Image Encryption Method Using Dependable Multiple Chaotic Logistic Functions

Image Encryption Method Using Dependable Multiple Chaotic Logistic Functions

Ranu Gupta, Rahul Pachauri, Ashutosh K. Singh
Copyright: © 2019 |Pages: 15
DOI: 10.4018/IJISP.2019100104
(Individual Articles)
No Current Special Offers


This article explores an efficient way of image encryption using chaotic logistic function. A set of two chaotic logistic functions and a 256 bit long external secret key are employed to enhance the security in the encrypted images. The initial condition of first logistic function has been obtained by providing the suitable weights to all bits of the secret key. The initial condition of second logistic function has been derived from first chaotic logistic function. In this proposed algorithm, ten different operations are used to encrypt the pixel of an image. The outcome of the second logistic map decides the operation to be used in the encryption of the particular image pixel. Various statistical parameter comparisons show that the proposed algorithm provides an image encryption method with better security and efficiency for all real-time applications.
Article Preview

1. Introduction

With the fast development in the technology of computer network and advancement in the information technology, a huge amount of image-based data is sent through unsecured channels in the public network. The security and the confidentiality of the information becomes the prime aspect while transmitting the data. The nature of chaotic signals has attracted many cryptographers. Its behavior resembles with the cryptographic properties. The ergodicity property of chaotic signal is similar to the confusion property in cryptography. The random behavior which appears to be noise in chaotic sequence resembles with the key sequence that is used in cryptography. The sensitiveness of chaotic signal towards the initial condition resembles with the diffusion property in the cryptography. Since encryption plays a vital role while transmitting the information in the form of images, thus the purpose of this paper is to develop such a method which would secure the confidential information and would be simple to implement.

Complete Article List

Search this Journal:
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing