Image Encryption Using Arnold MapAuthor : P. Sridevi and J. Suguna
Volume 8 No.1 Special Issue:February 2019 pp 70-73
Nowadays transmission of data over the network is increasing and the data can be in the format of text, image, audio and video. Images are widely used in maximum applications of daily life. Image encryption is one of the most recent area of research to meet the demand during image transmission. Transformation of image from one form to erroneous form is called as image encryption. So, it can be secured from unauthorized users. The security of encrypted image is completely dependent on two important aspects i.e. the strength of the cryptographic algorithm and the confidentiality of the key. This paper proposes an algorithm of image encryption based on 3D Arnold cat map combined with logistic chaotic map. To evaluate the security of the encrypted image of this scheme, key space analysis and differential attack are performed. Several test images are used to demonstrate the validity of the proposed encryption algorithm. The experiment result shows that the proposed algorithm provides an efficient and secure approach to real-time image encryption and transmission.
Chaos, Image encryption, Arnold map, Iterations and Logistic map.
 Joshua C. Dagadu, Jianping Li, Emelia O. Aboagye, Xuedzi Ge, “Chaotic Medical Image Encryption Based on Arnold Transformation and Pseudorandomly Enhanced Logistic Map”, Journal of Multidisciplinary Engineering Science and Technology (JMEST)., Vol. 4, No. 9, September 2017.
 Wei Zhou, Wen-Qi Liu, Dong-Liang Wang, Gui-Xiang Zhu, Ying-Jie Hu and Yong-Feng Zhan, “An Efficient Medical Image Protection Scheme with Parallel Chaotic Key Stream Generation”, Information Technology Journal., Vol. 13, pp. 1602-1611, 2014.
 R. Purba, A. Halim and I. Syahputra, Enkripsi Citra Digital Menggunakan , “Arnold’s Cat Map, Nonlinear Chaotic Algorithm”, JSM STMIK Mikroskil., Vol. 15, No.2, pp. 61-71, 2014.
 EkoHariyanto, Robbi Rahim, “Arnold’s Cat Map Algorithm in Digital Image encryption”, International Journal of Science and Research (IJSR), Vol. 5, No. 10, October 2016.
 Sridevi.P and Suguna.J, “An efficient Encryption Then Compression System using Asymmetric Numeral Method”, IJET, Vol. 9, No 5, pp. 3680-3688, Oct-Nov 2017.
 M. Mishra, P. Singh, and C. Garg “A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping”, International Journal of Information and Computation technology, Vol. 4, No. 7. pp. 741-746, 2014.
 A. Anto Steffi, and D. Sharma “Modified Algorithm of Encryption and Decryption of Image using Chaotic Mapping”, International Journal of Science and Research (IJSR), Vol. 2, No 2. pp. 77-80, 2013.
 Junqin Zhao, Weichuang Guo, RuisongYe,“A Chaos-based Image Encryption Scheme Using Permutation-Substitution Architecture”, International Journal of Computer Trends and Technology (IJCTT)., Vol. 15 No. 4. pp. 174-185, Sep 2014.
 Vinod Patidar, N.K. Pareek, G. Purohit, K.K. Sud. “A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption”, Optics Communications., Vol. 284, No.19. pp. 4331-4339, 2011.
 Thampi,C.& Jose, D. “More Secure Color Image Encryption Scheme Based on 3D Chaotic Maps”, International Journal for Advance Research in Engineering and Technology, Vol.1, No.9. pp. 1-5, 2015.