Document Type : Research Article



The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase of the plain image. This change in the frequency domain causes changes in the pixels value and shuffles the pixels location in the time domain. Finally, in the time domain, a pseudo random image is produced using a chaotic tent map, to be combined to the image generated through the first step, and thus the final encrypted image is created. A computer simulation is also utilized to evaluate the proposed algorithm and to compare its results to images encrypted by other methods. The criteria for these comparisons are chi-square test of histogram, correlation coefficients of pixels, NPCR (number of pixel change rate), UACI (unified average changing intensity), MSE (mean square error) and MAE (mean absolute error), key space, and sensitivity to initial condition. These comparisons reveal that the proposed chaotic image encryption method shows a higher performance, and is of more secure.


[1] E. Hasani, M. Eshghi, “Chaotic Image Encryption In Time and Frequency Domain”, 7th Iranian Machine Vision & Image Processing, IEEE conference, 2011.
[2] H. S. Kwok and W. K. S. Tang, “A Fast Image Encryption System Based on Chaotic Maps with Finite Precision Representation”, J. of Chaos, Solitons & Fractals, vol. 32, pp. 1518-1529, 2007.
[3] Y. Wang, K. W. Wong, X. Liao and G. Chen, “A New Chaos-based Fast Image Encryption Algorithm”, J. of Applied Soft Computing, Vol. 11, Issue 1, pp. 514-522, 2011.
[4] S. Sam, P. Devaraj and R. S. Bhuvaneswaran, “A Novel Image Cipher based on Mixed Transformed Logistic Maps”, J. of Multimedia Tools and Applications, Vol. 56, pp. 315-330, 2012.
[5] Kwok Sin Hung, “A Study On Efficient Chaotic Image Encryption Schemes”, Department of Electronic Engineering, CITY UNIVERSITY OF HUNG KONG, 2007.
[6] Sh. lian, “MultiMedia Content encryption”, Taylor & Francis Group, 2009.
[7] S. M. Seyedzadeh and S. Mirzakuchaki, “A Fast Color Image Encryption Algorithm based on Coupled Two-Dimensional Piecewise Chaotic Map”, J. of Signal Processing, Vol. 92, pp.1202- 1215, 2012.
[8] Y. Mao, G. Chen, and S. Lian, “A novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps”, International Journal of Bifurcation and Chaos, vol.14, no.10, pp. 3613-3624, 2004.
[9] Q. Zhou, K-wo. Wong, X. Liao, T. Xiang and Y. Hu, “Parallel image encryption algorithm based on discretized chaotic map”, Chaos, Solitons & Fractals, vol. 38, pp. 1081-1092, 2008.
[10] X. Zhang, C. Wei-bin “A New Chaotic Algorithm for Image Encryption”, ICLIP2008, IEEE conference, 2008.
[11] S.E. Borujeni and M. Eshghi, “Chaotic Image Encryption Design Using Tompkins-Paige Algorithm”, J. of Mathematical Problems in Engineering, 2009.
[12] H. Khanzadi, M. Eshghi, “Image Encryption Using Random Bit Sequence Based on Chaotic Maps”, submitted to International Journal of Bifurcation and Chaos, 2012.
[13] Sh. Liu, J.Sun, Zhe. Xu, J. Liu, “Analysis on an Image Encryption Algorithm”, IEEE Computer society, 2008 International Workshop on Education Technology and Training & 2008 International Workshop on Geoscience and Remote Sensing.
[14] Ch.Wei-bin, X. Zhang, “Image Encryption Algorithm Based on Henon Chaotic System”, IEEE, 2009.
[15] K. T. Alligood, T. D. Sauer, J. A. Yorke, “CHAOS: An Introduction to Dynamical Systems”, Corrected third printing 2000, Springer-Verlag, New York, 1996.
[16] STEVEN H. STROGATZ, “Nonlinear Dinamics AND Chaos”, Perseus Books Publishing, 1994.
[17] H. G. Schuster and Wolfram Just, “Deterministic Chaos”, Fourth, Revised and Enlarged Edition, WILEY-VCH Verlag GmbH & Co, 2005.
[18] Y. Heng-fu, W. Yan-peng and T. Zu-wei, “An Image Encryption Algorithm Based on Logistic Chaotic Maps and Arnold Transform”, J. of Hengshui University, pp. 40-43, 2008.
[19] H. Khanzadi, M. A. Omam, F. Lotfifar and M. Eshghi “Image Encryption Based on Gyrator Transform Using Chaotic Maps”, Signal Processing (ICSP) conference, China, 2010.
[20] Gonzalez and Wood, “Digital Image Processing”, 3rd edition, Prentice Hall, 2008.
[21] Y. Wang, K. W. Wong, X. Liao and G. Chen, “A New Chaos-based Fast Image Encryption Algorithm”, J. of Applied Soft Computing, Vol. 11, Issue 1, pp. 514-522, 2011.
[22] G. Zhang and Q. Liu, “A Novel Image Encryption Method based on Total Shuffling Scheme”, J. of Optics Communications, Vol. 284, pp. 2775-2780, 2011.
[23] X. Zhang and W. Chen, “A New Chaotic Algorithm for Image Encryption”, ICALIP, pp. 889-892, 2008.
[24] H. Gao, Y. Zhang, S. Liang and D. Li, “A new chaotic algorithm for image encryption”, J. of Chaos, Solitons & Fractals, vol. 29, pp. 393-399, 2006.
[25] Y. Wang, K. W. W, X. L and G. C, “A new chaos-based fast image encryption algorithm”, J. of Applied Soft Computing, vol. 11, pp. 514-522, 2009.