Advertisement

A Simple Image Encryption Algorithm Based on Logistic Map

  • Tsu-Yang Wu
  • King-Hang Wang
  • Chien-Ming ChenEmail author
  • Jimmy Ming-Tai Wu
  • Jeng-Shyang Pan
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 891)

Abstract

Based on the better properties of chaotic maps, the studies of chaotic-based image encryption have received much attentions by researchers in recent years. In this paper, an image encryption algorithm based on logistic map with substitution approach is proposed. Meanwhile, we make the line chart, histogram, and pixel loss analysis to show the performance of our algorithm.

Keywords

Image Encryption Logistic map Histogram analysis 

Notes

Acknowledgments

The work of Tsu-Yang Wu was supported in part by the Science and Technology Development Center, Ministry of Education, China under Grant no. 2017A13025 and the Natural Science Foundation of Fujian Province under Grant no. 2018J01636. The work of Chien-Ming Chen was supported in part by Shenzhen Technical Project (JCYJ20170307151750788) and in part by Shenzhen Technical Project (KQJSCX20170327161755).

References

  1. 1.
    Behnia, S., Akhshani, A., Mahmodi, H., Akhavan, A.: A novel algorithm for image encryption based on mixture of chaotic maps. Chaos Solitons Fractals 35(2), 408–419 (2008)MathSciNetzbMATHGoogle Scholar
  2. 2.
    Chang, F.C., Huang, H.C.: A survey on intelligent sensor network and its applications. J. Netw. Intell. 1(1), 1–15 (2016)MathSciNetGoogle Scholar
  3. 3.
    Chen, C.M., Wang, K.H., Wu, T.Y., Wang, E.K.: On the security of a three-party authenticated key agreement protocol based on chaotic maps. Data Sci. Pattern Recognit. 1(2), 1–10 (2017)Google Scholar
  4. 4.
    Chen, C.M., Xu, L., Wu, T.Y., Li, C.R.: On the security of a chaotic maps-based three-party authenticated key agreement protocol. J. Netw. Intell. 1(2), 61–66 (2016)Google Scholar
  5. 5.
    Chen, X., Peng, X., Li, J.B., Yu, P.: Overview of deep kernel learning based techniques and applications. J. Netw. Intell. 1(3), 83–98 (2016)Google Scholar
  6. 6.
    Fournier-Viger, P., Lin, J.C.W., Kiran, R.U., Koh, Y.S., Thomas, R.: A survey of sequential pattern mining. Data Sci. Pattern Recognit. 1(1), 54–77 (2017)Google Scholar
  7. 7.
    Gao, T., Chen, Z.: A new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(4), 394–400 (2008)zbMATHGoogle Scholar
  8. 8.
    Huang, X.: Image encryption algorithm using chaotic chebyshev generator. Nonlinear Dyn. 67(4), 2411–2417 (2012)MathSciNetGoogle Scholar
  9. 9.
    Hussain, I., Shah, T., Gondal, M.A.: An efficient image encryption algorithm based on S8 S-box transformation and NCA map. Opt. Commun. 285(24), 4887–4890 (2012)Google Scholar
  10. 10.
    Liu, H., Wang, X.: Color image encryption based on one-time keys and robust chaotic maps. Comput. Math. Appl. 59(10), 3320–3327 (2010)MathSciNetzbMATHGoogle Scholar
  11. 11.
    Wang, X., Guo, K.: A new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn. 76(4), 1943–1950 (2014)zbMATHGoogle Scholar
  12. 12.
    Wang, X., Liu, L., Zhang, Y.: A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt. Lasers Eng. 66, 10–18 (2015)Google Scholar
  13. 13.
    Wu, T.Y., Fan, X., Wang, K.H., Pan, J.S., Chen, C.M., Wu, J.M.T.: Security analysis and improvement of an image encryption scheme based on chaotic tent map. J. Inf. Hiding Multimed. Signal Process. 9(4), 1050–1057 (2018)Google Scholar
  14. 14.
    Xu, L., Li, Z., Li, J., Hua, W.: A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 78, 17–25 (2016)Google Scholar
  15. 15.
    Ye, G., Huang, X.: A feedback chaotic image encryption scheme based on both bit-level and pixel-level. J. Vib. Control. 22(5), 1171–1180 (2016)MathSciNetGoogle Scholar
  16. 16.
    Zhao, J., Wang, S., Chang, Y., Li, X.: A novel image encryption scheme based on an improper fractional-order chaotic system. Nonlinear Dyn. 80(4), 1721–1729 (2015)MathSciNetGoogle Scholar
  17. 17.
    Zhu, H., Zhang, X., Yu, H., Zhao, C., Zhu, Z.: An image encryption algorithm based on compound homogeneous hyper-chaotic system. Nonlinear Dyn. 89(1), 61–79 (2017)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Tsu-Yang Wu
    • 1
    • 2
  • King-Hang Wang
    • 3
  • Chien-Ming Chen
    • 4
    Email author
  • Jimmy Ming-Tai Wu
    • 5
  • Jeng-Shyang Pan
    • 1
    • 2
  1. 1.Fujian Provincial Key Lab of Big Data Mining and ApplicationsFujian University of TechnologyFuzhouChina
  2. 2.National Demonstration Center for Experimental Electronic Information and Electrical Technology EducationFujian University of TechnologyFuzhouChina
  3. 3.Department of Computer Science and EngineeringHong Kong University of Science and TechnologyClear Water BayHong Kong
  4. 4.Harbin Institute of Technology (Shenzhen)ShenzhenChina
  5. 5.College of Computer Science and EngineeringShandong University of Science and TechnologyQingdaoChina

Personalised recommendations