Abstract
As of late, data security is key in different enclosures like web correspondence, media frameworks, therapeutic imaging, telemedicine and military correspondence. In any case, a large portion of them confronted with a few issues, for example, the absence of heartiness and security. In this letter, in the wake of exploring the fundamental purposes of the chaotic trigonometric maps and the coupled map lattices, we have presented the algorithm of chaos-based image encryption based on coupled map lattices. The proposed mechanism diminishes intermittent impact of the ergodic dynamical systems in the chaos-based image encryption. To assess the security of the encoded image of this scheme, the association of two nearby pixels and composition peculiarities were performed. This algorithm tries to minimize the problems arises in image encryption.
Similar content being viewed by others
References
Ahadpour, S., & Sadra, Y. (2012). Randomness criteria in binary visibility graph and complex network perspective. Information Sciences, 197, 161–176.
Guo, X., & Zhang, J. (2010). Secure group key agreement protocol based on chaotic Hash. Information Sciences, 1180, 4069–4074.
Liu, S., Long, Y., & Chen, K. (2011). Key updating technique in identity-based encryption. Information Sciences, 181, 2436–2440.
Weng, J., Yao, G., Deng, R. H., Chen, M., & Li, X. (2012). Cryptanalysis of a certificateless signcryption scheme in the standard model. Information Sciences, 181, 661–667.
Pareek, N. K., Patidar, V., & Sud, K. K. (2006). Image encryption using chaotic logistic map. Image and Vision Computing, 24, 926–934.
Ahadpour, S., Sadra, Y., & ArastehFrad, Z. (2012). A novel chaotic image encryption using generalized threshold function. International Journal of Computer Applications, 42(18), 25–31.
Ahadpour, S., Sadra, Y., & ArastehFrad, Z. (2012). A novel chaotic encryption scheme based on pseudorandom bit padding. International Journal of Computer Science Issues, 9(1), 449–456.
Jafarizadeh, M. A., Foroutan, M., & Ahadpour, S. (2006). Hierarchy of rational order families of chaotic maps with an invariant measure. Pramana-journal of physics, 67, 1073–1086.
Khan, Majid, Shah, Tariq, Mahmood, Hasan, & Gondal, M. A. (2013). An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dynamics, 2013(71), 493–504.
Khan, Majid, Shah, Tariq, & Gondal, M. A. (2013). An efficient technique for the construction of substitution box with chaotic partial differential equation. Nonlinear Dynamics, 2013(73), 1795–1801.
Khan, Majid, Shah, Tariq, Mahmood, Hasan, Gondal, M. A., & Hussain, I. (2012). A novel technique for constructions of S-Boxes based on chaotic Lorenz systems. Nonlinear Dynamics, 70, 2303–2311.
Khan, Majid, & Shah, Tariq. (2014). A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dynamics, 76, 377–382.
Khan, Majid, & Shah, Tariq. (2013). An efficient construction of substitution box with fractional chaotic system. Signal, Image and Video Processing,. doi:10.1007/s11760-013-0577-4.
Khan, Majid, & Shah, Tariq. (2014). A novel statistical analysis of chaotic S-box in image encryption. 3D Research, 5, 16. doi:10.1007/s13319-014-0016-5.
Khan, Majid, & Shah, Tariq. (2014). A novel image encryption technique based on Hénon chaotic map and S8 symmetric group. Neural Computing and Applications,. doi:10.1007/s00521-014-1663-4.
Kanso, A., & Smaoui, N. (2009). Logistic chaotic maps for binary numbers generations. Chaos, Solitons and Fractals, 40, 2557–2568.
Behnia, S., Akhshani, A., Ahadpour, S., Mahmodi, H., & Akhavan, A. (2007). A fast chaotic encryptions cheme based on piece wise nonlinear chaotic maps. Physics Letters A, 366, 391–396.
Chen, G., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals, 21, 749–761.
Maniyath, Sh. R., & Supriya M.(2011). An uncompressed image encryption algorithm based on DNA sequences. Computer Science and Information Technology, 258–270.
Smaoui, N., & Kostelich, E. (1998). Using chaos to shadow the quadratic map for all time. International Journal of Computer Mathematics, 70, 117–129.
Zhou, Q., Wong, K. W., Liao, X., Xiang, T., & Hu, Y. (2008). Parallel image encryption algorithm based on discretized chaotic map. Chaos, Solitons & Fractals, 38, 1081–1092.
Kandar, S., Maiti, A., & Dhara, B. C. (2011). Visual cryptography scheme for color image using random number with enveloping by digital watermarking. IJCSI International Journal of Computer Science Issues, 8, 543–549.
Haralick, R. M., Shanmugam, K., & Dinstein, I. (1973). Textural features for image classification. IEEE Transactions on Systems, Man and Cybernetics, 3, 610–621.
Buf, J. M. H., Kardan, M., & Spann, M. (1990). Texture feature performance for image segmentation. Pattern Recognition, 23, 291–309.
Haddon, J. F., & Boyce, J. F. (1993). Co-occurrence matrices for image analysis. IEE Electronics and Communications Engineering Journal, 5, 71–83.
P.P., Ohanian, & Dubes, R. C. (1992). Performance evaluation for four class of texture features. Pattern Recognition, 25, 819–833.
Haralick, R. M. (1979). Statistical and structural approaches to texture. Proceedings of the IEEE, 67, 786–804.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Khan, M., Shah, T. & Batool, S.I. Texture Analysis of Chaotic Coupled Map Lattices Based Image Encryption Algorithm. 3D Res 5, 19 (2014). https://doi.org/10.1007/s13319-014-0019-2
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s13319-014-0019-2