Abstract
A cryptosystem incorporating multiple chaotic maps is proposed. The use of chaotic maps for image encryption is a common procedure but this does not ensure absolute security. This paper presents encryption of novel images, a technique that incorporates three different chaotic maps—Tent map, Logistic Map and Gauss Iterative Map for encryption. Image encryption will be a two-step process involving one chaotic map to randomly rearrange the pixels of individual RGB components and other maps to reorganize another image. These two will then be XORed to provide dual security. The technique’s strengths have been analysed and presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kalra M, Dua HK, Singh R (2017) Dual image encryption technique: using logistic map and noise. In: 2017 17th international conference on intelligent systems design and applications, New Delhi, 2017, pp 201–208. https://doi.org/10.1007/978-3-319-76348-4_20
Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372(4):394–400. https://doi.org/10.1016/j.physleta.2007.07.040. ISSN 0375-9601
Liu HJ, Wang XY (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59:3320–3327. https://doi.org/10.1016/j.camwa.2010.03.017
Sathishkumar GA, Bhoopathy Bagan K, Sriraam N (2011) Image encryption based on diffusion and multiple chaotic maps. Int J Netw Secur Its Appl (IJNSA) 3(2). https://doi.org/10.5121/ijnsa.2011.3214
Cao Y (2013) A new hybrid chaotic map and its application on image encryption and hiding. Math Probl Eng 13 p. https://doi.org/10.1155/2013/728375. Article ID 728375
Zhang X, Cao Y (2014) A novel chaotic map and an improved chaos-based image encryption scheme. Sci World J 8 p. https://doi.org/10.1155/2014/713541. Article ID 713541
Mishra P, Prakash S (2015) Encryption of images by multiple chaotic maps. Int J Adv Found Res Comput (IJAFRC) 2
Gopalakrishnan T, Ramakrishnan S. Image encryption in block-wise with multiple chaotic maps for permutation and diffusion. https://doi.org/10.21917/ijivp.2016.0177
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kalra, M., Katyal, S., Singh, R., Thakur, N. (2019). Two-Way Encryption and Decryption Technique Using Chaotic Maps. In: Saini, H., Sayal, R., Govardhan, A., Buyya, R. (eds) Innovations in Computer Science and Engineering. Lecture Notes in Networks and Systems, vol 74. Springer, Singapore. https://doi.org/10.1007/978-981-13-7082-3_21
Download citation
DOI: https://doi.org/10.1007/978-981-13-7082-3_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-7081-6
Online ISBN: 978-981-13-7082-3
eBook Packages: EngineeringEngineering (R0)