Image encryption using chaotic logistic map (original) (raw)
Related papers
A Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps
Int. J. Netw. Secur., 2010
The chaos based cryptographic algorithms have suggested several advantages over the traditional encryption algorithms such as high security, speed, reasonable computational overheads and computational power. This paper introduces an efficient chaos-based stream cipher, composing two chaotic logistic maps and a large enough external secret key for image encryption. The external secret key is used to derive the initial conditions for the chaotic maps, and is employed with the two chaotic maps to confuse the relationship between the cipher image and the plain image. In the encryption phase, the pixels are encrypted using an iterative cipher module based feedback and data-dependent inputs mechanism for mixing the current encryption parameters with previously encrypted information. To make the cipher more robust against any attack, the secret key is modified after encryption of each pixel of the plain image. The results of several experimental, statistical analysis and key sensitivity te...
Image Encryption Using Development of Chaotic Logistic Map Based on Feedback Stream Cipher
Abstract—Recently due to the development of computer technology many multimedia content as digital image need to be transmitted over network, digital image are used in several application as medical image, confidential video conferences and military image data base of this digital images need to be protect from unauthorized. We need to encrypt these contents of images when transmitted over unsecured network. This paper focuses on protecting digital images through using developed chaos-based encryption/decryption algorithms. We propose an image encryption based on development of chaotic logistic map and on feedback stream cipher. The proposed algorithm uses a developed chaotic logistic map and an external secret key of 256-bit. Furthermore, the proposed algorithm obtain solution by iteration, data dependent inputs, inclusion of three feedback mechanisms are verified to provide high security level. Our proposed algorithm has advantages, 1-Extend the range of the variable r by developed the chaotic logistic map. 2-New features for our proposed algorithm such as inputs(key, image). 3-The combine of feedback property with external secret key make cipherimage not depend on key only but depend on key and previous cipherimage pixel, this give the algorithm robustness against any cryptanalysis. 4-The experimental result of our proposed algorithm proof that it is an efficient method and secures way for real time image encryption. Furthermore a simple implementation of our algorithm achieves high encryption rates on general purpose
A Tweakable Image Encryption Algorithm Using an Improved Logistic Chaotic Map
Traitement du Signal
This paper aims to improves the chaotic behavior of classical logistic chaotic map for image encryption. First, this classical technique was enhanced, and the effectiveness of the improved technique was verified by the bifurcation diagram and Lyapunov exponent, in comparison to the classical technique. On this basis, an efficient tweakable image encryption algorithm was proposed to protect the security of digital image transmission. The proposed algorithm adopts a confusion-diffusion architecture. With the aid of the tweak, each original image is encrypted as multiple different images using the same secret key-stream. The experimental results prove that the proposed algorithm, despite its simplicity, can withstand several types of attacks through image encryption. The research results shed new light on the data security in the transmission of digital images.
Chaotic behavior arises from very simple non-linear dynamical equation of logistic map which makes it was used often in designing chaotic image encryption schemes. However, some properties of chaotic maps can also facilitate cryptanalysis especially when they are implemented in digital domain. Utilizing stable distribution of the chaotic states generated by iterating the logistic map, this paper presents a typical example to show insecurity of an image encryp-tion scheme using chaotic logistic map. This work will push encryption and chaos be combined in a more effective way.
Improving a New Logistic Map as a New Chaotic Algorithm for Image Encryption
Modern Applied Science, 2013
Image encryption is not a new field, but the techniques used to encrypt images are constantly being re-evaluated. As computer processing power grows, the need for better encryption algorithms grows with it. In this paper, the attention was focused on the encryption of still images. In particular, a precise look at encryption using chaotic techniques was subjected. In this paper we present improving existing chaotic algorithm (NCA) for image encryption proposed in 2005. The analysis of the four existing encryption algorithms directed the work to conclude that it is possible to do this encryption much quicker, without much loss in the way of obscurity, robustness, correlation, or security. Therefore, we propose a new encryption algorithm that is essentially a modification of the NCA. The improving method created an encryption method for images that does not allow masks to be of any use in the cryptanalysis.
