A fast hybrid image cryptosystem based on random generator and modified logistic map

Published on Jun 1, 2019in Multimedia Tools and Applications2.757
· DOI :10.1007/S11042-018-6948-7
Ayman M. Hemdan1
Estimated H-index: 1
(Menoufia University),
Osama S. Faragallah16
Estimated H-index: 16
(Menoufia University)
+ 1 AuthorsAhmed Elmhalaway2
Estimated H-index: 2
(Menoufia University)
Sources
Abstract
This paper demonstrates an image encryption technique using a hybrid method. This method consists of two stages. The image is XORed with the Pseudo-Random Number Generator (PRNG) in the first stage. The confusion and diffusion processes are applied by using the Logistic map and its’ three modifications in the second stage. The original Logistic map has a small range of key-space. The three modifications of Logistic map increased key-space range due to expanding the range of the original Logistic map parameter. Multiple tests have been performed on the hybrid method such as security analysis and encryption quality. The hybrid method presented a good evaluation.
📖 Papers frequently viewed together
2018
References22
Newest
#1Yong Zhang (Jiangxi University of Finance and Economics)H-Index: 3
Abstract A new fast image cryptosystem was studied in this paper. The system employed the piecewise linear chaotic map and cubic S-box to generate key stream with excellent statistical characteristics for image encryption. Unlike most existing image cryptosystems, the proposed image cryptosystem possessed identical encryption process and decryption process, which both include one key stream generator, two plaintext-unrelated diffusion operations, one plaintext- related confusion operation and on...
Source
#1Chengqi Wang (Beihang University)H-Index: 3
#2Xiao Zhang (Beihang University)H-Index: 4
Last. Zhiming Zheng (Beihang University)H-Index: 17
view all 3 authors...
In this paper, we propose a novel low dimensional chaotic map, namely, compounded piecewise linear map (CPLM) in order to balance between security and computational complexity. Then we prove the chaotic properties of CPLM theoretically and numerically. Based on the CPLM, an efficient chaotic image encryption algorithm is presented, in which the self-adaptive model and feedback mechanism are initially mingled to enhance the security. Besides, initial values of iteration are generated in a new way...
Source
#1M. A. Murillo-Escobar (UABC: Autonomous University of Baja California)H-Index: 8
#2César Cruz-Hernández (Ensenada Center for Scientific Research and Higher Education)H-Index: 21
Last. R.M. López-Gutiérrez (UABC: Autonomous University of Baja California)H-Index: 15
view all 4 authors...
Chaotic encryption algorithm is implemented in 32 bit microcontroller to protect text.Security analysis shows the effectiveness of the encryption for real-time applications.Performance and resources analysis justify the implementation of the system.The implementation has high potential to be used in embedded systems in military, telemedicine, etc. Currently, several embedded applications in military, industry, banking transference, e-commerce, biometric systems and others use insecure communicat...
Source
#1Mousa Farajallah ('ENS Paris': École Normale Supérieure)H-Index: 9
#2Safwan El Assad ('ENS Paris': École Normale Supérieure)H-Index: 11
Last. Olivier DeforgesH-Index: 18
view all 3 authors...
Nonlinear dynamic cryptosystems or chaos-based cryptosystems have been attracting a large amount of research since 1990. The critical aspect of cryptography is to face the growth of communication and to achieve the design of fast and secure cryptosystems. In this paper, we introduce three versions of a chaos-based cryptosystem based on a similar structure of the Zhang and Fridrich cryptosystems. Each version is composed of two layers: a confusion layer and a diffusion layer. The confusion layer ...
Source
#1Lingfeng Liu (NCU: Nanchang University)H-Index: 1
#2Suoxia Miao (Nanchang Institute of Technology)H-Index: 1
In this paper, we proposed a new image encryption algorithm based on parameter-varied logistic chaotic map and dynamical algorithm. The parameter-varied logistic map can cure the weaknesses of logistic map and resist the phase space reconstruction attack. We use the parameter-varied logistic map to shuffle the plain image, and then use a dynamical algorithm to encrypt the image. We carry out several experiments, including Histogram analysis, information entropy analysis, sensitivity analysis, ke...
