Abstract

This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by information entropy analysis it is concluded that the security of this algorithm is higher compared with the original image; And a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and M sequence is proposed. This new algorithm is very sensitive to keys; the key space is large and its security is higher than two-stage Logistic mapping of image encryption and decryption technology.

Highlights

  • The issue of how to protect the security of private information has aroused widespread concern

  • This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, by information entropy analysis it is concluded that the security of this algorithm is higher compared with the original image; And a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and M sequence is proposed

  • The following will introduce two types of chaotic block ciphers: image encryption and decryption based on two-stage logistic mapping and a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and M sequence

Read more

Summary

Introduction

The issue of how to protect the security of private information has aroused widespread concern. Compared with the original map, this improved map can enter the chaotic state earlier, and the correlation characteristics are more ideal. This improved Logistic mapping still has some shortcomings in sequence ergodicity and randomness. We hope that this method can be improved to find a safer and faster encryption algorithm. The Lyapunov exponent represents the numerical characteristics of the average exponential divergence rate of adjacent trajectories in phase space It is one of the features used to identify several numerical values of chaotic motion. Whether the system is a chaotic system can be judged by the value of Lyapunov exponent in the dynamic system and the state of the system trajecto

Cryptography Theory
The Application of the Chaos Theory in Cryptography
Chaos Encryption Principle
Overview of the Logistic Mapping
Image Encryption and Decryption Technology of Two-Stage Logistic Map
Solving steps Encryption process
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call