Information Technology Journal1812-56381812-5646Asian Network for Scientific Information10.3923/itj.2013.835.840HuangFeng ZhangGuixiang 42013124Image encryption is widely needed to ensure image security. In order to rapidly charge the high correlation among pixels of image, the study proposed a new image permutation approach using combinational chaotic maps. The new chaotic map was realized by processing image stretch and fold. Firstly, a square image was divided into two isosceles triangles along the diagonal direction. Utilizing the difference of the pixel numbers of adjacent columns, each pixel in a column was inserted to the corresponding adjacent column. Then, the plain image could be stretched to a line. Finally, the line was folded over to the cipher image. Utilizing two different methods of fold, the study designed four maps for permutation. A new permutation approach was developed which used a six decimal numbers as the keys. The deciphering process was an invertible process using the same keys. The simulation results showed the speed of permutation is fast and high correlation among adjacent pixels was rapidly charged. And the encryption could satisfy the high security requirements or as a part of the other encryption.]]>Socek, D., S. Magliveras, D. Culibrk, O. Marques, H. Kalva and B. Furht,20072007Mazloom, S., A.M. Eftekhari-Moghadam,20094217451754Maniccam, S.S. and N.G. Bourbakis,200437725737Feng, Y., L.J. Li and F. Huang,20062006pp: 13671367Kocarev, L.,20011621Zheng, J.M. and W.Z. Gao,20113229342937Wang, Y., K.W. Wong, X. Liao and G. Chen,201111514522Shannon, C.E.,194928656715Patidar, V., N.K. Pareek, G. Purohit and K.K. Sud,201128443314339Fridrich, J.,1998812591284Mao, Y., G. Chen and S. Lian,20041436133624Chen, G., Y. Mao and C.K. Chui,200421749761Yoon, J.W. and H. Kim,20101539984006