Image Encryption and Decryption Using Combined Key Sequence of Logistic map and Lozi map

被引:0
|
作者
Rohith, S. [1 ]
Sujatha, B. K. [2 ]
机构
[1] Nagarjuna Coll Engn & Technol, Bangalore 562110, Karnataka, India
[2] MS Ramaiah Inst Technol, Bangalore, Karnataka, India
来源
2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP) | 2015年
关键词
Combined key sequence; Chaos Theory; Logistic map; Lozi map; Image encryption;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper image encryption and decryption using combined key sequence of Logistic map and Lozi map is proposed. Initially discrete key sequence {K-1i}={K-11, K-12, K1(3,).. K-1n} where 'n' is size of the image and K-1i is an element of {0, 255} is generated using Logistic function. Then Lozi map is used to generate a discrete key sequence {K-2i}={K-21, K-22, K-23... K-2n} K-2i is an element of{0, 255}. Both the Key sequences are combined using XOR function to obtain single key sequence {K-i}. The obtained Key sequence {K-i} is used to encrypt the image. To study the performance of the proposed scheme a set of five different gray scale medical images are chosen. Also proposed scheme is compared with encryption scheme using key sequences generated by (i) Logistic map{K-1i} alone (ii) Lozi map {K-1i} alone. Security analysis of the scheme is analyzed using parameters such as (i) Visual analysis (ii) Histogram (iii) Correlation (iv) Entropy (v) Mean Square Error (MSE). Result shows that proposed scheme is immune to statistical attacks. Also the performances of the proposed scheme for all the five image cases are fairly same and scheme is independent of image chosen.
引用
收藏
页码:1053 / 1058
页数:6
相关论文
共 50 条
  • [31] A Wavelet Based Partial Image Encryption using Chaotic Logistic Map
    Hazarika, Nitumoni
    Borah, Sagarika
    Saikia, Monjul
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 1471 - 1475
  • [32] Image encryption using the two-dimensional logistic chaotic map
    Wu, Yue
    Yang, Gelan
    Jin, Huixia
    Noonan, Joseph P.
    JOURNAL OF ELECTRONIC IMAGING, 2012, 21 (01)
  • [33] ATTACK TO AN IMAGE ENCRYPTION BASED ON CHAOTIC LOGISTIC MAP
    Wang Xing-Yuan
    Chen Feng
    Wang Tian
    Xu Dahai
    Ma Yutian
    INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 2013, 27 (31):
  • [34] Mitigating drawbacks of logistic map for image encryption algorithms
    Oravec J.
    Ovseník Ľ.
    Turán J.
    Huszaník T.
    Computing and Informatics, 2021, 39 (06) : 1250 - 1281
  • [35] A Nonlinearly Modulated Logistic Map with Delay for Image Encryption
    Li, Shouliang
    Yin, Benshun
    Ding, Weikang
    Zhang, Tongfeng
    Ma, Yide
    ELECTRONICS, 2018, 7 (11)
  • [36] An image encryption scheme based on quantum logistic map
    Akhshani, A.
    Akhavan, A.
    Lim, S. -C.
    Hassan, Z.
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2012, 17 (12) : 4653 - 4661
  • [37] An image encryption process based on Chaotic logistic map
    Mandal, Mrinal Kanti
    Banik, Gourab Dutta
    Chattopadhyay, Debasish
    Nandi, Debashis
    IETE TECHNICAL REVIEW, 2012, 29 (05) : 395 - 404
  • [38] MITIGATING DRAWBACKS OF LOGISTIC MAP FOR IMAGE ENCRYPTION ALGORITHMS
    Oravec, Jakub
    Ovsenik, Lubos
    Turan, Jan
    Huszanik, Tomas
    COMPUTING AND INFORMATICS, 2020, 39 (06) : 1250 - 1281
  • [39] Quantum Image Encryption Based on Baker Map and 2D Logistic Map
    Wu, WanQing
    Wang, Qiao
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2022, 61 (03)
  • [40] Quantum Image Encryption Based on Baker Map and 2D Logistic Map
    WanQing Wu
    Qiao Wang
    International Journal of Theoretical Physics, 2022, 61