Home Extended logistic map for encryption of digital images
Article
Licensed
Unlicensed Requires Authentication

Extended logistic map for encryption of digital images

  • Hanis Stanley EMAIL logo and Amutha Ramachandran
Published/Copyright: October 13, 2022

Abstract

A novel extended logistic map has been proposed and tested mathematically for security-based applications. Because the designed extended logistic map behaves chaotically across a wide range of logistic control parameters, it is extremely difficult to predict using even the most exhaustive search methods. The map overcomes a significant drawback of simple logistic mapping, which is commonly used in encryption algorithms. The chaotic map designed was also used as a key to shuffle the pixel position of the image for the image shuffling algorithm developed. The algorithm developed produced excellent results and is adequate for providing an encrypted image in resource-constrained systems. Performance results show that this map is highly chaotic and provides high security when applied in image encryption systems.

2010 Mathematics Subject Classification: 93C10; 68P25

Corresponding author: Hanis Stanley, Electronics and Communication Engineering Department, Sri Sivasubramaniya Nadar College of Engineering, Kalavakkam, Chennai, India, E-mail:

  1. Author contribution: All the authors have accepted responsibility for the entire content of this submitted manuscript and approved submission.

  2. Research funding: None declared.

  3. Conflict of interest statement: The authors declare no conflicts of interest regarding this article.

References

[1] L. Kocarev and S. Lian, Chaos-based Cryptography: Theory, Algorithms and Applications, Berlin, Heidelberg, Springer-Verlag, 2011.10.1007/978-3-642-20542-2Search in Google Scholar

[2] T. G. Gao and Z. Q. Chen, “Image encryption based on a new total shuffling algorithm,” Chaos, Solit. Fractals, vol. 38, pp. 213–220, 2008, https://doi.org/10.1016/j.chaos.2006.11.009.Search in Google Scholar

[3] Z. Y. Fang and W. Q. Tong, “Image scrambling algorithm based on chaos mapping,” Mod. Comput., vol. 10, pp. 51–53, 2007.Search in Google Scholar

[4] M. S. Baptista, “Cryptography with chaos,” Phys. Lett., vol. 240, pp. 50–54, 1999, https://doi.org/10.1016/s0375-9601(98)00086-3.Search in Google Scholar

[5] T. Gao and Z. Chen, “A new image encryption algorithm based on hyper-chaos,” Phys. Lett. A., vol. 372, pp. 394–400, 2008, https://doi.org/10.1016/j.physleta.2007.07.040.Search in Google Scholar

[6] D. Chakraborty, C. Mancillas-L Pez, and P. Sarkar, “STES: a stream cipher based low cost scheme for securing stored data,” IEEE Trans. Comput., vol. 64, no. 9, pp. 2691–2707, 2015, https://doi.org/10.1109/tc.2014.2366739.Search in Google Scholar

[7] X.-Y. Wang and Z.-M. Li, “A stream/block combination image encryption algorithm using logistic matrix to scramble,” Int. J. Nonlinear Sci. Numer. Stimul., vol. 20, pp. 167–177, 2019, https://doi.org/10.1515/ijnsns-2018-0027.Search in Google Scholar

[8] Y. Wang, K.-W . Wong, and X. Liao, “A new chaos-based fast image encryption algorithm,” Appl. Soft Comput., vol. 11, pp. 514–522, 2011, https://doi.org/10.1016/j.asoc.2009.12.011.Search in Google Scholar

[9] N. K. Pareek, V. Patidar, and K. K. Sud, “Image encryption using chaotic logistic map,” Image Vis Comput., vol. 24, pp. 926–934, 2006, https://doi.org/10.1016/j.imavis.2006.02.021.Search in Google Scholar

[10] V. Patidar, N. K. Pareek, and K. K. Sud, “A new substitution-diffusion based image cipher using chaotic standard and logistic maps,” Commun. Nonlinear Sci. Numer. Simulat., vol. 14, pp. 3056–3075, 2009, https://doi.org/10.1016/j.cnsns.2008.11.005.Search in Google Scholar

[11] L. Sui, K. Duan, and J. Liang, “Double-image encryption based on discrete multiple-parameter fractional angular transform and two-coupled logistic maps,” Opt Commun., vol. 343, pp. 140–149, 2015, https://doi.org/10.1016/j.optcom.2015.01.021.Search in Google Scholar

[12] G. Alvarez, F. Montoya, M. Romera, and Q. Zhang, “Cryptanalysis of a discrete chaotic cryptosystem using external key,” Phy. Lett. A., vol. 319, pp. 334–339, 2003, https://doi.org/10.1016/j.physleta.2003.10.044.Search in Google Scholar

[13] B. Wang, X. Wei, and Q. Zhang, “Cryptanalysis of an image cryptosystem based on logistic map,” Optik, vol. 124, pp. 1773–1776, 2013, https://doi.org/10.1016/j.ijleo.2012.06.020.Search in Google Scholar

[14] D. Arroyo, C. Li, S. Li, and G. Alwarez, “Cryptanalysis of a computer cryptography scheme based on a filter bank,” Chaos, Solit. Fractals, vol. 41, pp. 410–413, 2009, https://doi.org/10.1016/j.chaos.2008.01.020.Search in Google Scholar

[15] C. Cruz-Hernández, R. M. López-Gutiérrez, A. Y. Aguilar-Bustos, and C. Posadas-Castillo, “Communicating encrypted information based on synchronized hyperchaotic maps,” Int. J. Nonlinear Sci. Numer. Stimul., vol. 11, pp. 337–349, 2010, https://doi.org/10.1515/ijnsns.2010.11.5.337.Search in Google Scholar

