Open Access   Article Go Back

A Modified Image Encryption Technique Using Two Dimensional Sine Logistic Map

Subodh Kumar1 , Rajendra Kumar2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-3 , Page no. 1110-1115, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i3.11101115

Online published on Mar 31, 2019

Copyright © Subodh Kumar, Rajendra Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Subodh Kumar, Rajendra Kumar, “A Modified Image Encryption Technique Using Two Dimensional Sine Logistic Map,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1110-1115, 2019.

MLA Style Citation: Subodh Kumar, Rajendra Kumar "A Modified Image Encryption Technique Using Two Dimensional Sine Logistic Map." International Journal of Computer Sciences and Engineering 7.3 (2019): 1110-1115.

APA Style Citation: Subodh Kumar, Rajendra Kumar, (2019). A Modified Image Encryption Technique Using Two Dimensional Sine Logistic Map. International Journal of Computer Sciences and Engineering, 7(3), 1110-1115.

BibTex Style Citation:
@article{Kumar_2019,
author = {Subodh Kumar, Rajendra Kumar},
title = {A Modified Image Encryption Technique Using Two Dimensional Sine Logistic Map},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {1110-1115},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3974},
doi = {https://doi.org/10.26438/ijcse/v7i3.11101115}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.11101115}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3974
TI - A Modified Image Encryption Technique Using Two Dimensional Sine Logistic Map
T2 - International Journal of Computer Sciences and Engineering
AU - Subodh Kumar, Rajendra Kumar
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 1110-1115
IS - 3
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
524 349 downloads 195 downloads
  
  
           

Abstract

A color image Chaotic systems are commonly used in cryptosystems because chaotic system is very sensitive to initial conditions and also have the property of unpredictability as well as ergodicity. We have modified the two dimensional logistic sine map. This modified two dimensional sine logistic map enhanced the unpredictability and ergodicity. It also enhances the range of chaotic map. With the help of this modified two dimensional sine logistic map image encryption is performed. In the proposed technique confusion and diffusion both operations are performed, further to enhance the security level random values are added to the original image. With the help of simulation results and analysis of security, it can be proved that modified two dimensional sine logistic map can encrypt several types of images. The proposed algorithm also has the ability to resist from different types of attack.

