A Improved Logistic Chaotic Map and Its Application to Image Encryption and Hiding

被引:12
|
作者
Liu Gongzhi [1 ]
Wu Qiong [1 ]
Wang Guangyi [1 ]
Jin Peipei [1 ]
机构
[1] Hangzhou Dianzi Univ, Sch Elect Informat, Hangzhou 310018, Peoples R China
基金
中国国家自然科学基金;
关键词
Logistic chaotic map; Image encryption; Image hiding;
D O I
10.11999/JEIT210763
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In view of the limited mapping range of the original Logistic map, the small range of chaotic parameters, and the uneven distribution, a new improved Logistic chaotic map is proposed. The mapping has two parameters mu and, alpha, and two initial values of x(n-1)and x(n). The parameter and initial value selection range can be extended to any real number. The chaotic mapping is full mapping, and the mapping range can be adjusted arbitrarily. This mapping is applied to image encryption, and the algorithm uses pixel value Exclusive OR(XOR) encryption and pixel position is scrambled. Afterwards, the ciphertext data is hidden in the image that has nothing to do with the ciphertext. A series of analysis is done on the ciphertext image, including the correlation between adjacent pixels of the image, histogram analysis and key sensitivity test. The analysis result shows that the proposed encryption algorithm has good security and encryption effect.
引用
收藏
页码:3602 / 3609
页数:8
相关论文
共 19 条
  • [1] Hiding data in images by simple LSB substitution
    Chan, CK
    Cheng, LM
    [J]. PATTERN RECOGNITION, 2004, 37 (03) : 469 - 474
  • [2] [陈志刚 Chen Zhigang], 2016, [电子与信息学报, Journal of Electronics & Information Technology], V38, P1547
  • [3] [范九伦 FAN Jiu-lun], 2009, [电子学报, Acta Electronica Sinica], V37, P720
  • [4] GONG Haimei, 2016, INTELLIGENT COMPUTER, V6, P60, DOI [10.3969/j.issn.2095-2163.2016.04.018, DOI 10.3969/J.ISSN.2095-2163.2016.04.018]
  • [5] HAO Jin, 2021, J DALIAN POLYTECHNIC, V40, P214, DOI [10.19670/j.cnki.dlgydxxb.2021.0703, DOI 10.19670/J.CNKI.DLGYDXXB.2021.0703]
  • [6] Exponential Chaotic Model for Generating Robust Chaos
    Hua, Zhongyun
    Zhou, Yicong
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (06): : 3713 - 3724
  • [7] Cosine-transform-based chaotic system for image encryption
    Hua, Zhongyun
    Zhou, Yicong
    Huang, Hejiao
    [J]. INFORMATION SCIENCES, 2019, 480 : 403 - 419
  • [8] 2D Logistic-Sine-coupling map for image encryption
    Hua, Zhongyun
    Jin, Fan
    Xu, Binxuan
    Huang, Hejiao
    [J]. SIGNAL PROCESSING, 2018, 149 : 148 - 161
  • [9] An Image Encryption Algorithm Based on Chaos Set
    Li Fupeng
    Liu Jingbiao
    Wang Guangyi
    Wang Kangtai
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (04) : 981 - 987
  • [10] Liu R., 2016, COMPUTER MODERNIZATI, P13