Sci. Numer. Simulat., Vol. 23, Nos. 1–3, pp.294–310.
Chen, T.H. and Wu, C.S. (2010) ‘Compression-unimpaired batch-image encryption
combining vector quantization and index compression’, Information Sciences, Vol. 180, No. 9,
pp.1690–1701.
Cormen, T.H., Leiserson, C.E., Rivest, R.L. and Stein, C. (2001) Introduction to Algorithms,
2nd ed., MIT Press, McGraw-Hill Cambridge.
Dang, P.P. and Chau, P.M. (2000) ‘Implementation idea algorithm for image encryption’,
Proceedings of SPIE, SPIE Press, San Diego, CA, pp.1–9.
Fridrich, J. (1998) ‘Symmetric ciphers based on two dimensional chaotic maps’, Int. J. Bifurcat
Chaos, Vol. 8, No. 6, pp.1259–1284.
Fu, C., Chen, J.J., Zou, H., Meng, W.H., Zhan, Y.F. and Yu, Y.W. (2012) ‘A chaos-based digital
image encryption scheme with an improved diffusion strategy’, Opt. Express, Vol. 20, No. 3,
pp.2363–2378.
Fu, C., Meng, W-h., Zhan, Y-f., Zhu, Z-l., Lau, F.C.M., Tse, C.K. and Mae, H-f. (2013)
‘An efficient and secure medical image protection scheme based on chaotic maps’, Computers
in Biology and Medicine, Vol. 43, No. 8, pp.1000–1010.
Fuwen, L. and Koenig, H. (2010) ‘A survey of video encryption algorithms’, Computers &Security,
February, Vol. 29, No. 1, pp.3–15.
Gao, H., Zhang, Y., Liang, S. and Li, D. (2006) ‘A new chaotic algorithm for image encryption’,
Chaos Solitons Fract., Vol. 29, No. 2, pp.393–399.
Gao, T. and Chen Z. (2007) ‘Image encryption based on a new total shuffling algorithm’,
Chaos, Solitons and Fractals, Vol. 38, No. 1, pp.213–220, DOI: 10.1016/j.chaos.2006.11.009.
Gao, T. and Chen, Z. (2008) ‘A new image encryption algorithm based on hyper-chaos’,
Phys. Lett. A, Vol. 372, No. 4, pp.394–400.
Ge, X., Liu, F., Lu, B. and Yang, C. (2010) ‘Improvement of Rhouma’s attacks on Gao algorithm’,
J. Phys. Lett A, Vol. 374, Nos. 11–12, pp.1362–1367.
Gu, G. and Ling, J. (2014) ‘A fast image encryption method by using chaotic 3D cat maps’, Optik,
Vol. 125, No. 17, pp.4700–4705.
Guan, Z., Huang, F. and Guan, W. (2005) ‘Chaos-based image encryption algorithm’, Phys. Lett. A,
Vol. 346, Nos. 1–3, pp.153–157.
Guanrong, C., Yaobin, M. and Charles, K.C. (2004) ‘A symmetric image encryption scheme based
on 3D chaotic cat maps’, Chaos Soliton Fract., Vol. 21, No. 3, pp.749–761.
378 J. Gayathri and S. Subashini
Houcemeddine, H., Rhouma, R. and Safya, B. (2010) ‘Joint compression and encryption
using chaotically mutated Huffman trees’, Communications in Nonlinear, Vol. 15, No. 10,
pp.2987–2999.
Houcemeddine, H., Rhouma, R. and Safya, B. (2013) ‘Improvement of an image encryption
algorithm based on hyper-chaos’, Telecommun Syst., Vol. 52, No. 2, pp.539–549.
Kanso, A. and Ghebleh, M. (2012) ‘A novel image encryption algorithm based on a 3D chaotic
map’, Commun. Nonlinear Sci. Numer. Simul., Vol. 17, No. 7, pp.2943–2959.
Kwok, H.S. and Tang, W.K.S. (2007) ‘A fast image encryption system based on chaotic maps with
finite precision representation’, Chaos, Solitons and Fractals, Vol. 32, No. 4, pp.1518–1529.
Li, C., Arroyo, D. and Lo, K-T. (2010) ‘Breaking a chaotic cryptographic scheme based on
composition maps’, International Journal of Bifurcation and Chaos, August, Vol. 20, No. 8,
pp.2561–2568.
Li, C., Li, S. and Lo, K-T. (2011) ‘Breaking a modified substitution–diffusion image cipher based
on chaotic standard and logistic maps’, Commun. Nonlinear Sci. Numer. Simulat., Vol. 16,
No. 2, pp.837–843.
Li, C., Li, S., Alvarez, G., Chen, G. and Lo, K.T. (2006a) ‘Cryptanalysis of a chaotic block cipher
with external key and its improved version’, Chaos, Solitons & Fractals, Vol. 37, No. 1,
pp.299–307, DOI: 10.1016/j.chaos.2006.08.025.
