Open Access   Article Go Back

A Neoteric Fractional Image Encryption Methods Based On Logistic Mapping

Shweta Chauhan1 , Pawan Kumar Mishra2

  1. Computer Science Engineering, Faculty of Technology, Uttarakhand Technical University, Dehradun, India.
  2. Computer Science Engineering, Faculty of Technology, Uttarakhand Technical University, Dehradun, India.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-4 , Page no. 37-42, Apr-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i4.3742

Online published on Apr 30, 2018

Copyright © Shweta Chauhan, Pawan Kumar Mishra . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shweta Chauhan, Pawan Kumar Mishra, “A Neoteric Fractional Image Encryption Methods Based On Logistic Mapping,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.37-42, 2018.

MLA Style Citation: Shweta Chauhan, Pawan Kumar Mishra "A Neoteric Fractional Image Encryption Methods Based On Logistic Mapping." International Journal of Computer Sciences and Engineering 6.4 (2018): 37-42.

APA Style Citation: Shweta Chauhan, Pawan Kumar Mishra, (2018). A Neoteric Fractional Image Encryption Methods Based On Logistic Mapping. International Journal of Computer Sciences and Engineering, 6(4), 37-42.

BibTex Style Citation:
@article{Chauhan_2018,
author = {Shweta Chauhan, Pawan Kumar Mishra},
title = {A Neoteric Fractional Image Encryption Methods Based On Logistic Mapping},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2018},
volume = {6},
Issue = {4},
month = {4},
year = {2018},
issn = {2347-2693},
pages = {37-42},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1843},
doi = {https://doi.org/10.26438/ijcse/v6i4.3742}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i4.3742}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1843
TI - A Neoteric Fractional Image Encryption Methods Based On Logistic Mapping
T2 - International Journal of Computer Sciences and Engineering
AU - Shweta Chauhan, Pawan Kumar Mishra
PY - 2018
DA - 2018/04/30
PB - IJCSE, Indore, INDIA
SP - 37-42
IS - 4
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
1133 698 downloads 428 downloads
  
  
           

Abstract

Cryptography is a intelligence to absorb the ambush of the accession by barter abstracts or admonition into advisement form, so the bulletin cannot be recognized. Today, there are abounding algorithms acclimated for the for Image encryption, but the chaotic encryption methods accept a acceptable aggregate of speed and high security. In abounding years, the chaotic based cryptographic apportioned accept been acceptable some new and abstruse means to advance defended Image encryption techniques. The chaos-based encryption schemes are composed of two steps: chaotic confusion and pixel diffusion. We aboriginal accord a explain addition into chaotic Image encryption and again we investigate some important backdrop and behavior of the logistic map. The logistic map, alternate trajectory, or random-like fluctuation, could not be acquired with some best of antecedent condition. Therefore, a blatant logistic map with accretion arrangement babble is introduced.

Key-Words / Index Term

Chaotic Confusion,Pixel Diffsion,Image Encrytion,Logistic Mapping

References

[1] Ying-yu C. and Chong Fu, ”An Image Encryption Scheme Based on High Dimension Chaos System,” Int.Cof. Intelligent computation technology and automation,pp. 104-108, 2008.
[2]. HAN Feng-ying, “Image Encryption Algorithm Based on Improved Logistic Chaotic Systems” , Journal of central South University of Forestry and Technology,28(1):153-157,2008

[3] Weihua Z. Ying S. “Encryption Algorithms Using Chaosand CAT Methodology,” International Conference onAnti-Counterfeiting Security and Identification in
Communication (ASID) ,pp. 20 - 23,2008

[4] Mohammad Ali Bani Younes and Aman Jantan, Image EncryptionUsing Block-Based Transformation Algorithm, IAENG International Journal
of Computer Science, 35:1, IJCS_35_1_03,2008

[5 ] C.K. Huang and H.H. Nien, Multi chaotic systems based pixel shuffle for image encryption, Optics Communications 282 2123–2127,2009

[6] Musheer Ahmed, M.shamsher Alam “A new algorithm of encryption and decryption of images using chaotic mapping” International Journal on computer science and engineering,vol.2(1),pp46-50,2009

[7] V. Patidar, N. K. Pareek, and K. K. Sud, “A new substitution- diffusion based image cipher using chaotic standard and logistic maps,” Communications in Nonlinear Science and Numerical Simulation,vol.14,no.7,pp.3056–3075,2009.

