Chaos Theory and its Application: An Essential Framework for Image Encryption

Arshad, Shahtaj Shaukat, Arshid Ali, Amna Eleyan, Syed Shah, Ahmad Jawad

Research output: Contribution to journalArticlepeer-review

34 Citations (Scopus)
111 Downloads (Pure)

Abstract

With the advancement in digital technologies and the demand for secure communication, there is an increased interest in the design and implementation of reliable image encryption schemes. This paper presents a thorough review of chaos theory and its application in image encryption schemes. Due to ergodicity and initial key sensitivity, chaos-based image encryption schemes have several advantages over traditional encryption schemes. The paper discusses the major applications of chaos theory, particularly in mage encryption area. The use of different chaotic maps such as one and multi-dimensional chaos, hyper and composite chaos in image encryption have been presented. The paper also discusses current trends and future research directions in the field of chaotic image encryption. This work provides a foundation for future research work along with providing basic understanding to new researchers. Several recommendations have been suggested that can improve a chaos-based cryptosystem.
Original languageEnglish
Pages (from-to)17-22
Number of pages6
JournalChaos Theory and its Applications
Volume2
Publication statusPublished - 30 Jun 2020
Externally publishedYes

Bibliographical note

This journal provides immediate open access to its content under a CC BY-SA licence (Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License), on the principle that making research freely available to the public supports a greater global exchange of knowledge.

Keywords

  • Chaos theory
  • Image encryption
  • Chaos maps
  • Logistic map
  • Composite chaos
  • Hyper-chaos

Fingerprint

Dive into the research topics of 'Chaos Theory and its Application: An Essential Framework for Image Encryption'. Together they form a unique fingerprint.

Cite this