We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

A New Image Encryption Method using Chirikov and Logistic Map

by Nidhi Sethi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 59 - Number 3
Year of Publication: 2012
Authors: Nidhi Sethi
10.5120/9528-3949

Nidhi Sethi . A New Image Encryption Method using Chirikov and Logistic Map. International Journal of Computer Applications. 59, 3 ( December 2012), 15-17. DOI=10.5120/9528-3949

@article{ 10.5120/9528-3949,
author = { Nidhi Sethi },
title = { A New Image Encryption Method using Chirikov and Logistic Map },
journal = { International Journal of Computer Applications },
issue_date = { December 2012 },
volume = { 59 },
number = { 3 },
month = { December },
year = { 2012 },
issn = { 0975-8887 },
pages = { 15-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume59/number3/9528-3949/ },
doi = { 10.5120/9528-3949 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:05:08.687866+05:30
%A Nidhi Sethi
%T A New Image Encryption Method using Chirikov and Logistic Map
%J International Journal of Computer Applications
%@ 0975-8887
%V 59
%N 3
%P 15-17
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we have proposed a new method to develop secure image-encryption techniques using a Chirikov Standard Map and Logistic Map . In this technique, a Chirikov standard map is used to shuffle the pixels of the image and hence creating the confusion. The 1D logistic map is further used to create diffusion in the image. Various test images are used to demonstrate the validity of the proposed algorithm. The results of experiments show that the proposed algorithm for image cryptosystems provides a no correlation between the original image and cipher image. The scheme is highly key sensitive and shows good resistance against brute force attack and statistical attack.

References
  1. P Raviraj and M. Y. Sanavullah, (2007) "The modified 2D-Haar Wavelet Transformation in image compression"Middle East Journal of Scientific Research, Vol: 2 , Issue: 2,pp 73-78,ISSN 1990-9233.
  2. Jonathan M. Blackedge,Musheer Ahmed ,Omar Farooq( 2010) "Chaiotic image encryption algorithm based on frequency domain scrambling" ,School of Electrical Engineering systems Articles,Dublin Institute of Technology.
  3. G. K. Kharate, A. A. Ghatol and P. P. Rege, (2005) "Image Compression Using Wavelet Packet Tree", ICGST-GVIP Journal, Volume Issue (7).
  4. David F. Walnut, ,(2002) "Wavelet Analysis", Birkhauser, ISBN-0- 8176-3962-4.
  5. Musheer Ahmed, M. shamsher Alam(2009) "A new algorithm of encryption and decryption of images using chaotic mapping" International Journal on computer science and engineering,vol. 2(1), pp46-50.
  6. J. Fridrich(1998) "Symmetric ciphers based on two-dimensional chaotic maps" International Journal of Bifurcation and Chaos. vol. 8, ,1259-1284.
  7. Linhua Zhang, Xiaofeng liao , Xuebing Wang(2005) "An image encryption approach based on chaotic maps" chaos,solitons and fractals,vol. 24 ,759-765.
  8. Shiguo lian , Jinsheng sun, Zhiquan wang(2005) "A block cipher based on a suitable use of the chaotic standard map"chaos solitons and fractals,vol. 26, ,117-129.
  9. Ahmed T A1-Taani and Abdullah M. AL-Issa (2009) "A Novel Steganographic Method For Gray-Level Images". World Academy Of Science,Engineering and Technology,.
  10. Puech, W. and Rodrigues, J. M. (2004. ) A New Crypto- Watermarking Method for Medical Images Safe Transfer. In The 12th European Signal Processing Conference, pp. 1481-1484.
  11. Chengqing Li, (2008)"On the security of a class of Image Encryption Scheme", IEEE International Symposium on Circuit & System , ISCAS, Department of Electronics Engineering, University of Hong Kong , pg 3290-3293
  12. S. K. Muttoo1, Sushil Kumar(2008) "Data Hiding in JPEG Images" BVICAM'S International Journal of Information Technology Bharati Vidyapeeth's Institute of Computer Applications and Management, New Delhi.
  13. Microslav Dobsicek, (2004)"Modern Stegnography" 8th International Student Conference on Electrical Engineering FEE CTU.
  14. C. E. Shannon, (1949 )"Communication Theory of Secrecy Systems," Bell Syst Tech J, vol. 28, , pp. 656–715.
  15. Chong Fu, Jun-jie Chen,Hao Zou, Wei-hong Meng, Yong-feng Zhan, and Ya-wen Yu(2012), "A chaos-based digital image encryption scheme with an improved diffusion strategy" (C) 2012 OSA, Vol. 20, No. 3 / OPTICS EXPRESS 2363.
Index Terms

Computer Science
Information Sciences

Keywords

Image encryption Chirikov Standard Map 1D Logistic Map