Li, P., Li, Z., Halanga, W.A. and Chen, G. (2006b) ‘A multiple pseudorandom-bit generator based
on a spatiotemporal chaotic map’, Phys. Lett. A, Vol. 349, No. 6, pp.467–473.
Li, C., Li, S., Asim, M., Nunez, J., Alvarez, G. and Chen, G. (2009) ‘On the security defects of an
image encryption scheme’, Image and Vision Computing, Vol. 27, No. 9, pp.1371–1381.
Li, J. and Knipe, H. (1997) ‘Cheng, image compression and encryption using tree structures’,
Pattern Recognition Letters, Vol. 18, Nos. 11–13, pp.1253–1259.
Li, P., Li, Z., Halang, W.A. And Chen, G. (2007) ‘A stream cipher based on a spatiotemporal
chaotic system’, Chaos, Solitons & Fractals, Vol. 32, No. 5, pp.1867–176.
Li, S., Li, Q., Li, W., Mou, X. and Cai, Y. (2001) ‘Statistical properties of digital piecewise linear
chaotic maps and their roles in cryptography and pseudo-random coding’, IMA Int. Conf.
Crypt. & Coding, Springer-Verlag, Berlin, pp.205–221.
Lian, S. (2009) ‘Efficient image or video encryption based on spatiotemporal chaos system’,
Chaos, Solitons and Fractals, Vol. 40, No. 5, pp.2509–2519.
Lian, S.G., Sun, J. and Wang, Z. (2005) ‘A block cipher based on a suitable use of the chaotic
standard map’, Chaos Soliton Fract., Vol. 26, No. 1, pp.117–129.
Liu, H. and Liu, Y. (2014) ‘Security assessment on block-Cat-map based permutation applied to
image encryption scheme’, Optics &Laser Technology, Vol. 56, pp.56313–56316.
Maniccam, S.S. and Bourbakis, N.G. (2001) ‘Lossless image compression and encryption using
SCAN’, Pattern Recognition, Vol. 34, No. 6, pp.1229–1245.
Mao, YB., Chen, G. and Lian, SG. (2004) ‘A novel fast image encryption scheme based on 3D
chaotic baker maps’, Int. J. Bifurcat Chaos, Vol. 14, No. 10, pp.3613–3624.
Mata-Machuca, J.L., Martínez-Guerra, R., Aguilar-López, R. and Aguilar-Ibañez, C. (2012)
‘A chaotic system in synchronization and secure communications’, Communications in
Nonlinear Science and Numerical Simulation, April, Vol. 17, No. 4, pp.1706-1713.
Matthews, R. (1989) ‘On the derivation of a ‘chaotic’ encryption algorithm’, Cryptologia XIII,
pp.29–42.
Mirzaei, O., Yaghoobi, M. and Irani, H. (2012) ‘A new image encryption method: parallel sub-
image encryption with hyper chaos’, Nonlinear Dyn., Vol. 67, pp.557–566.
Norouzi, B., Mirzakuchaki, S., Seyedzadeh, S.M. and Mosavi, M.R. (2012) ‘A simple, sensitive
and secure image encryption algorithm based on hyper-chaotic system with only
one round diffusion’, Multimed. Tools Appl., Vol. 71, No. 3, pp.1469–1497, DOI: 10.1007/
s11042-012-1292-9.
A survey on security and efficiency issues in chaotic image encryption 379
Ozkaynak, F., Ozer, A.B. and Yavuz, S. (2012) ‘Cryptanalysis of a novel image encryption scheme
based on improved hyperchaotic sequences’, Optics Communications, Vol. 285, No. 24,
pp.4946–4948.
Pareek, N.K., Patidar, V. and Sud, K.K. (2003) ‘Discrete chaotic cryptography using external key’,
Physics Letters A, Vol. 309, Nos. 1–2, pp.75–82.
Pareek, N.K., Patidar, V. and Sud, K.K. (2005) ‘Cryptography using multiple one-dimensional
chaotic maps’, Communications in Nonlinear Science and Numerical Simulation, Vol. 10,
No. 7, pp.715–723.
Pareek, N.K., Patidar, V. and Sud, K.K. (2006) ‘Image encryption using chaotic logistic map’,
Image and Vision Computing, Vol. 24, No. 9, pp.926–934.
Patidar, V., Pareek, N.K. and Sud, K.K. (2009) ‘A new substitution diffusion based image cipher
using chaotic standard and logistic maps’, Commun. Nonlinear Sci. Numer. Simulat., Vol. 14,
No. 7, pp.3056–3075.
Patidar, V., Pareek, N.K., Purohit, G. and Sud, K.K. (2010) ‘Modified substitution–diffusion image
cipher using chaotic standard and logistic maps’, Commun. Nonlinear Sci. Numer. Simulat.,
Vol. 15, No. 10, pp.2755–2765.
