Abstract
Image encryption schemes are important to ensure the security during transmission or storage. In this paper, chaos based image encryption scheme based on enhanced logistic map is proposed. The first stage consists of row and column rotation and XORing with first chaotic key. In the diffusion process, the pixel values are altered sequentially so that the changes made to a particular pixel depends on the accumulated effect of all the previous pixels. The operations include nonlinear diffusion using the second chaotic key and alternative zig-zag diffusion of adjacent pixels and XORing with the third chaotic key. The number of rounds in the steps are controlled by combination of pseudo random sequence and original image. The security and performance of the proposed image encryption technique have been analysed using statistical analysis, key space analysis, differential analysis and entropy analysis. The scheme possesses good performance in encryption speed and is suitable for real-time image encryption and transmission.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos. 8(6), 1259–1284 (1998)
Tong, X., Cui, M.: Image encryption with compound chaotic sequence cipher shifting dynamically. Image Vision Comput. 26, 843–850 (2008)
Wong, K.W., Wok, B.S.H., Law, W.S.: A fast image encryption scheme based on chaotic standard map. Phys. Lett. A 372, 2645–2652 (2008)
Patidar, V., Pareek, N.K., Sud, K.K.: A new substitution diffusion based image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simulat. 14, 3056–3075 (2009)
Patidar, V., Pareek, N.K., Purohit, G., Sud, K.K.: Modified substitution–diffusion image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simulat. 15(10), 2755–2765 (2010)
Jianquan, X., Chunhua, Y., Qing, X., Lijun, T.: An Encryption Algorithm Based on Transformed Logistic Map. In: IEEE International Conference on Network Security, Wireless Communications and Trusted Computing, pp. 111–114 (2009)
Rhouma, R., Solak, E., Belghith, S.: Cryptanalysis of a new substitution-diffusion based image cipher. Commun. Nonlinear Sci. Numer. Simulat. 15, 1887–1892 (2010)
Alvarez, G., Shujun, L.: Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption. Commun. Nonlinear Sci. Numer. Simulat. 14, 3743–3749 (2009)
Li, C., Li, S., Alvarez, G., Chen, G., Lo, K.-T.: Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations. Phys. Lett. A 369(1-2), 23–30 (2007)
Li, C., Li, S., Asim, M., Nunez, J., Alvarez, G., Chen, G.: On the security defects of an image encryption scheme. Image Vis. Comput. 27, 1371–1381 (2009)
Li, C., Shujun, L., Chen, G., Halang, W.A.: Cryptanalysis of an image encryption scheme based on a compound chaotic sequence. Image Vis. Comput. 27, 1035–1039 (2009)
Sam, I.S., Devaraj, P., Bhuvaneswaran, R.S.: Enhanced Substitution-Diffusion Based Image Cipher Using Improved Chaotic Map. In: Das, V.V., Vijaykumar, R. (eds.) ICT 2010. CCIS, vol. 101, pp. 116–123. Springer, Heidelberg (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sam, I.S., Devaraj, P., Bhuvaneswaran, R.S. (2011). Chaos Based Image Encryption Scheme Based on Enhanced Logistic Map. In: Natarajan, R., Ojo, A. (eds) Distributed Computing and Internet Technology. ICDCIT 2011. Lecture Notes in Computer Science, vol 6536. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19056-8_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-19056-8_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-19055-1
Online ISBN: 978-3-642-19056-8
eBook Packages: Computer ScienceComputer Science (R0)