Advertisement

Comparative Analysis of Color Image Encryption Using 2D Chaotic Maps

  • Shubhendu Kumar
  • Bhavna Sinha
  • Chittaranjan Pradhan
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 340)

Abstract

Digital image encryption can be done either by using the cryptography techniques or chaotic maps. Here, we have given focus to the chaotic maps due to the simplicity as compared to the cryptography techniques. In this paper, we have presented the color image encryption using different 2D chaotic maps, such as 2D Logistic map, Henon map, Baker nap, Arnold cat map and Cross chaos map. The efficiency of these image encryption techniques is verified by the differential attack. NPCR (number of pixels change rate) and UACI (unified average changing intensity) have been chosen as the evaluation parameters.

Keywords

2D logistic map Henon map Baker map Arnold cat map Cross chaos map Encryption Choatic maps 

References

  1. 1.
    Pisarchik, A.N., Zanin, M.: Chaotic map cryptography and security, encryption: methods, software and security, vol. 4. Nova Science Publishers, New York, pp. 1–28 (2010)Google Scholar
  2. 2.
    Sethi, N., Sharma, D.: A novel method of image encryption using logistic mapping. Int. J. Comput. Sci. Eng. 1(2), 115–119 (2012)Google Scholar
  3. 3.
    Cheng, J., Guo, J.: A new chaotic key-based design for image encryption and decryption. In: International Symposium on Circuits and Systems, vol. 4, pp. 49–52. IEEE (2000)Google Scholar
  4. 4.
    Abuhaibal, I.S.I., Abuthraya, H.M., Hubboub, H.B., Salamah, R.A.: Image encryption using chaotic map and block chaining. Int. J. Comput. Netw. Inf. Secur. 7, 19–26 (2012)Google Scholar
  5. 5.
    Jolfaei, A., Mirghadri, A.: An image encryption approach using chaos and stream cipher. J. Theor. Appl. Inf. Technol., 117–125 (2010)Google Scholar
  6. 6.
    Yadava, R.K., Singh, B.K., Sinha, S.K., Pandey, K.K.: A new approach of colour image encryption based on Henon like chaotic map. J. Inf. Eng. Appl. 3(6), 14–20 (2013)Google Scholar
  7. 7.
    Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurication Chaos 8(6), 1259–1284 (1998)MathSciNetCrossRefMATHGoogle Scholar
  8. 8.
    Peterson, G.: Arnold’s cat map, Math 45. Linear Algebra, pp. 1–7 (1997)Google Scholar
  9. 9.
    Ahmad, M., Alam, M.S.: A new algorithm of encryption and decryption of images using chaotic mapping. Int. J. Comput. Sci. Eng. 2(1), 46–50 (2009)Google Scholar
  10. 10.
    Pradhan, C., Rath, S., Bisoi, A.K.: Non blind digital watermarking technique using DWT and cross chaos. In: International Conference on Communication, Computing and Security, vol. 6, pp. 897–904. Procedia Technology, Elsevier, Amsterdam (2012)Google Scholar
  11. 11.
    Pradhan, C., Bisoi, A.K.: Robust watermarking using chaotic variations of AES in DWT domain. In: International Conference on Computational Intelligence and Information Technology, pp. 445–451. IET (2013) Google Scholar
  12. 12.
    Jiansheng, M., Sukang, L., Xiaomei, T.: A digital watermarking algorithm based on DCT and DWT. In: International Symposium on Web Information Systems and Applications, pp. 104–109 (2009)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  • Shubhendu Kumar
    • 1
  • Bhavna Sinha
    • 1
  • Chittaranjan Pradhan
    • 1
  1. 1.KIIT UniversityBhubaneswarIndia

Personalised recommendations