[8]Xiang Di, L. X. and Wang P., “Analysis and Improvement of a Chaos Image Encryption Algorithm,”Chaos, Solution and Fractal .Journal on computer science and engineering,vol.2(1), 2009

[9]Jonathan M.Blackedge,Musheer Ahmed ,Omar Farooq“Chaiotic image encryption algorithm based onfrequency domain scrambling” ,School of ElectricalEngineering systems Articles,Dublin Institute ofTechnolog,2010

[10]. C. J., S. G. and S. R., “An Image Encryption Scheme Based on One Time Pads - A Chaotic Approach,” Int.Conf. on Computing , Communication and Networking
Technologies, pp. 1 – 6, July. 2010.

[11].Chenghang Yu, Baojun Zhang and Xiang Ruan,The Chaotic Feature ofTrigonometric Function and Its Use for Image Encryption, EighthInternational Conference on Fuzzy Systems and Knowledge Discovery(FSKD),2011
[12]. G.A.Sathishkumar, Dr.K.Bhoopathy bagan and Dr.N.Sriraam, ImageEncryption Based on Diffusion and Multiple Chaotic Maps, InternationalJournal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March,2011.

[13] Komal D Patel, Sonal Belani,”Image Encryption Using DifferentTechniques”:A Review, International Journal of Emerging Technology andAdvanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume1, Issue 1, November 2011

[14] John Justin M, Manimurugan S, A Survey on Various EncryptionTechniques, International Journal of Soft Computing and Engineering (IJSCE)ISSN: 2231-2307, Volume-2, Issue-1, March 2012.

[15] Ruisong, Y. and Haiying ,Z.(2012). An Efficient Chaos-based Image Encryption Scheme Using Affine Modular Maps. I. J. Computer Network and Information Security, 7, pp.41-50.

[16] LEI Li-hong ,BAI Feng-ming,HAN Xue-hui, New Image EncryptionAlgorithm Based on Logistic Map and Hyper-chaos, International Conferenceon Computational and Information Sciences,2013

[17] A Novel Image Encryption Using Arnold Cat proposed by Pan Tian-gong and Li Da-yong College of Measurement-Control Tech & Communications Engineering, International Journal of Security and Its Applications Vol.7, No.5 2013

[18] F.K Tabash, M.F Rafiq, M Izharrudin”Image Encryption Algorithm based on Chaotic Map, International Journal of Computer Applications (0975-8887) Vol 64, number13 2013

[19] Ninth International Conference on Computational Intelligence and Security, A SymmetricImage Encryption Scheme Using Chaotic Baker map and Lorenz System, Chong Fu*, Wen-jingLi, Zhao-yu Meng, Tao Wang, Pei-xuan Li, (2013), (IEEE).

[20] Sukhjeevan Kaur Et Al , Int.J.Computer Technology & Applications, , A Review Of ImageEncryption Schemes Based On The Chaotic Map, Vol 5 (1),144-149, 2014

[21] Sandhya Rani et al. International Journal of Advanced Computer Research (ISSN) (print):2249-7277 ISSN (online): 2277-7970) Volume-4 Number-2 Issue, 2014

[22] Jun-xinChen,Zhi-liangZhu, Li-boZhang, ChongFu, andHaiYu An Efficient Diffusion Scheme for Chaos-Based Digital Image Encryption, Volume 2014, Article ID 427349, 13 pages http://dx.doi.org/10.1155/2014/427349.

[23]. Mayank Mishra, Prashant Mishra, Chinmay Garg “A new Algorithm of encryption and decryption of images using Chaotic Mapping, International Journal of Information and computing Technology ISSN 0974-2239 Vol 4 November 7,2014

[24] Pawan Mishra, Surbhi Prakash “Encryption Of images By Multiple Chaotic Maps, IJAFRC Vol 2, Issues 4, April-.ISSN 2348-4853, 2015

[25] ]LingFeng Liu, Suoxia Miao,”A new image encryption algorithm based on logistic map with varying parameter, SpringerPlus, received 20 September 2015, Accepted 1 March 2016, Published 8 March, 2016.