Abstract

In this paper, we proposed a new image encryption algorithm based on parameter-varied logistic chaotic map and dynamical algorithm. The parameter-varied logistic map can cure the weaknesses of logistic map and resist the phase space reconstruction attack. We use the parameter-varied logistic map to shuffle the plain image, and then use a dynamical algorithm to encrypt the image. We carry out several experiments, including Histogram analysis, information entropy analysis, sensitivity analysis, key space analysis, correlation analysis and computational complexity to evaluate its performances. The experiment results show that this algorithm is with high security and can be competitive for image encryption.

Highlights

  • With the rapid development in internet technology and multimedia technology, multimedia communication has become more and more important

  • We show that the parameter-varied logistic map can cure the weaknesses of logistic map and is capable to resist phase space reconstruction

  • In this paper, we propose a new image encryption algorithm based on parameter-varied chaotic map and dynamical algorithm

Read more

Summary

Background

With the rapid development in internet technology and multimedia technology, multimedia communication has become more and more important. Some varying parameter techniques have been proposed, e.g., Murillo-Escobar et al (2015) use 32 hexadecimal digits to vary the parameter and initial value of logistic map, and the proposed system can avoid the small key space of low dimensional chaotic systems. In order to improve the weaknesses of logistic map and resist the phase space reconstruction attack, we propose an image encryption algorithm based on logistic map with varying parameter. Since some researches show that the sequences generated by logistic map are not secure with some weaknesses (Wang and Luan 2013), including relatively small key space, an uneven distribution and be attacked by phase space reconstruction, we use the following parameter-varying logistic map in our algorithm. The image G’ is the ciphered image In this encryption algorithm, the initial values x0 and u0, different parameters a1,..., a9, and the initial code book can be selected as the secret keys. Sensitivity analysis In order to resist differential analysis, the cipher text should be sensitive to both plain text and secret key

Different algorithms
Key sensitivity
Round T
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.