Abstract
The dynamic properties of chaos based algorithm such as large key space, high sensitivity to initial conditions/system parameters, erratic behavior, ergodicity and simplicity make it a novel and an efficient way of evolving chaotic maps that can meet the security requirements. They also exhibit broad array of chaotic regime over a range that can be further enhanced by modifying these maps. In this paper, Henon chaotic map is modified and dynamic behavior of this map is being analyzed through Bifurcation diagram and Lyapunov exponent. The simulation results illustrate that the map has a chaotic regime over an extensive range of system parameters. One of the cryptographic applications of this map in image encryption for different test images is considered. Further, the encryption capability of the algorithm is verified through security analysis.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Sam, I.S., Devaraj, P., Bhuvaneswaran, R.S.: A novel image cipher based on mixed transformed logistic maps. Multimedia Tools Appl. 56(2), 315–330 (2012). doi:10.1007/s11042-010-0652-6
Xu, L., Li, Z., Li, J., Hua, W.: A novel bit-level image encryption algorithm based on chaotic maps. Optics Lasers Eng. 78, 17–25 (2016). doi:10.1016/j.optlaseng.2015.09.007
Yaghoobi, M.: A new approach for image encryption using chaotic logistic map. In: IEEE International Conference on Advanced Computer Theory and Engineering, pp. 585–590 (2008). doi:10.1109/ICACTE.2008.177
El-Latif, A.A.A., Li, L., Zhang, T., Wang, N., Song, X., Niu, X.: Digital image encryption scheme based on multiple chaotic systems. Int. J. Sens. Imaging 13(2), 67–88 (2012). doi:10.1007/s11220-012-0071-z
Kocarev, L.: Chaos-based cryptography: a brief overview. IEEE Circuits Syst. Mag. 1(3), 6–21 (2001). doi:10.1109/7384.963463
Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24(9), 926–934 (2006). doi:10.1016/j.imavis.2006.02.021
Sun, F., Liu, S., Li, Z., Lu, Z.: A novel image encryption scheme based on spatial chaos map. Chaos, Solitons Fractals 38(3), 631–640 (2008). doi:10.1016/j.chaos.2008.01.028
Henon, M.: A two-dimensional mapping with a strange attractor. Commun. Math. Phys. 50(1), 69–77 (1976). doi:10.1007/BF01608556
Soleymani, A., Nordin, M.J., Sundararajan, E.: A chaotic cryptosystem for images based on Henon and Arnold cat map. Sci. World J. (2014). doi:10.1155/2014/536930
Bakhache, B., Ghazal, J.M., El Assad, S.: Improvement of the security of zigbee by a new chaotic algorithm. IEEE Syst. J. 8(4), 1024–1033 (2014). doi:10.1109/JSYST.2013.2246011
Mandal, M.K., Banik, G.D., Chattopadhyay, D., Nandi, D.: An image encryption process based on chaotic logistic map. IETE Tech. Rev. 29(5), 395–404 (2012). doi:10.4103/0256-4602.103173
Huang, C.K., Liao, C.W., Hsu, S.L., Jeng, Y.C.: Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommun. Syst. 52(2), 563–571 (2013). doi:10.1007/s11235-011-9461-0
Huang, X.: Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn. 67(4), 2411–2417 (2012). doi:10.1007/s11071-011-0155-7
Ye, G., Wong, K.W.: An efficient chaotic image encryption algorithm based on a generalized Arnold map. Nonlinear Dyn. 69(4), 2079–2087 (2012). doi:10.1007/s11071-012-0409-z
Alligood, K.T., Sauer, T.D., Yorke, J.A.: Chaos: An Introduction to Dynamic systems. Textbooks in Mathematical Sciences. Springer, NewYork (1997)
Zhu, C.: A novel image encryption scheme based on improved hyperchaotic sequences. Optics Commun. 285(1), 29–37 (2012). doi:10.1016/j.optcom.2011.08.079
Wang, Z., Bovik, A.C.: A universal image quality index. IEEE Sign. Proces. Lett. 9(3), 81–84 (2002). doi:10.1109/97.995823
Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Proces. 13(4), 600–612 (2004). doi:10.1109/TIP.2003.819861
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Sheela, S.J., Suresh, K.V., Tandur, D. (2016). Performance Evaluation of Modified Henon Map in Image Encryption. In: Ray, I., Gaur, M., Conti, M., Sanghi, D., Kamakoti, V. (eds) Information Systems Security. ICISS 2016. Lecture Notes in Computer Science(), vol 10063. Springer, Cham. https://doi.org/10.1007/978-3-319-49806-5_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-49806-5_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49805-8
Online ISBN: 978-3-319-49806-5
eBook Packages: Computer ScienceComputer Science (R0)