Abstract
In this paper, we proposed a new image encryption algorithm based on parameter-varied logistic chaotic map and dynamical algorithm. The parameter-varied logistic map can cure the weaknesses of logistic map and resist the phase space reconstruction attack. We use the parameter-varied logistic map to shuffle the plain image, and then use a dynamical algorithm to encrypt the image. We carry out several experiments, including Histogram analysis, information entropy analysis, sensitivity analysis, key space analysis, correlation analysis and computational complexity to evaluate its performances. The experiment results show that this algorithm is with high security and can be competitive for image encryption.
Highlights
With the rapid development in internet technology and multimedia technology, multimedia communication has become more and more important
We show that the parameter-varied logistic map can cure the weaknesses of logistic map and is capable to resist phase space reconstruction
In this paper, we propose a new image encryption algorithm based on parameter-varied chaotic map and dynamical algorithm
Summary
With the rapid development in internet technology and multimedia technology, multimedia communication has become more and more important. Some varying parameter techniques have been proposed, e.g., Murillo-Escobar et al (2015) use 32 hexadecimal digits to vary the parameter and initial value of logistic map, and the proposed system can avoid the small key space of low dimensional chaotic systems. In order to improve the weaknesses of logistic map and resist the phase space reconstruction attack, we propose an image encryption algorithm based on logistic map with varying parameter. Since some researches show that the sequences generated by logistic map are not secure with some weaknesses (Wang and Luan 2013), including relatively small key space, an uneven distribution and be attacked by phase space reconstruction, we use the following parameter-varying logistic map in our algorithm. The image G’ is the ciphered image In this encryption algorithm, the initial values x0 and u0, different parameters a1,..., a9, and the initial code book can be selected as the secret keys. Sensitivity analysis In order to resist differential analysis, the cipher text should be sensitive to both plain text and secret key
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have