A Color Image Encryption Technique Based on Bit-Level Permutation and Alternate Logistic Maps

被引:26
|
作者
Bisht, Ankita [2 ]
Dua, Mohit [1 ]
Dua, Shelza [3 ]
Jaroli, Priyanka [2 ]
机构
[1] NIT Kurukshetra, Dept Comp Engn, Kurukshetra, Haryana, India
[2] Banasthali Vidyapith Banasthali, Dept Comp Sci, Newai, India
[3] NIT Kurukshetra, Dept Elect & Commun Engn, Kurukshetra, Haryana, India
关键词
ACM; LSM; LTM; TSM; Lorenz system; alternate logistic map; CHAOTIC STANDARD; ALGORITHM; SCHEME; IMPLEMENTATION; STEGANOGRAPHY; DESIGN;
D O I
10.1515/jisys-2018-0365
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper presents an approach to encrypt the color images using bit-level permutation and alternate logistic map. The proposed method initially segregates the color image into red, green, and blue channels, transposes the segregated channels from the pixel-plane to bit-plane, and scrambles the bit-plane matrix using Arnold cat map (ACM). Finally, the red, blue, and green channels of the scrambled image are confused and diffused by applying alternate logistic map that uses a four-dimensional Lorenz system to generate a pseudorandom number sequence for the three channels. The parameters of ACM are generated with the help of Logistic-Sine map and Logistic-Tent map. The intensity values of scrambled pixels are altered by Tent-Sine map. One-dimensional and two-dimensional logistic maps are used for alternate logistic map implementation. The performance and security parameters histogram, correlation distribution, correlation coefficient, entropy, number of pixel change rate, and unified averaged changed intensity are computed to show the potential of the proposed encryption technique.
引用
收藏
页码:1246 / 1260
页数:15
相关论文
共 50 条
  • [21] Security analysis of a color image encryption based on bit-level and chaotic map
    Wen, Heping
    Chen, Ruiting
    Yang, Jieyi
    Zheng, Tianle
    Wu, Jiahao
    Lin, Wenxing
    Jian, Huilin
    Lin, Yiting
    Ma, Linchao
    Liu, Zhen
    Zhang, Chongfu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (2) : 4133 - 4149
  • [22] A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation
    Li, Yueping
    Wang, Chunhua
    Chen, Hua
    OPTICS AND LASERS IN ENGINEERING, 2017, 90 : 238 - 246
  • [23] Image encryption algorithm based on bit-level permutation and “Feistel-like network” diffusion
    Jinqing Li
    Jia Wang
    Xiaoqiang Di
    Multimedia Tools and Applications, 2022, 81 : 44335 - 44362
  • [24] A Novel Chaotic Image Encryption Algorithm Based on Bit-level Permutation and Extended Zigzag Transform
    Xu, Chunming
    International Journal of Network Security, 2021, 23 (02): : 255 - 260
  • [25] Image encryption algorithm based on bit-level permutation and "Feistel-like network" diffusion
    Li, Jinqing
    Wang, Jia
    Di, Xiaoqiang
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (30) : 44335 - 44362
  • [26] Bit-level based secret sharing for image encryption
    Lukac, R
    Plataniotis, KN
    PATTERN RECOGNITION, 2005, 38 (05) : 767 - 772
  • [27] Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation
    Zhang, Ying-Qian
    Wang, Xing-Yuan
    NONLINEAR DYNAMICS, 2014, 77 (03) : 687 - 698
  • [28] Circular inter-intra pixels bit-level permutation and chaos-based image encryption
    Diaconu, Adrian-Viorel
    INFORMATION SCIENCES, 2016, 355 : 314 - 327
  • [29] Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation
    Ying-Qian Zhang
    Xing-Yuan Wang
    Nonlinear Dynamics, 2014, 77 : 687 - 698
  • [30] A robust bit-level image encryption based on Bessel map
    Toktas, Abdurrahim
    Erkan, Ugur
    Gao, Suo
    Pak, Chanil
    APPLIED MATHEMATICS AND COMPUTATION, 2024, 462