148:
digital images were proposed. However, there were three main aspects of the design of an image encryption that was usually modified in different algorithms (chaotic map, application of the map and structure of algorithm). The initial and perhaps most crucial point was the chaotic map applied in the design of the algorithms. The speed of the cryptosystem is always an important parameter in the evaluation of the efficiency of a cryptography algorithm, therefore, the designers were initially interested in using simple chaotic maps such as tent map, and the logistic map. However, in 2006 and 2007, the new image encryption algorithms based on more sophisticated chaotic maps proved that application of chaotic map with higher dimension could improve the quality and security of the cryptosystems.
22:
114:
One of the most important issues for any cryptographic primitive is the security of the system. However, in numerous cases, chaos-based cryptography algorithms are proved insecure. The main issue in many of the cryptanalyzed algorithms is the inadequacy of the chaotic maps implemented in the system.
110:
share unique characteristics that allow for the chaotic systems to be applied to cryptography. If chaotic parameters, as well as cryptographic keys, can be mapped symmetrically or mapped to produce acceptable and functional outputs, it will make it next to impossible for an adversary to find the
147:
Bourbakis and
Alexopoulos in 1991 proposed supposedly the earliest fully intended digital image encryption scheme which was based on SCAN language. Later on, with the emergence of chaos-based cryptography hundreds of new image encryption algorithms, all with the aim of improving the security of
111:
outputs without any knowledge of the initial values. Since chaotic maps in a real life scenario require a set of numbers that are limited, they may, in fact, have no real purpose in a cryptosystem if the chaotic behavior can be predicted.
164:
The unpredictable behavior of the chaotic maps can be used in the generation of random numbers. Some of the earliest chaos-based random number generators tried to directly generate random numbers from the logistic map.
85:
in 1989, the use of chaos in cryptography has attracted much interest. However, long-standing concerns about its security and implementation speed continue to limit its implementation.
1088:
Liu, Quan; Li, Pei-yue; Zhang, Ming-chao; Sui, Yong-xin; Yang, Huai-jiang (2015-02-01). "A novel image encryption algorithm based on chaos maps with Markov properties".
81:, the study or techniques used to privately and securely transmit information with the presence of a third-party or adversary. Since first being investigated by
99:. Cryptography refers to encrypting information for secure transmission, whereas cryptanalysis refers to decrypting and deciphering encoded encrypted messages.
1018:
Behnia, S.; Akhshani, A.; Ahadpour, S.; Mahmodi, H.; Akhavan, A. (2007-07-02). "A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps".
102:
In order to use chaos theory efficiently in cryptography, the chaotic maps are implemented such that the entropy generated by the map can produce required
295:
Akhavan, A.; Samsudin, A.; Akhshani, A. (2015-09-01). "Cryptanalysis of "an improvement over an image encryption method based on total shuffling"".
1249:
Akhavan, Amir; Mahmodi, Hadi; Akhshani, Afshin (2006-11-01). "A New Image
Encryption Algorithm Based on One-Dimensional Polynomial Chaotic Maps".
1340:
1299:
1266:
651:
425:
1282:
Akhshani, A.; Mahmodi, H.; Akhavan, A. (2006-10-01). "A Novel Block Cipher Based on
Hierarchy of One-Dimensional Composition Chaotic Maps".
1214:
Kwok, H. S.; Tang, Wallace K. S. (2007-05-01). "A fast image encryption system based on chaotic maps with finite precision representation".
737:
Behnia, S.; Akhshani, A.; Mahmodi, H.; Akhavan, A. (2008-01-01). "A novel algorithm for image encryption based on mixture of chaotic maps".
677:
Akhavan, A.; Samsudin, A.; Akhshani, A. (2011-10-01). "A symmetric image encryption scheme based on combination of nonlinear chaotic maps".
566:
Arroyo, David; Alvarez, Gonzalo; Fernandez, Veronica (2008-05-28). "On the inadequacy of the logistic map for cryptographic applications".
