A Neoteric Fractional Image Encryption Methods Based On Logistic Mapping
DOI:
https://doi.org/10.26438/ijcse/v6i4.3742Keywords:
Chaotic Confusion, Pixel Diffsion, Image Encrytion, Logistic MappingAbstract
Cryptography is a intelligence to absorb the ambush of the accession by barter abstracts or admonition into advisement form, so the bulletin cannot be recognized. Today, there are abounding algorithms acclimated for the for Image encryption, but the chaotic encryption methods accept a acceptable aggregate of speed and high security. In abounding years, the chaotic based cryptographic apportioned accept been acceptable some new and abstruse means to advance defended Image encryption techniques. The chaos-based encryption schemes are composed of two steps: chaotic confusion and pixel diffusion. We aboriginal accord a explain addition into chaotic Image encryption and again we investigate some important backdrop and behavior of the logistic map. The logistic map, alternate trajectory, or random-like fluctuation, could not be acquired with some best of antecedent condition. Therefore, a blatant logistic map with accretion arrangement babble is introduced.
References
[1] Ying-yu C. and Chong Fu, ”An Image Encryption Scheme Based on High Dimension Chaos System,” Int.Cof. Intelligent computation technology and automation,pp. 104-108, 2008.
[2] HAN Feng-ying, “Image Encryption Algorithm Based on Improved Logistic Chaotic Systems” , Journal of central South University of Forestry and Technology,28(1):153-157,2008
[3] Weihua Z. Ying S. “Encryption Algorithms Using Chaosand CAT Methodology,” International Conference onAnti-Counterfeiting Security and Identification inCommunication (ASID) ,pp. 20 - 23,2008
[4] Mohammad Ali Bani Younes and Aman Jantan, Image EncryptionUsing Block-Based Transformation Algorithm, IAENG International Journalof Computer Science, 35:1, IJCS_35_1_03,2008
[5 ] C.K. Huang and H.H. Nien, Multi chaotic systems based pixel shuffle for image encryption, Optics Communications 282 2123–2127,2009
[6] Musheer Ahmed, M.shamsher Alam “A new algorithm of encryption and decryption of images using chaotic mapping” International Journal on computer science and engineering,vol.2(1),pp46-50,2009
[7] V. Patidar, N. K. Pareek, and K. K. Sud, “A new substitution- diffusion based image cipher using chaotic standard and logistic maps,” Communications in Nonlinear Science and Numerical Simulation,vol.14,no.7,pp.3056–3075,2009.
[8]Xiang Di, L. X. and Wang P., “Analysis and Improvement of a Chaos Image Encryption Algorithm,”Chaos, Solution and Fractal .Journal on computer science and engineering,vol.2(1), 2009
[9]Jonathan M.Blackedge,Musheer Ahmed ,Omar Farooq“Chaiotic image encryption algorithm based onfrequency domain scrambling” ,School of ElectricalEngineering systems Articles,Dublin Institute ofTechnolog,2010
[10] C. J., S. G. and S. R., “An Image Encryption Scheme Based on One Time Pads - A Chaotic Approach,” Int.Conf. on Computing , Communication and NetworkingTechnologies, pp. 1 – 6, July. 2010.
[11]Chenghang Yu, Baojun Zhang and Xiang Ruan,The Chaotic Feature ofTrigonometric Function and Its Use for Image Encryption, EighthInternational Conference on Fuzzy Systems and Knowledge Discovery(FSKD),2011
[12] G.A.Sathishkumar, Dr.K.Bhoopathy bagan and Dr.N.Sriraam, ImageEncryption Based on Diffusion and Multiple Chaotic Maps, InternationalJournal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March,2011.
[13] Komal D Patel, Sonal Belani,”Image Encryption Using DifferentTechniques”:A Review, International Journal of Emerging Technology andAdvanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume1, Issue 1, November 2011
[14] John Justin M, Manimurugan S, A Survey on Various EncryptionTechniques, International Journal of Soft Computing and Engineering (IJSCE)ISSN: 2231-2307, Volume-2, Issue-1, March 2012.
[15] Ruisong, Y. and Haiying ,Z.(2012). An Efficient Chaos-based Image Encryption Scheme Using Affine Modular Maps. I. J. Computer Network and Information Security, 7, pp.41-50.
[16] LEI Li-hong ,BAI Feng-ming,HAN Xue-hui, New Image EncryptionAlgorithm Based on Logistic Map and Hyper-chaos, International Conferenceon Computational and Information Sciences,2013
[17] A Novel Image Encryption Using Arnold Cat proposed by Pan Tian-gong and Li Da-yong College of Measurement-Control Tech & Communications Engineering, International Journal of Security and Its Applications Vol.7, No.5 2013
[18] F.K Tabash, M.F Rafiq, M Izharrudin”Image Encryption Algorithm based on Chaotic Map, International Journal of Computer Applications (0975-8887) Vol 64, number13 2013
[19] Ninth International Conference on Computational Intelligence and Security, A SymmetricImage Encryption Scheme Using Chaotic Baker map and Lorenz System, Chong Fu*, Wen-jingLi, Zhao-yu Meng, Tao Wang, Pei-xuan Li, (2013), (IEEE).
[20] Sukhjeevan Kaur Et Al , Int.J.Computer Technology & Applications, , A Review Of ImageEncryption Schemes Based On The Chaotic Map, Vol 5 (1),144-149, 2014
[21] Sandhya Rani et al. International Journal of Advanced Computer Research (ISSN) (print):2249-7277 ISSN (online): 2277-7970) Volume-4 Number-2 Issue, 2014
[22] Jun-xinChen,Zhi-liangZhu, Li-boZhang, ChongFu, andHaiYu An Efficient Diffusion Scheme for Chaos-Based Digital Image Encryption, Volume 2014, Article ID 427349, 13 pages http://dx.doi.org/10.1155/2014/427349.
[23] Mayank Mishra, Prashant Mishra, Chinmay Garg “A new Algorithm of encryption and decryption of images using Chaotic Mapping, International Journal of Information and computing Technology ISSN 0974-2239 Vol 4 November 7,2014
[24] Pawan Mishra, Surbhi Prakash “Encryption Of images By Multiple Chaotic Maps, IJAFRC Vol 2, Issues 4, April-.ISSN 2348-4853, 2015
[25] ]LingFeng Liu, Suoxia Miao,”A new image encryption algorithm based on logistic map with varying parameter, SpringerPlus, received 20 September 2015, Accepted 1 March 2016, Published 8 March, 2016.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
