A Neoteric Fractional Image Encryption Methods Based On Logistic Mapping

Authors

  • Chauhan S Computer Science Engineering, Faculty of Technology, Uttarakhand Technical University, Dehradun, India
  • Kumar Mishra P Computer Science Engineering, Faculty of Technology, Utttarakhand Technical University, Dehradun, India

DOI:

https://doi.org/10.26438/ijcse/v6i4.3742

Keywords:

Chaotic Confusion, Pixel Diffsion, Image Encrytion, Logistic Mapping

Abstract

Cryptography is a intelligence to absorb the ambush of the accession by barter abstracts or admonition into advisement form, so the bulletin cannot be recognized. Today, there are abounding algorithms acclimated for the for Image encryption, but the chaotic encryption methods accept a acceptable aggregate of speed and high security. In abounding years, the chaotic based cryptographic apportioned accept been acceptable some new and abstruse means to advance defended Image encryption techniques. The chaos-based encryption schemes are composed of two steps: chaotic confusion and pixel diffusion. We aboriginal accord a explain addition into chaotic Image encryption and again we investigate some important backdrop and behavior of the logistic map. The logistic map, alternate trajectory, or random-like fluctuation, could not be acquired with some best of antecedent condition. Therefore, a blatant logistic map with accretion arrangement babble is introduced.

References

[1] Ying-yu C. and Chong Fu, ”An Image Encryption Scheme Based on High Dimension Chaos System,” Int.Cof. Intelligent computation technology and automation,pp. 104-108, 2008.

[2] HAN Feng-ying, “Image Encryption Algorithm Based on Improved Logistic Chaotic Systems” , Journal of central South University of Forestry and Technology,28(1):153-157,2008

[3] Weihua Z. Ying S. “Encryption Algorithms Using Chaosand CAT Methodology,” International Conference onAnti-Counterfeiting Security and Identification inCommunication (ASID) ,pp. 20 - 23,2008

[4] Mohammad Ali Bani Younes and Aman Jantan, Image EncryptionUsing Block-Based Transformation Algorithm, IAENG International Journalof Computer Science, 35:1, IJCS_35_1_03,2008

[5 ] C.K. Huang and H.H. Nien, Multi chaotic systems based pixel shuffle for image encryption, Optics Communications 282 2123–2127,2009

[6] Musheer Ahmed, M.shamsher Alam “A new algorithm of encryption and decryption of images using chaotic mapping” International Journal on computer science and engineering,vol.2(1),pp46-50,2009

[7] V. Patidar, N. K. Pareek, and K. K. Sud, “A new substitution- diffusion based image cipher using chaotic standard and logistic maps,” Communications in Nonlinear Science and Numerical Simulation,vol.14,no.7,pp.3056–3075,2009.

[8]Xiang Di, L. X. and Wang P., “Analysis and Improvement of a Chaos Image Encryption Algorithm,”Chaos, Solution and Fractal .Journal on computer science and engineering,vol.2(1), 2009

[9]Jonathan M.Blackedge,Musheer Ahmed ,Omar Farooq“Chaiotic image encryption algorithm based onfrequency domain scrambling” ,School of ElectricalEngineering systems Articles,Dublin Institute ofTechnolog,2010

[10] C. J., S. G. and S. R., “An Image Encryption Scheme Based on One Time Pads - A Chaotic Approach,” Int.Conf. on Computing , Communication and NetworkingTechnologies, pp. 1 – 6, July. 2010.

[11]Chenghang Yu, Baojun Zhang and Xiang Ruan,The Chaotic Feature ofTrigonometric Function and Its Use for Image Encryption, EighthInternational Conference on Fuzzy Systems and Knowledge Discovery(FSKD),2011

[12] G.A.Sathishkumar, Dr.K.Bhoopathy bagan and Dr.N.Sriraam, ImageEncryption Based on Diffusion and Multiple Chaotic Maps, InternationalJournal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March,2011.

[13] Komal D Patel, Sonal Belani,”Image Encryption Using DifferentTechniques”:A Review, International Journal of Emerging Technology andAdvanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume1, Issue 1, November 2011

[14] John Justin M, Manimurugan S, A Survey on Various EncryptionTechniques, International Journal of Soft Computing and Engineering (IJSCE)ISSN: 2231-2307, Volume-2, Issue-1, March 2012.

[15] Ruisong, Y. and Haiying ,Z.(2012). An Efficient Chaos-based Image Encryption Scheme Using Affine Modular Maps. I. J. Computer Network and Information Security, 7, pp.41-50.

[16] LEI Li-hong ,BAI Feng-ming,HAN Xue-hui, New Image EncryptionAlgorithm Based on Logistic Map and Hyper-chaos, International Conferenceon Computational and Information Sciences,2013

[17] A Novel Image Encryption Using Arnold Cat proposed by Pan Tian-gong and Li Da-yong College of Measurement-Control Tech & Communications Engineering, International Journal of Security and Its Applications Vol.7, No.5 2013

[18] F.K Tabash, M.F Rafiq, M Izharrudin”Image Encryption Algorithm based on Chaotic Map, International Journal of Computer Applications (0975-8887) Vol 64, number13 2013

[19] Ninth International Conference on Computational Intelligence and Security, A SymmetricImage Encryption Scheme Using Chaotic Baker map and Lorenz System, Chong Fu*, Wen-jingLi, Zhao-yu Meng, Tao Wang, Pei-xuan Li, (2013), (IEEE).

[20] Sukhjeevan Kaur Et Al , Int.J.Computer Technology & Applications, , A Review Of ImageEncryption Schemes Based On The Chaotic Map, Vol 5 (1),144-149, 2014

[21] Sandhya Rani et al. International Journal of Advanced Computer Research (ISSN) (print):2249-7277 ISSN (online): 2277-7970) Volume-4 Number-2 Issue, 2014

[22] Jun-xinChen,Zhi-liangZhu, Li-boZhang, ChongFu, andHaiYu An Efficient Diffusion Scheme for Chaos-Based Digital Image Encryption, Volume 2014, Article ID 427349, 13 pages http://dx.doi.org/10.1155/2014/427349.

[23] Mayank Mishra, Prashant Mishra, Chinmay Garg “A new Algorithm of encryption and decryption of images using Chaotic Mapping, International Journal of Information and computing Technology ISSN 0974-2239 Vol 4 November 7,2014

[24] Pawan Mishra, Surbhi Prakash “Encryption Of images By Multiple Chaotic Maps, IJAFRC Vol 2, Issues 4, April-.ISSN 2348-4853, 2015

[25] ]LingFeng Liu, Suoxia Miao,”A new image encryption algorithm based on logistic map with varying parameter, SpringerPlus, received 20 September 2015, Accepted 1 March 2016, Published 8 March, 2016.

Downloads

Published

2025-11-12
CITATION
DOI: 10.26438/ijcse/v6i4.3742
Published: 2025-11-12

How to Cite

[1]
S. Chauhan and P. Kumar Mishra, “A Neoteric Fractional Image Encryption Methods Based On Logistic Mapping”, Int. J. Comp. Sci. Eng., vol. 6, no. 4, pp. 37–42, Nov. 2025.

Issue

Section

Research Article