Hash key-based image encryption using crossover operator and chaos

Ramzi Guesmi, Mohamed Amine Ben Farah, Abdennaceur Kachouri, Mounir Samet

Research output: Contribution to journalArticlepeer-review

68 Citations (Scopus)


This paper proposes a color image encryption scheme using one-time keys based on crossover operator, chaos and the Secure Hash Algorithm(SHA-2). The (SHA-2) is employed to generate a 256-bit hash value from both the plain-image and the secret hash keys to make the key stream change in each encryption process. The SHA-2 value is employed to generate three initial values of the chaotic system. The permutation-diffusion process is based on the crossover operator and XOR operator, respectively. Experimental results and security analysis show that the scheme can achieve good encryption result through only one round encryption process, the key space is large enough to resist against common attacks,so the scheme is reliable to be applied in image encryption and secure communication.

Original languageEnglish
Pages (from-to)4753-4769
Number of pages17
JournalMultimedia Tools and Applications
Issue number8
Early online date27 Feb 2015
Publication statusPublished - 30 Apr 2016


  • chaotic map
  • crossover
  • hash function
  • image encryption

Fingerprint Dive into the research topics of 'Hash key-based image encryption using crossover operator and chaos'. Together they form a unique fingerprint.

Cite this