Source
#1Sergiy HaliukH-Index: 1
#2Oleg Krulikovskyi (Chernivtsi University)H-Index: 1
Last. Leonid PolitanskyiH-Index: 1
view all 3 authors...
In this article, a study permutations of pixels based on discretized two-dimensional Chirikov map in images with dimensions N × N. Specific properties of map that can be used by an attacker to recover the original image. For images with dimensions N × N the vulnerability of permutations to brute force attacks, and the ability of intruder to restore the original image without setting the value of keys permutations is shown.
Source
#1Yicong Zhou (UM: University of Macau)H-Index: 43
#2Zhongyun Hua (UM: University of Macau)H-Index: 20
Last. C. L. Philip Chen (UM: University of Macau)H-Index: 81
view all 4 authors...
Chaotic maps are widely used in different applications. Motivated by the cascade structure in electronic circuits, this paper introduces a general chaotic framework called the cascade chaotic system (CCS). Using two 1-D chaotic maps as seed maps, CCS is able to generate a huge number of new chaotic maps. Examples and evaluations show the CCS’s robustness. Compared with corresponding seed maps, newly generated chaotic maps are more unpredictable and have better chaotic performance, more parameter...
Source
#1Zhongyun Hua (UM: University of Macau)H-Index: 20
#2Yicong Zhou (UM: University of Macau)H-Index: 43
Last. C. L. Philip Chen (UM: University of Macau)H-Index: 81
view all 4 authors...
Because of the excellent properties of unpredictability, ergodicity and sensitivity to their parameters and initial values, chaotic maps are widely used in security applications. In this paper, we introduce a new two-dimensional Sine Logistic modulation map (2D-SLMM) which is derived from the Logistic and Sine maps. Compared with existing chaotic maps, it has the wider chaotic range, better ergodicity, hyperchaotic property and relatively low implementation cost. To investigate its applications,...
Source
#1Junxin Chen (NU: Northeastern University)H-Index: 24
#2Zhiliang Zhu (NU: Northeastern University)H-Index: 27
Last. Li-bo Zhang (NU: Northeastern University)H-Index: 10
view all 5 authors...
In recent years, a variety of chaos-based image cryptosystems have been investigated to meet the increasing demand for real-time secure image transmission. Most of them are based on permutation–diffusion architecture, in which permutation and diffusion are two independent procedures with fixed control parameters. This property results in two flaws. (1) At least two chaotic state variables are required for encrypting one plain pixel, in permutation and diffusion stages respectively. Chaotic state...
Source
#1Saranya Gokavarapu (GMR Institute of Technology)H-Index: 1
#2S. Vani Kumari (GMR Institute of Technology)H-Index: 1
This paper introduces a simple and efficient chaotic system using one-dimensional (1D) chaotic map. For high security purpose this paper proposing a new encryption algorithm and it consists of uniform density function. This algorithm has more security to different type of images such as gray scale images, color images. The proposed algorithm transform images into different noise like encrypted images with excellent confusion and diffusion properties. Using a security keys this algorithm provides...
Source
Cited By4
Newest
#1Shijian Cang (Tianjin University of Science and Technology)H-Index: 12
#2Zhijun Kang (Tianjin University of Science and Technology)H-Index: 2
Last. Zenghui Wang (UNISA: University of South Africa)H-Index: 19
view all 3 authors...
Pseudo-random number generator (PRNG) has been widely used in digital image encryption and secure communication. This paper reports a novel PRNG based on a generalized Sprott-A system that is conservative. To validate whether the system can produce high quality chaotic signals, we numerically investigate its conservative chaotic dynamics and the complexity based on the approximate entropy algorithm. In this PRNG, we first select an initial value as a key to generate conservative chaotic sequence...
Source
Source
Source
#1Erkan Tanyildizi (Fırat University)H-Index: 8
#2Fatih Özkaynak (Fırat University)H-Index: 17
Chaotic systems have been used to generate the substitutional box structures. The existence of endless possibilities for the selection of the initial conditions and control parameters of the chaotic system has made it a necessity to use the optimization algorithms for generation of chaos based substitutional box structures. Most appropriate initial conditions and control parameters have been determined for four different discrete time chaotic systems using seven different optimization algorithms...
Source
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.