513:
Solak, Ercan; Γokal, Cahit; Yildiz, Olcay Taner; BiyikoΔlu, TΓΌrker (2010-05-01). "Cryptanalysis of fridrich's chaotic image encryption".
247:
Xie, Eric Yong; Li, Chengqing; Yu, Simin; LΓΌ, Jinhu (2017-03-01). "On the cryptanalysis of
Fridrich's chaotic image encryption scheme".
922:
Behnia, Sohrab; Akhshani, Afshin; Mahmodi, Hadi; Akhavan, Amir (2008-01-01). "Chaotic cryptographic scheme based on composition maps".
721:
212:
Chen, Yong; Liao, Xiaofeng (2005-07-25). "Cryptanalysis on a modified
Baptista-type cryptosystem with chaotic masking algorithm".
130:
Asymmetric chaos cryptography, where one key of the cryptosystem is public. Some of the few proposed systems have been broken.
330:
Akhavan, A.; Samsudin, A.; Akhshani, A. (2017-10-01). "Cryptanalysis of an image encryption algorithm based on DNA encoding".
1126:
Behnia, S.; Akhshani, A.; Akhavan, A.; Mahmodi, H. (2009-04-15). "Applications of tripled chaotic maps in cryptography".
82:
134:
The majority of chaos-based cryptographic algorithms are symmetric. Many use discrete chaotic maps in their process.
772:
Kocarev, Ljupco; Sterjev, Marjan; Fekete, Attila; Vattay, Gabor (2004-11-15). "Public-key encryption with chaos".
452:
Alvarez, Gonzalo; Li, Shujun (2006-08-01). "Some basic cryptographic requirements for chaos-based cryptosystems".
1179:
Kanso, A.; Ghebleh, M. (2015-07-01). "An efficient and robust image encryption scheme for medical applications".
823:
Kocarev, L.; Makraduli, J.; Amato, P. (2005-10-01). "Public-Key
Encryption Based on Chebyshev Polynomials".
107:
103:
587:
Li, C. (January 2016). "Cracking a hierarchical chaotic image encryption algorithm based on permutation".
530:
1375:
1370:
1323:
Chuanmu, Li; Lianxi, H. (2007-04-01). "A New Image
Encryption Scheme based on Hyperchaotic Sequences".
1253:. Lecture Notes in Computer Science. Vol. 4263. Springer, Berlin, Heidelberg. pp. 963β971.
1223:
1188:
1145:
1097:
1062:
1027:
992:
941:
781:
746:
522:
471:
377:
339:
304:
221:
1053:
Ghebleh, M.; Kanso, A. (2014-06-01). "A robust chaotic algorithm for digital image steganography".
535:
32:
1346:
1305:
1161:
1135:
965:
931:
897:
879:
848:
614:
596:
567:
495:
461:
431:
274:
256:
196:
181:
1336:
1295:
1262:
957:
840:
805:
797:
717:
647:
548:
487:
421:
1328:
1287:
1254:
1231:
1196:
1153:
1105:
1070:
1035:
1000:
949:
889:
832:
789:
754:
709:
686:
639:
606:
540:
479:
413:
403:
Li, Shujun; Zheng, Xuan (2002-01-01). "Cryptanalysis of a chaotic image encryption method".
385:
347:
312:
266:
229:
406:
2002 IEEE International
Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353)
197:"Supercomputer investigations of a chaotic encryption algorithm" DD Wheeler, RAJ Matthews
51:
1227:
1192:
1149:
1101:
1066:
1031:
996:
945:
785:
750:
526:
475:
381:
343:
308:
225:
127:
Symmetric chaos cryptography, where the same secret key is used by sender and receiver.
1325:
2007 International
Workshop on Anti-Counterfeiting, Security and Identification (ASID)
983:
Bourbakis, N.; Alexopoulos, C. (1992). "Picture data encryption using scan patterns".
