Research on the Development of Chaotic Image Encryption


  • Chao Huang
  • Mingqiang Gao
  • Haoyuan Ma



Cryptography, Image encryption, Chaotic system, Encryption algorithm


With the development of the information age, the use of images for information expression has become very common. In view of the security of images, more and more scholars begin to study image encryption. In this paper, we briefly describe the development of chaotic image encryption field, describe the concept of chaos theory, chaotic characteristics and discriminant criteria, common typical chaotic systems, security analysis methods and development summary.


Devaney R L. (1989). An introduction to chaotic dynamical systems. New York, Westview Press.

May R M. (1976). Simple mathematical models with very complicated dynamics. Nature 261(5560),459-467.

Hénon M. (1976). A two-dimensional mapping with a strange attractor. Communications in Mathematical Physics 50(1),69-77.

Lorenz E N. (1963). Deterministic Nonperiodic Flow. Journal of the Atmospheric Sciences, 20(2),130-141.<0130:DNF>2.0.CO;2

Wu Z, Pan P, Sun C. et al. (2021). Plaintext-Related Dynamic Key Chaotic Image Encryption Algorithm. Entropy (Basel) 23(9),1159.

Lee Y-S, Lee Y-J, Han D-G. et al. (2012). Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E95.A(6),1091-1094.







How to Cite

Huang, C., Gao, M., & Ma, H. (2024). Research on the Development of Chaotic Image Encryption. International Journal of Computer Science and Information Technology, 3(1), 213-218.

Similar Articles

1-10 of 112

You may also start an advanced similarity search for this article.