CFP last date
20 December 2024
Reseach Article

Article:Improved Image Encryption Algorithm using Chaotic Map

by Joshi Rohit A, Joshi Sumit S, G. P. Bhole
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 32 - Number 9
Year of Publication: 2011
Authors: Joshi Rohit A, Joshi Sumit S, G. P. Bhole
10.5120/3930-5561

Joshi Rohit A, Joshi Sumit S, G. P. Bhole . Article:Improved Image Encryption Algorithm using Chaotic Map. International Journal of Computer Applications. 32, 9 ( October 2011), 6-10. DOI=10.5120/3930-5561

@article{ 10.5120/3930-5561,
author = { Joshi Rohit A, Joshi Sumit S, G. P. Bhole },
title = { Article:Improved Image Encryption Algorithm using Chaotic Map },
journal = { International Journal of Computer Applications },
issue_date = { October 2011 },
volume = { 32 },
number = { 9 },
month = { October },
year = { 2011 },
issn = { 0975-8887 },
pages = { 6-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume32/number9/3930-5561/ },
doi = { 10.5120/3930-5561 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:18:43.505657+05:30
%A Joshi Rohit A
%A Joshi Sumit S
%A G. P. Bhole
%T Article:Improved Image Encryption Algorithm using Chaotic Map
%J International Journal of Computer Applications
%@ 0975-8887
%V 32
%N 9
%P 6-10
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper proposes an improved image encryption scheme over existing scheme. The distinct feature of improved encryption scheme is that it encrypts the image using chaotic maps only without further confusing this encrypted image as illustrated in existing scheme. Further, the advantages over existing scheme are 1) the proposed algorithm is completely retrievable in contrast to the existing algorithm 2) the experimental results of proposed algorithm are better than existing algorithm which governs added security level and 3) lesser computational complexity which governs improved speed performance.

References
  1. Long Min; Huang Lu,”Design and Analysis of a novel Chaotic Image Encryption,”International Conference on Computer Modelling and Simulation( ICCMS’10), vol 1,2010.pp. 517-520.
  2. N. K. Pareek, Vinod Patidar and K. K. Sud, “Image encryption using chaotic logistic map,” Image and Vision Computing, vol. 24, 2006, pp. 926-934.
  3. H.S. Kwok, W. K. S.Tang, “A fast image encryption system based on chaotic maps with finite precision representation,” Chaos, Solitons and Fractals, vol. 32, 2007, pp. 1518–1529.
  4. S. Behnia, A. Akhshani, H. Mahmodi and A. Akhavan, “A novel algorithm for image encryption based on mixture of chaotic maps,” Chaos, Solitons and Fractals, vol. 35, 2008, pp. 408–419.
  5. Di Xiao, Xiaofeng Liao, Pengcheng Wei. Analysis and improvement of a chaos-based image encryption algorithm. Chaos, Solitons, and Fractals, vol.40,pp. 2191-2199, 2009.
  6. Cahit Cokal, Ercan Solak. Cryptanalysis of a chaos-based image encryption algorithm. Physics Letters A, vol. 373,pp. 1357-1360,2009.
  7. Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez, Guanrong Chen. On the security defects of an image encryption scheme. Image and Vision Computing, vol. 27, no.9, pp. 1371-1381, 2009.
  8. Patidar, V.; Purohit, G.; Sud, K.K.; Pareek, N.K., “Image encryption through a novel permutation-substitution scheme based on chaotic standard map,”International Workshop on Chaos Fractals Theories and Applications(IWCTA) 2010,pp. 164 – 169.
  9. Ali Kanso, Nejib Smaoui. Logistic chaotic maps for binary numbers generations. Chaos, Solitons and Fractals,vol.40, pp.2557-2568,2009.
  10. Vinod Patidar, N. K. Pareek and K. K. Sud, “A new substitution- diffusion based image cipher using chaotic standard and logistic maps,” CNSNS, vol. 14, 2009, pp. 3056-3075.
Index Terms

Computer Science
Information Sciences

Keywords

Chaos Security