Ping, L., Zhong, L. and Halang, W.A. (2010) ‘Cryptography based on spatiotemporal chaotic
systems’, in Zelinka et al. (Eds.): Evolutionary Algorithms and Chaotic Systems, pp.293–328,
Springer-Verlag Berlin Heidelberg, SCI 267.
Rabei, B., Houcemeddine, H., El-Latif, A.A.A., Rhouma, R. and Safya, B. (2015) ‘Breaking an
image encryption scheme based on a spatiotemporal chaotic system’, Signal Processing:
Image Communication, Vol. 39, pp.151–158.
Rech, P.C. (2011) ‘Chaos and hyperchao sina hopfield neural network’, Neuro Computing, Vol. 74,
No. 17, pp.3361–3364.
Rhouma, R. and Belghith, S. (2008a) ‘Cryptanalysis of a new image encryption algorithm based on
hyper-chaos’, Phys. Lett. A, Vol. 372, No. 38, pp.5973–5978.
Rhouma, R. and Belghith, S. (2008b) ‘Cryptanalysis of a spatiotemporal chaotic image/video
cryptosystem’, Physics Letters A, Vol. 372, No. 36, pp.5790–5794.
Rhouma, R. and Belghith, S. (2009) ‘Cryptanalysis of a spatiotemporal chaotic cryptosystem’,
Chaos, Solitons and Fractals, Vol. 41, No. 4, pp.1718–1722.
Rhouma, R., Ercan, S. and Belghith, S. (2010) ‘Cryptanalysis of a new substitution-diffusion based
image cipher’, Commun. Nonlinear Sci. Numer. Simulat., Vol. 15, No. 7, pp.1887–1892.
Rössler, O.E. (1976) ‘An equation for continuous chaos original research article’, Phys. Lett. A,
Vol. 57, No. 5, pp.397–398.
Sahar, M. and Eftekhari-Moghadam, A.M. (2009) ‘Color image encryption based on coupled
nonlinear chaotic map’, Chaos, Solitons and Fractals, Vol. 42, No. 3, pp.1745–1754.
Samuel, B., Moukam Kakmeni, F.M. and Siewe M. (2007) ‘Secure communication via parameter
modulation in a class of chaotic systems’, Communications in Nonlinear Science and
Numerical Simulation, June, Vol. 12, No. 3, pp.397–410.
Shannon, C. (1949) ‘Communication theory of secrecy systems’, Bell. Syst. Tech. J., Vol. 28,
No. 4, pp.658–715.
Solak, E., Çokal, C., Yildiz, OT. and Biyikog_lu, T. (2010) ‘Cryptanalysis of Fridrich’s chaotic
image encryption’, Int. J. Bifurcat Chaos, Vol. 20, No. 5, pp.1405–1413.
Song, C-Y., Qiao, Y-L. and Zhang, X-Z. (2013) ‘An image encryption scheme based on new
spatiotemporal chaos’, Optik, Vol. 124, No. 18, pp.3329–3334.
Stinson, D.R. (2009) Cryptography: Theory and Practice, CRC Press, Boca Raton, FL.
Tang, G., Wang, S., Lu, H. and Hu, G. (2003) ‘Chaos-based cryptography incorporated with S-box
algebraic operation’, Phys. Lett. A, Vol. 318, Nos. 4–5, pp.388–398.
Tong, X.J. (2013) ‘Design of an image encryption scheme based on a multiple chaotic map’,
Communications in Nonlinear Science and Numerical Simulation, Vol. 18, No. 7,
pp.1725–1733.
380 J. Gayathri and S. Subashini
Zhang, Y-Q. and Wang, X-Y. (2015) ‘A new image encryption algorithm based on non-adjacent
coupled map lattices’, Information Sciences, Vol. 273, pp.329–351.
Zhou, Y., Bao, L. and Chen, C.L.P. (2014) ‘A new 1D chaotic system for image encryption’,
Sig Process., Vol. 97, pp.172–182.
Zhu, C. (2012) ‘A novel image encryption scheme based on improved hyperchaotic sequences’,
Optics Communications, Vol. 285, No. 1, pp.29–37.
Zhu, C., Liao, C. and Deng, X. (2013a) ‘Breaking and improving an image encryption
scheme based on total shuffling scheme’, Nonlinear Dyn., Vol. 71, No. 1, pp.25–34,
DOI: 10.1007/s11071-012-0639-0.
Zhu, H., Zhao, C. and Zhang, X. (2013b) ‘A novel image encryption compression scheme using
hyper-chaos and Chinese remainder theorem’, Signal Processing: Image Communication,
Vol. 28, No. 6, pp.670–680.
Zhu, Z.L., Zhang, W., Wong, K.W. and Yu, H. (2011) ‘A chaos-based symmetric image encryption
scheme using a bit-level permutation’, Inf. Sci., Vol. 181, No. 6, pp.1171–1186.