A NOVEL APPROACH IMAGE ENCRYPTION BASED ON LOGISTIC MAP

Ch.Seetha Devi, Dr. M. Babu Rao

Abstract


The paper present s a novel approach image encryption based on logistic map. Present days, multimedia messages are exchanged based on internet. Security threats are drastically increasing over the internet. So, security messages are handling by different cryptographic methods in digital image processing. In the paper, proposed method follows 4 steps. Firstly, apply logistic map to the original image and cover image. The original image pixel values are subtract with the summation of corresponding pixel values of the resultant of original and cover image pixel values. The attackers are difficult to decrypt the original image  from encode image because of  the exact parameter pixels used for the logistic maps to get the original image, which is difficult to guess the parameters. The proposed method has analysis the results and different measurement analysis as shown in experimental section.


Keywords


Cryptographic; Chaotic Map; Logistic Map;

References


. D. Van De Ville., W. Philips., R. Van de Walle.,I. Lemahieu., : Image scrambling without bandwidth expansion. IEEE Transactions Circuits and Systems for Video Technology, vol. 14, pp. 892-897, (2004)

. M. Yang., N. Bourbakis., L. Shujun. : Data-image-video encryption. Potentials, IEEE, vol. 23, pp. 28-34, (2004)

. Yi, C. H. Tan., C. K. Siew., R. Syed.,: Fast encryption for multimedia. IEEE Transactions on Consumer Electronics, vol. 47, no. 1, pp. 101–107 (2001)

. J. Kuo., M. S. Chen.,: A new signal encryption technique and its attack study. in Proc. IEEE International Carnahan Conference On Security Technology, pp. 149–153, Taipei, Taiwan (1991)

. M. Macq .,J.-J. Quisquater., : Cryptology for digital TV broadcasting. Proceedings of the IEEE, vol. 83, no. 6, pp. 944–957 (1995)

. S. Parker., L. O. Chua., :Chaos: a tutorial for engineers. Proceedings of the IEEE, vol. 75, no. 8, pp. 982–1008 (1995)

. W.Wu .,N. F. Rulkov., :Studying chaos via 1-Dmaps—a tutorial. IEEE Trans. on Circuits and Systems I: Fundamental Theory and Applications, vol. 40, no. 10, pp. 707–721 (1993)

Fuchun Guo, Willy Susilo: Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 11, NO. 2, FEBRUARY 2016


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.