389:
1364:
1165:
1004:
852:
499:
95:
1350:
1309:
901:
690:
435:
351:
278:
1039:
969:
618:
404:
233:
78:
74:
610:
316:
270:
1235:
1200:
1157:
1109:
1074:
758:
1332:
417:
953:
836:
643:
544:
483:
1291:
961:
893:
844:
801:
552:
491:
713:
633:
41:
867:
809:
21:
182:"On the derivation of a βchaoticβ encryption algorithm." Matthews, R.A.J.
1258:
793:
936:
868:"Security of public-key cryptosystems based on Chebyshev polynomials"
466:
884:
601:
261:
1140:
572:
866:
Bergamo, P.; D'Arco, P.; De Santis, A.; Kocarev, L. (July 2005).
123:
Chaos-based cryptography has been divided into two major groups:
15:
1181:
Communications in
Nonlinear Science and Numerical Simulation
1090:
Communications in Nonlinear Science and Numerical Simulation
1055:
Communications in Nonlinear Science and Numerical Simulation
774:
Chaos: An Interdisciplinary Journal of Nonlinear Science
88:
Chaotic cryptology consists of two opposite processes:
46:
36:
368:Baptista, M.S. (1998). "Cryptography with chaos".
1284:2006 International Conference on Image Processing
708:. Springer Berlin Heidelberg. pp. 231β265.
363:
361:
1251:Computer and Information Sciences β ISCIS 2006
924:International Journal of Bifurcation and Chaos
515:International Journal of Bifurcation and Chaos
454:International Journal of Bifurcation and Chaos
156:Chaotic behavior can generate hash functions.
412:. Vol. 2. pp. IIβ708βIIβ711 vol.2.
8:
872:IEEE Transactions on Circuits and Systems I
704:Mao, Yaobin; Chen, Guanrong (2005-01-01).
1139:
935:
883:
600:
571:
534:
465:
260:
825:Circuits, Systems and Signal Processing
174:
632:Kocarev, Ljupco; Lian, Shiguo (2011).
1121:
1119:
672:
670:
7:
447:
445:
290:
288:
106:. Properties in chaotic systems and
73:is the application of mathematical
14:
679:Journal of the Franklin Institute
20:
706:Handbook of Geometric Computing
691:10.1016/j.jfranklin.2011.05.001
352:10.1016/j.optlastec.2017.04.022
1216:Chaos, Solitons & Fractals
1128:Chaos, Solitons & Fractals
1040:10.1016/j.physleta.2007.01.081
739:Chaos, Solitons & Fractals
234:10.1016/j.physleta.2005.05.048
1:
390:10.1016/s0375-9601(98)00086-3
332:Optics & Laser Technology
1005:10.1016/0031-3203(92)90074-s
611:10.1016/j.sigpro.2015.07.008
317:10.1016/j.optcom.2015.03.079
271:10.1016/j.sigpro.2016.10.002
1236:10.1016/j.chaos.2005.11.090
1201:10.1016/j.cnsns.2014.12.005
1158:10.1016/j.chaos.2007.08.013
1110:10.1016/j.cnsns.2014.06.005
1075:10.1016/j.cnsns.2013.10.014
759:10.1016/j.chaos.2006.05.011
1392:
1333:10.1109/IWASID.2007.373734
418:10.1109/ISCAS.2002.1011451
954:10.1142/S0218127408020288
837:10.1007/s00034-005-2403-x
644:10.1007/978-3-642-20542-2
545:10.1142/S0218127410026563
484:10.1142/S0218127406015970
1292:10.1109/ICIP.2006.312889
894:10.1109/TCSI.2005.851701
635:Chaos-Based Cryptography
186:13, no. 1 (1989): 29-42.
160:Random number generation
108:cryptographic primitives
714:10.1007/3-540-28247-5_8
104:Confusion and diffusion
35:, as no other articles
1286:. pp. 1993β1996.
297:Optics Communications
1327:. pp. 237β240.
