Survey on Image Encryption Techniques using Chaotic Maps in Spatial, Transform and Spatiotemporal Domains

Syed Muhammad Unsub Zia, Mark McCartney, Bryan Scotney, Jorge Martinez Carracedo, Mamun Abu-Tair, Jamshed Memon, Ali Sajjad

Research output: Contribution to journalArticlepeer-review

38 Citations (Scopus)
17 Downloads (Pure)

Abstract

Chaos-based cryptosystems have been an active area of research in recent years. Although these algorithms are not standardized like AES, DES, RSA etc., chaos based cryptosystems like Chebyshev polynomials can provide additional security when used with standard public key cryptosystems like RSA and El-gamal. Standard encryption algorithms such as AES have always been the primary choice, but when it comes to image or video encryption, many researchers recommend chaos-based encryption techniques due their computational efficiency. This paper presents a survey on the most up-to-date chaos-based image encryption techniques, and classifies them into spatial, temporal, and spatiotemporal domains for better understanding. The significant improvements in the field of image encryption are discussed. In addition, comparative analysis is performed to validate the evaluation matrices for quantifying the encryption algorithms' security and performance in recent papers.
Original languageEnglish
Pages (from-to)1-19
Number of pages20
JournalInternational Journal of Information Security
Volume21
Issue number4
DOIs
Publication statusPublished (in print/issue) - 7 Apr 2022

Bibliographical note

Funding Information:
This research is supported by the BTIIC (British Telecom Ireland Innovation Centre) project, funded by British Telecom and Invest Northern Ireland.

Publisher Copyright:
© 2022, The Author(s).

Keywords

  • Chaotic maps
  • Spatial domain
  • Transform domain
  • Spatiotemporal domain
  • Image encryption

Fingerprint

Dive into the research topics of 'Survey on Image Encryption Techniques using Chaotic Maps in Spatial, Transform and Spatiotemporal Domains'. Together they form a unique fingerprint.

Cite this