Key-Words / Index Term

Chaotic Logistic map, XOR operation, Modified Sine Logistic Map System

References

[1]. Zhou et.al, A novel image encryption algorithm based on chaos and Line map, Neurocomputing (2015)150-157.
[2]. Lu Xu, Zhi Li, Jian Li and Wei Hua, A novel bit level image encryption algorithm based on chaotic maps, optics and Lasers in Engineering (2016) 17-25.
[3]. Zhou et.al, Encryption method based on a new secret key algorithm for color images, International Journal of Electronics and communication (2016) 1-7.
[4]. Aditya and Deepak, Selection of Best Sorting Algorithm, International Journal of Intelligent Information Processing, 2(2) July-December 2008; pp. 363-368.
[5].https://www.cs.cmu.edu/~adamchik/15121/lectures/Sorting%20Algorithms/sorting.html.
[6]. Ullah, Atta, Sajjad Shaukat Jamal, and Tariq Shah. "A novel construction of substitution box using a combination of chaotic maps with improved chaotic range." Nonlinear Dynamics 88.4 (2017): 2757-2769.
[7]. Özkaynak F. Brief review on application of nonlinear dynamics in im- age encryption. Nonlinear Dynamics 2018;92(2):305–13.
[8]. Wei X, Guo L, Zhang Q, Zhang J, Lian S. A novel color image encryption al- gorithm based on {DNA} sequence operation and hyper-chaotic system. J Syst Software 2012;85(2):290–9.
[9]. Liu L, Zhang Q, Wei X. A rgb image encryption algorithm based on dna en- coding and chaos map. Comput Electr Eng 2012;38(5):1240–8.
[10]. Wu X, Wang K, Wang X, Kan H, Kurths J. Color image DNA encryption using NCA map-based CML and one-time keys. Signal Processing 2018;148:272–87.
[11]. Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R. Chaos based crossover and mutation for securing dicom image. Comput Biol Med 2016;72:170–84.
[12]. Rao KD, Gangadhar C. Discrete wavelet transform and modified chaotic key- based algorithm for image encryption and its vlsi realization. IETE J Res 2012;58(2):114–20.
[13]. Mahesh M, Srinivasan D, Kankanala M, Amutha R. Image cryptography using discrete haar wavelet transform and arnold cat map. In: 2015 International Conference on Communications and Signal Processing (ICCSP); 2015. p. 1849– 55.
[14]. Saffari RM, Mirzakuchaki S. A novel image encryption algorithm based on dis- crete wavelet transform using two dimensional logistic map. In: 2016 24th Iranian Conference on Electrical Engineering (ICEE); 2016. p. 1785–90.
[15]. Kumar M, Kumar S, Das M, Budhiraja R, Singh S. Securing images with a diffusion mechanism based on fractional brownian motion. Journal of Information Security and Applications, 2018;40:134–44.
[16]. Wang X-Y, Li P, Zhang Y-Q, Liu L-Y, Zhang H, Wang X. A novel color image encryption scheme using dna permutation based on the lorenz system. Multimed Tools Appl 2018;77(5):6243–65.
[17]. Zhang Y-Q, Wang X-Y, Liu J, Chi Z-L. An image encryption scheme based on the mlncml system using dna sequences. Opt Lasers Eng 2016;82:95–103.
[18]. Zhang Y-Q, Wang X-Y. Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn 2014;77(3):687–98.
[19]. Liang Zhu Z, Zhang W, Wong K, Yu H. A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 2011;181(6):1171–86.
[20]. Zhang Y-Q, Wang X-Y. Spatio temporal chaos in mixed linear nonlinear coupled logistic map lattice. Physica A 2014;402:104–18.
[21]. Zhang Y-Q, Wang X-Y, Liu L-Y, He Y, Liu J. Spatio temporal chaos of fractional order logistic equation in nonlinear coupled lattices. Commun Nonlinear Sci Numer Simul 2017;52:52–61.
[22]. Zhang Y-Q, He Y, Wang X-Y. Spatiotemporal chaos in mixed linear nonlinear two-dimensional coupled logistic map lattice. Physica A 2018;4 90:14 8–60.
[23]. Xiang T, Wong K, Liao X. Selective image encryption using a spatiotemporal chaotic system. Chaos 2007;17(2):023115.
[24]. Li P, Li Z, Halang WA, Chen G. A stream cipher based on a spatiotempo- ral chaotic system. Chaos Solitons Fractals 2007;32(5):1867–76.
[25]. Wang S, Kuang J, Li J, Luo Y, Lu H, Hu G. Chaos-based secure communications in a large community. Phys Rev E 2002;66:065202.
[26]. Li H, Wang S, Li X, Tang G, Kuang J, Ye W, et al. A new spatio temporally chaotic cryptosystem and its security and performance analyses. Chaos 2004;14(3):617–29.
[27]. Lü L, Li Y, Sun A. Parameter identification and chaos synchronization for un- certain coupled map lattices. Nonlinear Dyn 2013;73(4):2111–17.
[28]. Leyuan Wang, Hongjun Song and Ping, A novel hybrid color image encryption algorithm using two complex chaotic systems optics and Lasers in Engineering (2016) 118-125.
[29]. X.Y. Wang and L. Teng, X. Qin, A novel colour image encryption algorithm based on chaos, Signal process, (2012), 1101-1108.
[30]. Yu Changa, GuanrongChenb, Complex dynamics in Chen’s system, Chaos, Solitons & Fractals Volume 27, Issue 1, January 2006, Pages 75–86.
[31]. Guanrong Chen, Yaobin Mao, Charles K. Chui, A symmetric image encryption scheme based on 3D chaotic cat maps, chaos, Solutions and Fractals 21(2004) 749-761.
[32]. Mahmoud GM, Bountis T, Mahmoud.EE, Active control and global synchronization of the complex Chen and Lüsystems.Int. J Bifurcat Chaos2007; 17 (12):4295–308.
[33]. Xiao-Jun Tong, Design of an image encryption scheme based on a multiple chaotic map, Commun Nonlinear Sci Number Simulation 18 (2013) 17251733.