Image Encryption Method Using New Concept of Compound Blood Transfusion Rule with Multiple Chaotic Maps

被引:0
|
作者
Gupta, Ranu [1 ,2 ]
Pachauri, Rahul [2 ]
Singh, Ashutosh Kumar [1 ]
机构
[1] Jaypee Univ Engn & Technol, Dept Elect & Commun, Guna 473226, MP, India
[2] Thapar Inst Engn & Technol Univ, Dept Elect & Commun, Patiala 147004, Punjab, India
关键词
Blood transfusion rule (BTR); chaotic function; encryption; decryption; real-time; image; NPCR; ALGORITHM;
D O I
10.2174/1573405615666190101110751
中图分类号
R8 [特种医学]; R445 [影像诊断学];
学科分类号
1002 ; 100207 ; 1009 ;
摘要
Introduction: With the advancement in internet technology, a large amount of information in the form of data and image is transferred from one end to the other. The information may be military, defense, medical, etc. which should be kept confidential by providing security. Objective: The aim of this article will be to provide security to the image. This is achieved by applying the image encryption method which converts the original information into an unreadable format. Methods: This work explores an efficient way of image encryption using a chaotic logistic function. A set of two chaotic logistic functions and 256 bit long external secret key are employed to enhance the security in the encrypted images. The initial condition of first logistic function has been obtained by providing the suitable weights to all bits of the secret key. The initial condition of second logistic function has been derived from the first chaotic logistic function. In this proposed algorithm, ten different operations are used to encrypt the pixel of an image. The outcome of the second logistic map decides the operation to be used in the encryption of the particular image pixel. Results: Various statistical parameters like NPCR, UACI and information entropy were calculated. Conclusion: Results show that the proposed algorithm provides an image encryption method with better security and efficiency for all real-time applications such as medical images.
引用
收藏
页码:1034 / 1043
页数:10
相关论文
共 50 条
  • [21] Image Encryption Based On Diffusion Process And Multiple Chaotic Maps
    Marshnil, Ameena N.
    Binish, M. C.
    2014 INTERNATIONAL CONFERENCE ON POWER SIGNALS CONTROL AND COMPUTATIONS (EPSCICON), 2014,
  • [22] Image Encryption using Logistic and Rectangular Chaotic Maps
    Nair, Karan
    Kulkarni, Janhavi
    Warde, Mansi
    Rawalgaonkar, Vedashree
    Joshi, Jonathan
    Chheda, Vicky
    2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [23] An image encryption algorithm using the combination of chaotic maps
    Arab, Alireza A.
    Rostami, Mohammad Javad B.
    Ghavami, Behnam
    OPTIK, 2022, 261
  • [24] Enhanced Image Encryption Using Two Chaotic Maps
    Salman, Fatimah Abdulnabi
    Salman, Khitam Abdulnabi
    JOURNAL OF ICT RESEARCH AND APPLICATIONS, 2020, 14 (02) : 134 - 148
  • [25] Cryptanalysis of a New Chaotic Image Encryption Technique Based on Multiple Discrete Dynamical Maps
    Fan, Haiju
    Zhang, Chenjiu
    Lu, Heng
    Li, Ming
    Liu, Yanfang
    ENTROPY, 2021, 23 (12)
  • [26] A new image encryption algorithm based on multiple chaotic maps and output-feedback
    Zhu, Congxu
    Huang, Dazu
    Guo, Ying
    Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and Information Science of Wuhan University, 2010, 35 (05): : 528 - 531
  • [27] A New Chaos Based Image Encryption Scheme Using Chaotic Logistic Maps
    Taleb, Fadia
    2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, : 1222 - 1228
  • [28] Selective Encryption of Video Using Multiple Chaotic Maps
    Varalakshmi, L. M.
    Sudha, G. Florence
    INFORMATION PROCESSING AND MANAGEMENT, 2010, 70 : 164 - +
  • [29] Combined image encryption and steganography technique for enhanced security using multiple chaotic maps*
    Aparna, H.
    Madhumitha, J.
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 110
  • [30] Image Encryption Method Using Dependable Multiple Chaotic Logistic Functions
    Gupta, Ranu
    Pachauri, Rahul
    Singh, Ashutosh K.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2019, 13 (04) : 53 - 67