1259:10.1007/11902140_100
90:Chaotic cryptography
1228:2007CSF....32.1518K
1193:2015CNSNS..24...98K
1150:2009CSF....40..505B
1102:2015CNSNS..20..506L
1067:2014CNSNS..19.1898G
1032:2007PhLA..366..391B
997:1992PatRe..25..567B
985:Pattern Recognition
946:2008IJBC...18..251B
786:2004Chaos..14.1078K
751:2008CSF....35..408B
638:. Springer-Verlag.
527:2010IJBC...20.1405S
476:2006IJBC...16.2129A
382:1998PhLA..240...50B
344:2017OptLT..95...94A
309:2015OptCo.350...77A
226:2005PhLA..342..389C
77:to the practice of
71:Chaotic cryptology
54:for suggestions.
44:to this page from
1342:978-1-4244-1035-4
1301:978-1-4244-0480-3
1268:978-3-540-47242-1
1020:Physics Letters A
794:10.1063/1.1821671
653:978-3-642-20542-2
589:Signal Processing
427:978-0-7803-7448-5
370:Physics Letters A
249:Signal Processing
214:Physics Letters A
68:
67:
1383:
1355:
1354:
1320:
1314:
1313:
1279:
1273:
1272:
1246:
1240:
1239:
1222:(4): 1518β1529.
1211:
1205:
1204:
1176:
1170:
1169:
1143:
1123:
1114:
1113:
1085:
1079:
1078:
1061:(6): 1898β1907.
1050:
1044:
1043:
1026:(4β5): 391β396.
1015:
1009:
1008:
980:
974:
973:
939:
919:
913:
912:
910:
908:
887:
878:(7): 1382β1393.
863:
857:
856:
820:
814:
813:
780:(4): 1078β1082.
769:
763:
762:
734:
728:
727:
701:
695:
694:
685:(8): 1797β1813.
674:
665:
664:
662:
660:
629:
623:
622:
604:
584:
578:
577:
575:
563:
557:
556:
538:
521:(5): 1405β1413.
510:
504:
503:
469:
460:(8): 2129β2151.
449:
440:
439:
411:
400:
394:
393:
365:
356:
355:
327:
321:
320:
292:
283:
282:
264:
244:
238:
237:
220:(5β6): 389β396.
209:
203:
194:
188:
179:
143:Image encryption
63:
60:
49:
47:related articles
24:
16:
1391:
1390:
1386:
1385:
1384:
1382:
1381:
1380:
1361:
1360:
1359:
1358:
1343:
1322:
1321:
1317:
1302:
1281:
1280:
1276:
1269:
1248:
1247:
1243:
1213:
1212:
1208:
1187:(1β3): 98β116.
1178:
1177:
1173:
1125:
1124:
1117:
1087:
1086:
1082:
1052:
1051:
1047:
1017:
1016:
1012:
982:
981:
977:
921:
920:
916:
906:
904:
865:
864:
860:
822:
821:
817:
771:
770:
766:
736:
735:
731:
724:
703:
702:
698:
676:
675:
668:
658:
656:
654:
631:
630:
626:
586:
585:
581:
565:
564:
560:
512:
511:
507:
451:
450:
443:
428:
409:
402:
401:
397:
367:
366:
359:
329:
328:
324:
294:
293:
286:
246:
245:
241:
211:
210:
206:
201:15 (2), 140-152
195:
191:
180:
176:
171:
162:
154:
145:
140:
121:
83:Robert Matthews
64:
58:
55:
45:
42:introduce links
25:
12:
11:
5:
1389:
1387:
1379:
1378:
1373:
1363:
1362:
1357:
1356:
1341:
1315:
1300:
1274:
1267:
1241:
1206:
1171:
1134:(1): 505β519.
1115:
1096:(2): 506β515.
1080:
1045:
1010:
991:(6): 567β581.
975:
930:(1): 251β261.
914:
858:
831:(5): 497β517.
815:
764:
745:(2): 408β419.
