Abstract
This paper demonstrates an image encryption technique using a hybrid method. This method consists of two stages. The image is XORed with the Pseudo-Random Number Generator (PRNG) in the first stage. The confusion and diffusion processes are applied by using the Logistic map and its’ three modifications in the second stage. The original Logistic map has a small range of key-space. The three modifications of Logistic map increased key-space range due to expanding the range of the original Logistic map parameter. Multiple tests have been performed on the hybrid method such as security analysis and encryption quality. The hybrid method presented a good evaluation.
Similar content being viewed by others
References
Chen JX, Zhu ZL, Fu C, Yu H (2015) A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Commun Nonlinear Sci Numer Simul 20:846–860
Elabady NF, Abdalkader HM, Moussa MI, Sabbeh SF (2015) Image encryption based on new one-dimensional chaotic map. ICET, 2nd International Conference on Engineering and Technology, pp 851–892
Elkamchouchi H, Makar M (2005) Measuring encryption quality for bitmap images encrypted with rijndael and kamkar block ciphers. In: Radio Science Conference, Proceedings of the Twenty-Second National. IEEE, NRSC, pp 277–284
Farajallah M, El Assad S, Deforges O (2016) Fast and secure chaos-based cryptosystem for images. International Journal of Bifur and Chaos 26(02):1650021.1–1650021.21
Gokavarapu S, Kumari SV (2015) A novel encryption using one-dimensional chaotic maps. 49th Annual Convention of the Computer Society of India (CSI) Volume 1. Advances in Intelligent Systems and Computing, vol 337. Springer
Gray R (2010) Entropy and information theory. Springer Verlag
Haliuk S, Krulikovskyi O, Politanskyi L (2016) Analysis of pixels permutations based on discretized Chirikov map. 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), Lviv, pp 519–521
Hua Z, Zhou Y, Pun C-M, Philip Chen CL (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80–94. Elsevier
Kamali S, Shakerian R, Hedayati M, Rahmani M (2010) A new modified version of advanced encryption standard based algorithm for image encryption. In: Electronics and Information Engineering (ICEIE), International Conference On, vol. 1. IEEE, pp V1–141
Kocarev L, Lian S (2011) Chaos-based cryptography. Springer
Kwok HS, Tang WKS (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons Fractals 32(4):1518–1529
Liu L, Miao S (2016) A new image encryption algorithm based on logistic chaotic map with varying parameter. SpringerPlus 5:289
Martin M, Plastino A, Rosso O (2006) Generalized statistical complexity measures: geometrical and analytical properties. Physica A: Statistical Mechanics and its Applications 369(2):439–462
Mersenne twister. http://en.wikipedia.org/wiki/Mersenne_twister. Accessed 15 Jan 2017
Mukhopadhyay D, Forouzan BA (2011) Cryptography and network security, 2nd edn. Mcgraw Hill Education
Murillo-Escobar, Cruz-Hernández, Abundiz-Pérez, López-Gutiérrez (2016) Implementation of an improved chaotic encryption algorithm for real-time embedded systems by using a 32-bit microcontroller. Microprocess Microsyst 45(Part B):297–309. Elsevier
Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934
Rohith S, Bhat KN, Hari S, Nandini A (2015) Image encryption and decryption using chaotic key sequence generate by sequence of logistic map and sequence of states of linear feedback shift register. International Conference on Advances in Electronic, Computers and Communications, vol 6, pp 1124–1130
Shu-Jiang X, Ying-Long W, Ji-Zhi W, Min T (2008) A novel image encryption scheme based on chaotic maps. In: Signal Processing, 9th International Conference on. IEEE. ICSP, pp 1014–1018
Stallings W (2005) Cryptography and Network security principles and practices, Fourth edn. Prentice Hall
Volos CK (2013) Image encryption scheme based on coupled chaotic systems. In: JAMB, vol 3, 1, pp 123–149
Wang C, Zhang X, Zheng Z (2017) An efficient image encryption algorithm based on a novel chaotic map. Multimedia Tools and Applications 76(22):24251–24280
Xiao D, Liao X, Wei P (2009) Analysis and improvement of a chaos-based image encryption algorithm. Chaos, Solitons Fractals 40(5):2191–2199
Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic S-box. Inf Sci 450:361–377. Elsevier
Zhou Y, Hua Z, Pun C-M, Philip Chen CL (2015) Cascade chaotic system with applications. IEEE Transactions on Cybernetics 45(9):2001–2012
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Hemdan, A.M., Faragallah, O.S., Elshakankiry, O. et al. A fast hybrid image cryptosystem based on random generator and modified logistic map. Multimed Tools Appl 78, 16177–16193 (2019). https://doi.org/10.1007/s11042-018-6948-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6948-7