Skip to main content
Log in

Texture Analysis of Chaotic Coupled Map Lattices Based Image Encryption Algorithm

  • 3DR Express
  • Published:
3D Research

Abstract

As of late, data security is key in different enclosures like web correspondence, media frameworks, therapeutic imaging, telemedicine and military correspondence. In any case, a large portion of them confronted with a few issues, for example, the absence of heartiness and security. In this letter, in the wake of exploring the fundamental purposes of the chaotic trigonometric maps and the coupled map lattices, we have presented the algorithm of chaos-based image encryption based on coupled map lattices. The proposed mechanism diminishes intermittent impact of the ergodic dynamical systems in the chaos-based image encryption. To assess the security of the encoded image of this scheme, the association of two nearby pixels and composition peculiarities were performed. This algorithm tries to minimize the problems arises in image encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1

Similar content being viewed by others

References

  1. Ahadpour, S., & Sadra, Y. (2012). Randomness criteria in binary visibility graph and complex network perspective. Information Sciences, 197, 161–176.

    Article  MathSciNet  Google Scholar 

  2. Guo, X., & Zhang, J. (2010). Secure group key agreement protocol based on chaotic Hash. Information Sciences, 1180, 4069–4074.

    Article  Google Scholar 

  3. Liu, S., Long, Y., & Chen, K. (2011). Key updating technique in identity-based encryption. Information Sciences, 181, 2436–2440.

    Article  MathSciNet  MATH  Google Scholar 

  4. Weng, J., Yao, G., Deng, R. H., Chen, M., & Li, X. (2012). Cryptanalysis of a certificateless signcryption scheme in the standard model. Information Sciences, 181, 661–667.

    Article  MathSciNet  Google Scholar 

  5. Pareek, N. K., Patidar, V., & Sud, K. K. (2006). Image encryption using chaotic logistic map. Image and Vision Computing, 24, 926–934.

    Article  Google Scholar 

  6. Ahadpour, S., Sadra, Y., & ArastehFrad, Z. (2012). A novel chaotic image encryption using generalized threshold function. International Journal of Computer Applications, 42(18), 25–31.

    Article  Google Scholar 

  7. Ahadpour, S., Sadra, Y., & ArastehFrad, Z. (2012). A novel chaotic encryption scheme based on pseudorandom bit padding. International Journal of Computer Science Issues, 9(1), 449–456.

    Google Scholar 

  8. Jafarizadeh, M. A., Foroutan, M., & Ahadpour, S. (2006). Hierarchy of rational order families of chaotic maps with an invariant measure. Pramana-journal of physics, 67, 1073–1086.

    Article  Google Scholar 

  9. Khan, Majid, Shah, Tariq, Mahmood, Hasan, & Gondal, M. A. (2013). An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dynamics, 2013(71), 493–504.

    MathSciNet  Google Scholar 

  10. Khan, Majid, Shah, Tariq, & Gondal, M. A. (2013). An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dynamics, 2013(73), 1795–1801.

    Article  MathSciNet  Google Scholar 

  11. Khan, Majid, Shah, Tariq, Mahmood, Hasan, Gondal, M. A., & Hussain, I. (2012). A novel technique for constructions of S-Boxes based on chaotic Lorenz systems. Nonlinear Dynamics, 70, 2303–2311.

    Article  MathSciNet  Google Scholar 

  12. Khan, Majid, & Shah, Tariq. (2014). A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dynamics, 76, 377–382.

    Article  MathSciNet  Google Scholar 

  13. Khan, Majid, & Shah, Tariq. (2013). An efficient construction of substitution box with fractional chaotic system. Signal, Image and Video Processing,. doi:10.1007/s11760-013-0577-4.

    Google Scholar 

  14. Khan, Majid, & Shah, Tariq. (2014). A novel statistical analysis of chaotic S-box in image encryption. 3D Research, 5, 16. doi:10.1007/s13319-014-0016-5.

    Article  Google Scholar 

  15. Khan, Majid, & Shah, Tariq. (2014). A novel image encryption technique based on Hénon chaotic map and S8 symmetric group. Neural Computing and Applications,. doi:10.1007/s00521-014-1663-4.

    Google Scholar 

  16. Kanso, A., & Smaoui, N. (2009). Logistic chaotic maps for binary numbers generations. Chaos, Solitons and Fractals, 40, 2557–2568.

    Article  MathSciNet  Google Scholar 

  17. Behnia, S., Akhshani, A., Ahadpour, S., Mahmodi, H., & Akhavan, A. (2007). A fast chaotic encryptions cheme based on piece wise nonlinear chaotic maps. Physics Letters A, 366, 391–396.

    Article  Google Scholar 

  18. Chen, G., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals, 21, 749–761.

    Article  MathSciNet  MATH  Google Scholar 

  19. Maniyath, Sh. R., & Supriya M.(2011). An uncompressed image encryption algorithm based on DNA sequences. Computer Science and Information Technology, 258–270.

  20. Smaoui, N., & Kostelich, E. (1998). Using chaos to shadow the quadratic map for all time. International Journal of Computer Mathematics, 70, 117–129.

    Article  MathSciNet  MATH  Google Scholar 

  21. Zhou, Q., Wong, K. W., Liao, X., Xiang, T., & Hu, Y. (2008). Parallel image encryption algorithm based on discretized chaotic map. Chaos, Solitons & Fractals, 38, 1081–1092.

    Article  Google Scholar 

  22. Kandar, S., Maiti, A., & Dhara, B. C. (2011). Visual cryptography scheme for color image using random number with enveloping by digital watermarking. IJCSI International Journal of Computer Science Issues, 8, 543–549.

    Google Scholar 

  23. Haralick, R. M., Shanmugam, K., & Dinstein, I. (1973). Textural features for image classification. IEEE Transactions on Systems, Man and Cybernetics, 3, 610–621.

    Article  Google Scholar 

  24. Buf, J. M. H., Kardan, M., & Spann, M. (1990). Texture feature performance for image segmentation. Pattern Recognition, 23, 291–309.

    Article  Google Scholar 

  25. Haddon, J. F., & Boyce, J. F. (1993). Co-occurrence matrices for image analysis. IEE Electronics and Communications Engineering Journal, 5, 71–83.

    Article  Google Scholar 

  26. P.P., Ohanian, & Dubes, R. C. (1992). Performance evaluation for four class of texture features. Pattern Recognition, 25, 819–833.

    Article  Google Scholar 

  27. Haralick, R. M. (1979). Statistical and structural approaches to texture. Proceedings of the IEEE, 67, 786–804.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Majid Khan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khan, M., Shah, T. & Batool, S.I. Texture Analysis of Chaotic Coupled Map Lattices Based Image Encryption Algorithm. 3D Res 5, 19 (2014). https://doi.org/10.1007/s13319-014-0019-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s13319-014-0019-2

Keywords

Navigation