Dual Image Encryption Technique: Using Logistic Map and Noise

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 736)

Abstract

Any web based computer system is susceptible to attacks from hackers who intrude a system to obtain information for illegal use as well as for sabotaging a company’s business operations. This is where we need encryption techniques and image security. Image security includes visual authentication and access control based user images identification. In this paper, we propose a secured image encryption technique using Chaos-Logistic Maps. The algorithm proposed uses Logistic Map to shuffle the image and the noise and then superimposes them. Two shares of this resulting image are then created and XORed to make the image ready for transmission. The performance analysis using histograms and correlation coefficient show that the algorithm has high security, and strong robustness. The algorithm uses a logistic map and XOR gates to achieve a multi-chaos encryption effect.

Keywords

Encryption technique Logistic map Noise Visual cryptography XOR gates 

References

  1. 1.
    Count on - Transposition Ciphers, counton.org (2006). http://www.counton.org/explorer/codebreaking/transposition-ciphers.php. Accessed 13 Oct 17
  2. 2.
    Bourbakis, N., Alexopoulos, C.: Picture data encryption using scan patterns. Pattern Recogn. 25(6), 567–581 (1992).  https://doi.org/10.1016/0031-3203(92)90074-S. ISSN 0031-3203CrossRefGoogle Scholar
  3. 3.
    Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 8(6), 1259–1284 (1998)MathSciNetCrossRefMATHGoogle Scholar
  4. 4.
    Guan, Z.-H., Huang, F., Guan, W.: Chaos-based image encryption algorithm. Phys. Lett. A 346, 153–157 (2005).  https://doi.org/10.1016/j.physleta.2005.08.006 CrossRefMATHGoogle Scholar
  5. 5.
    Pareek, N., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24, 926–934 (2006).  https://doi.org/10.1016/j.imavis.2006.02.021 CrossRefGoogle Scholar
  6. 6.
    Zhu, A., Li, L.: Improving for chaotic image encryption algorithm based on logistic map. In: 2010 the 2nd Conference on Environmental Science and Information Application Technology, Wuhan, pp. 211–214 (2010).  https://doi.org/10.1109/esiat.2010.5568374
  7. 7.
    Mishra, M., Mankar, V.H.: Chaotic encryption scheme using 1-D chaotic map. Int. J. Commun. Netw. Syst. Sci. 4, 452–455 (2011).  https://doi.org/10.4236/ijcns.2011.47054 Google Scholar
  8. 8.
    Liu, L., Miao, S.: A new image encryption algorithm based on logistic chaotic map with varying parameter. SpringerPlus 5, 289 (2016). PMC. Web, 14 Nov 2017CrossRefGoogle Scholar
  9. 9.
    Saraereh, O.A., Aisafasfeh, Q., Arfoa, A.: Improving a new logistic map as a new chaotic algorithm for image encryption. Mod. Appl. Sci. 7(12) (2013)Google Scholar
  10. 10.
    Borujeni, S.E., Ehsani, M.S.: Modified logistic maps for cryptographic application. Appl. Math. 6, 773–782 (2015)CrossRefGoogle Scholar
  11. 11.
    Borwein, J.J., Rose, M.: 19 November 2012. https://theconversation.com/explainer-what-is-chaos-theory-10620
  12. 12.
    Shodhganga: a reservoir of Indian theses. http://hdl.handle.net/10603/25696

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer ScienceBharati Vidyapeeth’s College of EngineeringDelhiIndia

Personalised recommendations