Dual Image Encryption Technique: Using Logistic Map and Noise
Any web based computer system is susceptible to attacks from hackers who intrude a system to obtain information for illegal use as well as for sabotaging a company’s business operations. This is where we need encryption techniques and image security. Image security includes visual authentication and access control based user images identification. In this paper, we propose a secured image encryption technique using Chaos-Logistic Maps. The algorithm proposed uses Logistic Map to shuffle the image and the noise and then superimposes them. Two shares of this resulting image are then created and XORed to make the image ready for transmission. The performance analysis using histograms and correlation coefficient show that the algorithm has high security, and strong robustness. The algorithm uses a logistic map and XOR gates to achieve a multi-chaos encryption effect.
KeywordsEncryption technique Logistic map Noise Visual cryptography XOR gates
- 1.Count on - Transposition Ciphers, counton.org (2006). http://www.counton.org/explorer/codebreaking/transposition-ciphers.php. Accessed 13 Oct 17
- 6.Zhu, A., Li, L.: Improving for chaotic image encryption algorithm based on logistic map. In: 2010 the 2nd Conference on Environmental Science and Information Application Technology, Wuhan, pp. 211–214 (2010). https://doi.org/10.1109/esiat.2010.5568374
- 9.Saraereh, O.A., Aisafasfeh, Q., Arfoa, A.: Improving a new logistic map as a new chaotic algorithm for image encryption. Mod. Appl. Sci. 7(12) (2013)Google Scholar
- 11.Borwein, J.J., Rose, M.: 19 November 2012. https://theconversation.com/explainer-what-is-chaos-theory-10620
- 12.Shodhganga: a reservoir of Indian theses. http://hdl.handle.net/10603/25696