Skip to main content

Chaos Based Image Encryption Scheme Based on Enhanced Logistic Map

  • Conference paper
Distributed Computing and Internet Technology (ICDCIT 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6536))

Abstract

Image encryption schemes are important to ensure the security during transmission or storage. In this paper, chaos based image encryption scheme based on enhanced logistic map is proposed. The first stage consists of row and column rotation and XORing with first chaotic key. In the diffusion process, the pixel values are altered sequentially so that the changes made to a particular pixel depends on the accumulated effect of all the previous pixels. The operations include nonlinear diffusion using the second chaotic key and alternative zig-zag diffusion of adjacent pixels and XORing with the third chaotic key. The number of rounds in the steps are controlled by combination of pseudo random sequence and original image. The security and performance of the proposed image encryption technique have been analysed using statistical analysis, key space analysis, differential analysis and entropy analysis. The scheme possesses good performance in encryption speed and is suitable for real-time image encryption and transmission.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos. 8(6), 1259–1284 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  2. Tong, X., Cui, M.: Image encryption with compound chaotic sequence cipher shifting dynamically. Image Vision Comput. 26, 843–850 (2008)

    Article  Google Scholar 

  3. Wong, K.W., Wok, B.S.H., Law, W.S.: A fast image encryption scheme based on chaotic standard map. Phys. Lett. A 372, 2645–2652 (2008)

    Article  MATH  Google Scholar 

  4. Patidar, V., Pareek, N.K., Sud, K.K.: A new substitution diffusion based image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simulat. 14, 3056–3075 (2009)

    Article  Google Scholar 

  5. Patidar, V., Pareek, N.K., Purohit, G., Sud, K.K.: Modified substitution–diffusion image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simulat. 15(10), 2755–2765 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  6. Jianquan, X., Chunhua, Y., Qing, X., Lijun, T.: An Encryption Algorithm Based on Transformed Logistic Map. In: IEEE International Conference on Network Security, Wireless Communications and Trusted Computing, pp. 111–114 (2009)

    Google Scholar 

  7. Rhouma, R., Solak, E., Belghith, S.: Cryptanalysis of a new substitution-diffusion based image cipher. Commun. Nonlinear Sci. Numer. Simulat. 15, 1887–1892 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  8. Alvarez, G., Shujun, L.: Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption. Commun. Nonlinear Sci. Numer. Simulat. 14, 3743–3749 (2009)

    Article  Google Scholar 

  9. Li, C., Li, S., Alvarez, G., Chen, G., Lo, K.-T.: Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations. Phys. Lett. A 369(1-2), 23–30 (2007)

    Article  MATH  Google Scholar 

  10. Li, C., Li, S., Asim, M., Nunez, J., Alvarez, G., Chen, G.: On the security defects of an image encryption scheme. Image Vis. Comput. 27, 1371–1381 (2009)

    Article  Google Scholar 

  11. Li, C., Shujun, L., Chen, G., Halang, W.A.: Cryptanalysis of an image encryption scheme based on a compound chaotic sequence. Image Vis. Comput. 27, 1035–1039 (2009)

    Article  Google Scholar 

  12. Sam, I.S., Devaraj, P., Bhuvaneswaran, R.S.: Enhanced Substitution-Diffusion Based Image Cipher Using Improved Chaotic Map. In: Das, V.V., Vijaykumar, R. (eds.) ICT 2010. CCIS, vol. 101, pp. 116–123. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sam, I.S., Devaraj, P., Bhuvaneswaran, R.S. (2011). Chaos Based Image Encryption Scheme Based on Enhanced Logistic Map. In: Natarajan, R., Ojo, A. (eds) Distributed Computing and Internet Technology. ICDCIT 2011. Lecture Notes in Computer Science, vol 6536. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19056-8_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19056-8_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19055-1

  • Online ISBN: 978-3-642-19056-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics