This document proposes an image encryption technique using histograms and cheat images. It involves permuting the input image and a cheat image using a logistic map and secret key parameters. The encrypted image is generated using the permuted values. For decryption, the same process is applied in reverse using the cheat image and secret key. The technique is analyzed for security through statistical analysis, differential attacks, sensitivity analysis, and entropy measures, showing it effectively encrypts images and is robust against attacks.