A chaotic system can have a series of values for the developing variable that completely repeat themselves, giving periodic behavior beginning from any point in that series. It is very sensitive to initial conditions and control parameters which make them suitable for image encryption. The two maps Duffing and Logistic maps are combined to generate a random sequence. The Logistic map is 1 Dimensional and contains one control parameter (r). Duffing map contains 2 dimensions X and Y, and two control parameters A and B. Both are XOR'ed to get the random numbers. The control parameters of Duffing map are controlled by the control parameter r. X and Y are looped to get repetitive iterations. The random sequences are analyzed for statistical tests for randomness, keyspace, key sensitivity (or) cross-correlation, periodicity, auto-correlation, information entropy, equilibrium, linear complexity, and speed are the analyses to verify their conformity for use in cryptographic applications. Image encryption is the process of encoding a grayscale image with the help of a series of random numbers created by using a combination of chaotic maps, in such a way that uncertified users can't access it. NPCR, UACI, Histogram, and Information Entropy are the analyses performed. Image encryption and secret key generation are presented based on the Duffing map and logistic chaotic map. The series of random numbers and the greyscale image pixels are XOR'ed to shuffle the pixels and it turned the original image into a cipher image.