729:
722:
696:
666:
652:
624:
579:
558:
536:10.1.1.226.413
505:
441:
426:
395:
376:(1β2): 50β54.
357:
322:
284:
239:
204:
189:
173:
172:
170:
167:
161:
158:
153:
150:
144:
141:
139:
136:
132:
131:
128:
120:
117:
66:
65:
52:Find link tool
28:
26:
19:
13:
10:
9:
6:
4:
3:
2:
1388:
1377:
1374:
1372:
1369:
1368:
1366:
1352:
1348:
1344:
1338:
1334:
1330:
1326:
1319:
1316:
1311:
1307:
1303:
1297:
1293:
1289:
1285:
1278:
1275:
1270:
1264:
1260:
1256:
1252:
1245:
1242:
1237:
1233:
1229:
1225:
1221:
1217:
1210:
1207:
1202:
1198:
1194:
1190:
1186:
1182:
1175:
1172:
1167:
1163:
1159:
1155:
1151:
1147:
1142:
1137:
1133:
1129:
1122:
1120:
1116:
1111:
1107:
1103:
1099:
1095:
1091:
1084:
1081:
1076:
1072:
1068:
1064:
1060:
1056:
1049:
1046:
1041:
1037:
1033:
1029:
1025:
1021:
1014:
1011:
1006:
1002:
998:
994:
990:
986:
979:
976:
971:
967:
963:
959:
955:
951:
947:
943:
938:
933:
929:
925:
918:
915:
903:
899:
895:
891:
886:
881:
877:
873:
869:
862:
859:
854:
850:
846:
842:
838:
834:
830:
826:
819:
816:
811:
807:
803:
799:
795:
791:
787:
783:
779:
775:
768:
765:
760:
756:
752:
748:
744:
740:
733:
730:
725:
723:9783540205951
719:
715:
711:
707:
700:
697:
692:
688:
684:
680:
673:
671:
667:
655:
649:
645:
641:
637:
636:
628:
625:
620:
616:
612:
608:
603:
598:
594:
590:
583:
580:
574:
569:
562:
559:
554:
550:
546:
542:
537:
532:
528:
524:
520:
516:
509:
506:
501:
497:
493:
489:
485:
481:
477:
473:
468:
463:
459:
455:
448:
446:
442:
437:
433:
429:
423:
419:
415:
408:
407:
399:
396:
391:
387:
383:
379:
375:
371:
364:
362:
358:
353:
349:
345:
341:
337:
333:
326:
323:
318:
314:
310:
306:
302:
298:
291:
289:
285:
280:
276:
272:
268:
263:
258:
254:
250:
243:
240:
235:
231:
227:
223:
219:
215:
208:
205:
202:
200:
193:
190:
187:
185:
178:
175:
168:
166:
159:
157:
152:Hash function
151:
149:
142:
137:
135:
129:
126:
125:
124:
118:
116:
112:
109:
105:
100:
98:
97:
96:cryptanalysis
91:
86:
84:
80:
76:
72:
62:
53:
48:
43:
39:
38:
34:
29:This article
27:
23:
18:
17:
1376:Cryptography
1371:Chaos theory
1324:
1318:
1283:
1277:
1250:
1244:
1219:
1215:
1209:
1184:
1180:
1174:
1131:
1127:
1093:
1089:
1083:
1058:
1054:
1048:
1023:
1019:
1013:
988:
984:
978:
937:nlin/0601051
927:
923:
917:
905:. Retrieved
875:
871:
861:
828:
824:
818:
777:
773:
767:
742:
738:
732:
705:
699:
682:
678:
657:. Retrieved
634:
627:
592:
588:
582:
561:
518:
514:
508:
467:nlin/0311039
457:
453:
405:
398:
373:
369:
335:
331:
325:
300:
296:
252:
248:
242:
217:
213:
207:
198:
192:
183:
177:
163:
155:
146:
138:Applications
133:
122:
113:
101:
93:
89:
87:
79:cryptography
75:chaos theory
70:
69:
56:
30:
595:: 203β210.
