Article Preview
TopThe field of image encryption is a highly active domain in computer sciences. Many works had been done in this domain. We will focus in this section on the works that had been done only using chaotic systems. In (Huang, 2014), the authors present their approach of coloured image encryption using fractional-order hyper chaotic system. Their approach uses this system composed of four chaotic sequences for key generation and XOR and pixels’ shuffling for encryption and decryption process. In (Al-Najjar, 2011), the paper describes an encryption approach using chaotic logistic map which is one of the most used chaotic systems in image encryption. The authors propose two approaches: one consists of changing pixel values without shuffling the image using Pixel Mapping Table and the other one modifying pixel values using rows and column replacement. Tong and his friends also reclaimed in their work (Tong, 2009) in which they propose a theoretical account of feedback image encryption using chaotic functions. In (Chen, 2015), the authors demonstrated their cryptosystem of image data using a 3-D chaotic map based joint image scrambling and random encoding in gyrator domains. Their system, shuffles the image, then a random phase encodes it in spatial domain and gyrator transform domain. The use of 3-D chaotic map is done in order to generate key stream elements. (Gu, 2014) use also 3-D chaotic map. Unlike that in (Chen, 2015), authors propose a scheme in which the idea is to use a 3-D chaotic mapping process in order to, iteratively, permute pixels’ locations and replace their values. In (Ahadpour, 2012), the authors present their model for image encryption using chaotic coupled map lattices. (Ahmad, 2010) and (Sharif, 2016) both use chaotic mapping for image encryption. In (Liu, 2017) the authors present a paper in which they propose a chaos-based colour image encryption scheme basing on the fact that the randomly sampled noise signal is applied to serve as the initial values of a chaotic system.