Abstract

Chaotic theory has been employed in cryptography application for establishing a sequence of data closest to pseudorandom number. Image cryptography with Chaotic Map Lattices (CML) uses the chaos parameters, the number of iterations and the number of cycles for encryption as secret keys. Amount of secret keys has a great impact on security in cryptography. Adaptive Pixel-Selection Fractional Chaotic Map Lattices (APFCML) enhances the encryption security by introducing a novel non-integer fractional order concept as secret keys. Fractional chaos is modified chaos with a fractional differential equation containing derivatives of non-integer order. A non-integer order has an effect on the range of chaos's parameter. Moreover, the encryption sequence has been adaptively selected based on another chaos generator. In the experiments, the measurement indices of originality preservation, visual inspection, and statistical analysis are used to evaluate the performance of the proposed APFCML compared to that of the original CML. Key words: Chaotic, fractional logistic, image cryptography, Lyapunov exponent, bifurcation diagram.

Highlights

  • IntroductionThe communication is through the public network such as the Internet

  • In the current trends, the communication is through the public network such as the Internet

  • The measurement indices of originality preservation, visual inspection, and statistical analysis are used to evaluate the performance of the proposed Adaptive Pixel-Selection Fractional Chaotic Map Lattices (APFCML) compared to that of the original Chaotic Map Lattices (CML)

Read more

Summary

Introduction

The communication is through the public network such as the Internet. The secure communication is crucial for business communication (Pecora and Carroll, 1990; Van Wiggeren and Roy, 1998). Electronic banking and military communication are two sample applications that clearly require a secure communication. The cryptographic algorithm is a method to protect plain text by changing it to data confidentiality. The cryptographic algorithm encrypts the plain text to a ciphered text using a key or keys, and it decrypts the ciphered text back to the plain text (Pareek et al, 2003). Symmetric-key cryptography is algorithms for cryptography used the same keys for both encryption and decryption while asymmetric cryptography uses different keys for encryption and decryption. An attack can try different keys until the plain text is found

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call