255:: 150β154.
199:Cryptologia
184:Cryptologia
1365:Categories
907:29 October
885:cs/0411030
659:29 October
602:1505.00335
262:1609.05352
169:References
50:; try the
37:link to it
1166:120158218
1141:0705.2633
962:0218-1274
853:123533966
845:0278-081X
802:1054-1500
573:0805.4355
553:0218-1274
531:CiteSeerX
500:222179832
492:0218-1274
338:: 94β99.
303:: 77β82.
59:June 2017
40:. Please
1351:16930243
1310:14013123
902:18342884
810:15568922
436:14523625
279:12416264
94:Chaotic
1224:Bibcode
1189:Bibcode
1146:Bibcode
1098:Bibcode
1063:Bibcode
1028:Bibcode
993:Bibcode
970:9089024
942:Bibcode
782:Bibcode
747:Bibcode
619:7713295
523:Bibcode
472:Bibcode
378:Bibcode
340:Bibcode
305:Bibcode
222:Bibcode
1349:
1339:
1308:
1298:
1265:
1164:
968:
960:
900:
851:
843:
808:
800:
720:
650:
617:
551:
533:
498:
490:
434:
424:
277:
33:orphan
31:is an
1347:S2CID
1306:S2CID
1162:S2CID
1136:arXiv
966:S2CID
932:arXiv
898:S2CID
880:arXiv
849:S2CID
615:S2CID
597:arXiv
568:arXiv
496:S2CID
462:arXiv
432:S2CID
410:(PDF)
275:S2CID
257:arXiv
119:Types
1337:ISBN
1296:ISBN
1263:ISBN
958:ISSN
909:2021
841:ISSN
806:PMID
798:ISSN
718:ISBN
661:2021
648:ISBN
549:ISSN
488:ISSN
422:ISBN
92:and
1329:doi
1288:doi
1255:doi
1232:doi
1197:doi
1154:doi
1106:doi
1071:doi
1036:doi
1024:366
1001:doi
950:doi
890:doi
833:doi
790:doi
755:doi
710:doi
687:doi
683:348
640:doi
607:doi
593:118
541:doi
480:doi
414:doi
386:doi
374:240
348:doi
313:doi
301:350
267:doi
253:132
230:doi
218:342
1367::
1345:.
1335:.
1304:.
1294:.
1261:.
1230:.
1220:32
1218:.
1195:.
1185:24
1183:.
1160:.
1152:.
1144:.
1132:40
1130:.
1118:^
1104:.
1094:20
1092:.
1069:.
1059:19
1057:.
1034:.
1022:.
999:.
989:25
987:.
964:.
956:.
948:.
940:.
928:18
926:.
896:.
888:.
876:52
874:.
870:.
847:.
839:.
829:24
827:.
804:.
796:.
788:.
778:14
776:.
753:.
743:35
741:.
716:.
681:.
669:^
646:.
613:.
605:.
591:.
547:.
539:.
529:.
519:20
517:.
494:.
486:.
478:.
470:.
458:16
456:.
444:^
430:.
420:.
384:.
372:.
360:^
346:.
336:95
334:.
311:.
299:.
287:^
273:.
265:.
251:.
228:.
216:.
1353:.
1331::
1312:.
1290::
1271:.
1257::
1238:.
1234::
1226::
1203:.
1199::
1191::
1168:.
1156::
1148::
1138::
1112:.
1108::
1100::
1077:.
1073::
1065::
1042:.
1038::
1030::
1007:.
1003::
995::
972:.
952::
944::
934::
911:.
892::
882::
855:.
835::
812:.
792::
784::
761:.
757::
749::
726:.
712::
693:.
689::
663:.
642::
621:.
609::
599::
576:.
570::
555:.
543::
525::
502:.
482::
474::
464::
438:.
416::
392:.
388::
380::
354:.
350::
342::
319:.
315::
307::
281:.
269::
259::
236:.
232::
224::
61:)
57:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.