A Systematic Approach for Image Encryption Using Chaotic 2D Logistic Map Using MATLAB
International journal of engineering research and technology, 2018
Chaos maps and chaotic systems have been proved to be useful and effective for cryptography. In this paper, the twodimensional logistic map with complicated basin structures and attractors are first used for image encryption. The proposed method adopts the classic framework of the permutationsubstitution network in cryptography and thus ensures both confusion and diffusion properties for a secure cipher. The proposed method is able to encrypt an intelligible image into random-like from the statistical point of view and the human visual system point of view. Extensive simulation results using test images from the USC SIPI image database demonstrate the effectiveness and robustness of the proposed method. Security analysis results of using both the conventional and the most recent tests show that the encryption quality of the proposed method reaches or excels the current state of the arts. Similar encryption ideas can be applied to digital data in other formats, e.g. digital audio and...
A Novel Method for Image Encryption Using Modified Logistic Map
Journal of Information Systems and Telecommunication (JIST), 2019
With the development of the internet and social networks, the multimedia data, particularly digital images, has been of increasing interest to scientists. Due to their advantages including high speed, high security, and complexity, chaotic functions have been broadly employed in image encryption. The present paper proposed a modified logistic map function which resulted in higher scattering in the obtained results. Confusion and diffusion functions, as the two main actions in cryptography, are not necessarily performed in order, i.e. each of these two functions can be applied on the image in either order, provided that the sum of total functions does not exceed 10. So, to calculate the sum of functions, confusion has the factor of 1 and diffusion has the factor of 2. To simulate this method, a binary stack was used. Application of binary stack and pseudo-random numbers obtained from the modified chaotic function increased the complexity of the proposed encryption algorithm. The security key length, entropy value, NPCR and UACI values, and correlation coefficient represented in the analytical results revealed the capability and validity of the proposed method. Analyzing the obtained results and comparing the algorithm to other investigated methods clearly verified high efficiency of the proposed method.
IJERT-A Systematic Approach for Image Encryption Using Chaotic 2D Logistic Map Using MATLAB
International Journal of Engineering Research and Technology (IJERT), 2018
https://www.ijert.org/a-systematic-approach-for-image-encryption-using-chaotic-2d-logistic-map-using-matlab https://www.ijert.org/research/a-systematic-approach-for-image-encryption-using-chaotic-2d-logistic-map-using-matlab-IJERTCONV6IS13098.pdf Chaos maps and chaotic systems have been proved to be useful and effective for cryptography. In this paper, the two-dimensional logistic map with complicated basin structures and attractors are first used for image encryption. The proposed method adopts the classic framework of the permutation-substitution network in cryptography and thus ensures both confusion and diffusion properties for a secure cipher. The proposed method is able to encrypt an intelligible image into random-like from the statistical point of view and the human visual system point of view. Extensive simulation results using test images from the USC SIPI image database demonstrate the effectiveness and robustness of the proposed method. Security analysis results of using both the conventional and the most recent tests show that the encryption quality of the proposed method reaches or excels the current state of the arts. Similar encryption ideas can be applied to digital data in other formats, e.g. digital audio and video.
A novel image encryption method based on chaotic maps
ICCKE 2013, 2013
We are living in the world in which most people and organizations communicate via digital devices so that a large quantity of information is electronically saved. In this condition, it's readily possible to access sensitive organizational and personal information. There is no doubt that of digital data, multimedia data carry heavy information load. This paper attempts to provide an efficient method for encryption digital image using logistic and Tent map in order to protect digital images in cyber space. In order to assess the performance of our method, it was implemented in Matlab.
Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption
First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05), 2005
In the past few years, a number of image encryption algorithms based on chaotic maps have been proposed. A recently proposed Chaotic-Key Based Algorithm (CKBA) is based on a one-dimensional Logistic map. However, it has been shown that the current CKBA model is unavoidably susceptible to chosen/known-plaintext attacks, and that the high security claims against ciphertext-only attack were overestimated by the authors. In addition, the chaotic Logistic map yields unbalanced output. In this paper we enhance the CKBA algorithm three-fold: (1)we change the 1-D chaotic Logistic map to a piecewise linear chaotic map (PWLCM) to improve the balance property, (2)we increase the key size to 128 bits, and (3)-we add two more cryptographic primitives and extend the scheme to operate on multiple rounds so that the chosen/known-plaintext attacks are no longer possible. The new cipher has much stronger security and its performance characteristics remain very good. A security analysis for the proposed system is performed and presented.