Image Encryption Algorithm Based on Arnold Cat Map and Logistic Mapping

Anil Saini*, Shalza Dua**
* PG Scholar, Department of Electronics and Communication Engineering, R.P. Inderaprastha Institute of Technology, Bastara Karnal
** Assistant Professor, Department of Electronics and Communication Engineering, R.P. Inderaprastha Institute of Technology, Bastara Karnal
Periodicity:March - May'2014


The paper presents an article on image encryption scheme. The major approach to protect an image is encryption. There are many image encryption techniques. Image encryption schemes have been increasingly studied to meet the demand for real-time secure image transmission over the Internet and through wireless networks. Traditional image encryption algorithm such as data encryption standard (DES), has the weakness of low-level efficiency when the image is large. The chaos-based encryption has suggested a new and efficient way to deal with the intractable problem of fast and highly secure image encryption. One-dimensional chaotic system with the advantages of high-level efficiency and simplicity, such as Logistic map, has been widely used now developed. The encryption use the Arnold cat map to scramble the image. Arnold's cat map's feature is that image being apparently randomized by the transformation but returning to its original state after a number of steps. The overall objective of this paper is to propose an integrated technique for image encryption.


Image Encryption; Arnold Cat Map; Non Linear Logistic Map; Key Space.

How to Cite this Article?

Saini, A., and Dua, S. (2014). Image Encryption Algorithm Based On Arnold Cat Map And Logistic Mapping. i-manager’s Journal on Pattern Recognition, 1(1), 1- 4.


[1]. Yicong Zhou, Long Bao, and C. L. Philip Chen, (2011). ”Image Encryption Using a New Parametric Switching Chaotic System”. Elsevier Ltd.
[2]. Haojiang Gao, Yisheng Zhang, Shuyun Liang, and Dequn Li, (2005). ”A new chaotic algorithm for image encryption”. Elsevier Ltd.
[3]. Shiguo Lian, Jinsheng Sun, and Zhiquan Wang, (2005). ”Security Analysis of A Chaos-based Image Encryption Algorithm”. Phisica A, Elsevier Science.
[4]. Pia Singh, and Karamjeet Singh, (2013). “Image Encryption And Decryption Using Blowfish Algorithm In Matlab”. International Journal of Scientific & Engineering Research, Vol.4, No.7.
[5]. Varsha, S. Nemade, and R.B. Wagh, (2012). ”Review of different image encryption techniques”. Proceedings of National Conference on Emerging Trends in Computer Technology (NCETCT-2012).
[6]. Shubhangini, P. Nichat, and S.S. Sikchi, (2013). ”Image Encryption using Hybrid Genetic Algorithm”. International Journal of Advanced Research in Computer Science and Software Engineering, Vol.3, No.1, ISSN: 2277 128X.
[7]. Jolly Shah, and Vikas Saxena, (2011). ” Performance Study on Image Encryption Schemes”. IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 1.
[8]. Ruisong Ye, and Wenping Yu, (2012). ”An Image Hiding Scheme Using 3D Sawtooth Map and Discrete Wavelet Transform” I.J. Image, Graphics and Signal Processing, 6, pp.52-60.

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

If you have access to this article please login to view the article or kindly login to purchase the article
Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.