Image Encryption and Decryption Using Combined Key Sequence of Logistic map and Lozi map

被引:0
|
作者
Rohith, S. [1 ]
Sujatha, B. K. [2 ]
机构
[1] Nagarjuna Coll Engn & Technol, Bangalore 562110, Karnataka, India
[2] MS Ramaiah Inst Technol, Bangalore, Karnataka, India
来源
2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP) | 2015年
关键词
Combined key sequence; Chaos Theory; Logistic map; Lozi map; Image encryption;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper image encryption and decryption using combined key sequence of Logistic map and Lozi map is proposed. Initially discrete key sequence {K-1i}={K-11, K-12, K1(3,).. K-1n} where 'n' is size of the image and K-1i is an element of {0, 255} is generated using Logistic function. Then Lozi map is used to generate a discrete key sequence {K-2i}={K-21, K-22, K-23... K-2n} K-2i is an element of{0, 255}. Both the Key sequences are combined using XOR function to obtain single key sequence {K-i}. The obtained Key sequence {K-i} is used to encrypt the image. To study the performance of the proposed scheme a set of five different gray scale medical images are chosen. Also proposed scheme is compared with encryption scheme using key sequences generated by (i) Logistic map{K-1i} alone (ii) Lozi map {K-1i} alone. Security analysis of the scheme is analyzed using parameters such as (i) Visual analysis (ii) Histogram (iii) Correlation (iv) Entropy (v) Mean Square Error (MSE). Result shows that proposed scheme is immune to statistical attacks. Also the performances of the proposed scheme for all the five image cases are fairly same and scheme is independent of image chosen.
引用
收藏
页码:1053 / 1058
页数:6
相关论文
共 50 条
  • [1] Two level Image Encryption Scheme using Arnold map and Combined Key Sequence of Logistic map and Tent map
    Bhaskar, H. G.
    Rohith, S.
    Mahesh, M. R.
    2015 TWELFTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS (WOCN), 2015,
  • [2] Image Encryption Scheme Using Combined Key Sequence of Logistic and Tent Map for Medical Applications
    Rohith, S.
    Sree, C. Bhavya
    Yellapu, Vijay
    Basavaraj, G. M.
    Mahesh, M. R.
    2021 IEEE INTERNATIONAL CONFERENCE ON MOBILE NETWORKS AND WIRELESS COMMUNICATIONS (ICMNWC), 2021,
  • [3] Image Encryption and Decryption using Chaotic Key Sequence Generated by Sequence of Logistic Map and Sequence of States of Linear Feedback Shift Register
    Rohith, S.
    Bhat, K. N. Hari
    Sharma, A. Nandini
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRONICS, COMPUTERS AND COMMUNICATIONS (ICAECC), 2014,
  • [4] Chaotic Audio Encryption and Decryption Using Logistic Map
    Thanikaiselvan, V
    Abilash, P.
    Lingeswar, C.
    Sathya, P., I
    Kaviya, K.
    Subashanthini, S.
    Amirtharajan, Rengarajan
    2024 IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND INTELLIGENT SYSTEMS, I2CACIS 2024, 2024, : 346 - 351
  • [5] Image encryption using chaotic logistic map
    Pareek, N. K.
    Patidar, Vinod
    Sud, K. K.
    IMAGE AND VISION COMPUTING, 2006, 24 (09) : 926 - 934
  • [6] Cryptanalyzing image encryption using chaotic logistic map
    Li, Chengqing
    Xie, Tao
    Liu, Qi
    Cheng, Ge
    NONLINEAR DYNAMICS, 2014, 78 (02) : 1545 - 1551
  • [7] Image Encryption Using Double Chaotic Logistic Map
    Safi, Haifaa W.
    Maghari, Ashraf Y.
    2017 INTERNATIONAL CONFERENCE ON PROMISING ELECTRONIC TECHNOLOGIES (ICPET 2017), 2017, : 66 - 70
  • [8] Image Encryption Using Modified Perturbed Logistic Map
    Kumaran, Subhashini
    Ramachandran, Amutha
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2024, 21 (05) : 866 - 878
  • [9] Cryptanalyzing image encryption using chaotic logistic map
    Chengqing Li
    Tao Xie
    Qi Liu
    Ge Cheng
    Nonlinear Dynamics, 2014, 78 : 1545 - 1551
  • [10] An Image Encryption & Decryption Approach Based on Pixel Shuffling Using Arnold Cat Map & Henon Map
    Prusty, Agyan Kumar
    Pattanaik, Asutosh
    Mishra, Swastik
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2013,