[16] Z. Hua, Y. Zhang, and Y. Zhou, “Two-dimensional modular chaotification system for improving chaos complexity,” IEEE Trans. Signal Process., vol. 68, pp. 1937–1949, 2020, https://doi.org/10.1109/tsp.2020.2979596.Search in Google Scholar

[17] Z. Hua, K. Zhang, Y. Li, and Y. Zhou, “Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing,” Signal Process., vol. 183, p. 107998, 2021, https://doi.org/10.1016/j.sigpro.2021.107998.Search in Google Scholar

[18] Z. Hua, Z. Zhu, S. Yi, Z. Zhang, and H. Huang, “Cross-plane colour image encryption using a two-dimensional logistic tent modular map,” Inf. Sci., vol. 546, pp. 1063–1083, 2021, https://doi.org/10.1016/j.ins.2020.09.032.Search in Google Scholar

[19] Z. Hua and Y. Zhou, “Image encryption using 2D Logistic-adjusted-Sine map,” Inf. Sci., vol. 339, pp. 237–253, 2016, https://doi.org/10.1016/j.ins.2016.01.017.Search in Google Scholar

[20] R. L. Devaney, An Introduction to Chaotic Dynamical System, Colorado, Westview, 2003.Search in Google Scholar

[21] Z. G. Ozdemier, “Schwarzian derivative as a proof of the chaotic behavior,” Pramana - J. Phys., vol. 77, pp. 1159–1169, 2011.10.1007/s12043-011-0205-1Search in Google Scholar

[22] S. Picus, “Approximate entropy (ApEn) as a complexity measure,” Chaos, vol. 5, pp. 110–117, 1995, https://doi.org/10.1063/1.166092.Search in Google Scholar PubMed

[23] G. Ye, “Image scrambling encryption algorithm of pixel bit based on chaos map,” Pattern Recogn. Lett., vol. 31, pp. 347–354, 2010, https://doi.org/10.1016/j.patrec.2009.11.008.Search in Google Scholar

[24] G. Hu and B. Li, “A uniform chaotic system with extended parameter range for image encryption,” Nonlinear Dynam., vol. 103, pp. 2819–2840, 2021, https://doi.org/10.1007/s11071-021-06228-2.Search in Google Scholar

[25] W. Yue, Z. Yicong, S. George, A. Sos, P. N. Joseph, and N. Premkumar, “Local Shannon entropy measure with statistical tests for image randomness,” Inf. Sci., vol. 222, pp. 323–342, 2013, https://doi.org/10.1016/j.ins.2012.07.049.Search in Google Scholar

[26] A. Belazi, S. Kharbech, M. Nazish Aslam, et al.., “Improved Sine-Tangent chaotic map with application in medical images encryption,” J. Inf. Secur. Appl., vol. 66, p. 103131, 2022, https://doi.org/10.1016/j.jisa.2022.103131.Search in Google Scholar

[27] N. Tsafack, A. M. Iliyasu, N. J. De Dieu, et al.., “A memristive RLC oscillator dynamics applied to image encryption,” J. Inf. Secur. Appl., vol. 61, p. 102944, 2021, https://doi.org/10.1016/j.jisa.2021.102944.Search in Google Scholar

Received: 2020-01-03
Revised: 2022-08-13
Accepted: 2022-09-18
Published Online: 2022-10-13
Published in Print: 2022-12-16

© 2022 Walter de Gruyter GmbH, Berlin/Boston

Articles in the same Issue

  1. Frontmatter
  2. Original Research Articles
  3. Coordinated target tracking in sensor networks by maximizing mutual information
  4. Legendre wavelet residual approach for moving boundary problem with variable thermal physical properties
  5. Computational study of intravenous magnetic drug targeting using implanted magnetizable stent
  6. Extended logistic map for encryption of digital images
  7. Valuation of the American put option as a free boundary problem through a high-order difference scheme
  8. Power minimization of gas transmission network in fully transient state using metaheuristic methods
  9. A priori error estimates for finite element approximations to transient convection-diffusion-reaction equations in fluidized beds
  10. Higher order rogue waves for the(3 + 1)-dimensional Jimbo–Miwa equation
  11. Dynamic characteristics of supersonic turbulent free jets from four types of circular nozzles
  12. New insights into singularity analysis
  13. Chaos and bifurcations in a discretized fractional model of quasi-periodic plasma perturbations
  14. Wavelet collocation methods for solving neutral delay differential equations
  15. Numerical solution of highly non-linear fractional order reaction advection diffusion equation using the cubic B-spline collocation method
  16. Solving nonlinear third-order boundary value problems based-on boundary shape functions
  17. Positive radial solutions for Dirichlet problems involving the mean curvature operator in Minkowski space
  18. Effect of outlet impeller diameter on performance prediction of centrifugal pump under single-phase and cavitation flow conditions
  19. A fractional-order ship power system: chaos and its dynamical properties
  20. Graphical structure of extended b-metric spaces: an application to the transverse oscillations of a homogeneous bar
  21. Hypergeometric fractional derivatives formula of shifted Chebyshev polynomials: tau algorithm for a type of fractional delay differential equations
  22. Modelling and numerical synchronization of chaotic system with fractional-order operator
Downloaded on 18.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/ijnsns-2022-0028/html?lang=en
Scroll to top button