Reference Hub4
Image Encryption Method Using Dependable Multiple Chaotic Logistic Functions

Image Encryption Method Using Dependable Multiple Chaotic Logistic Functions

Ranu Gupta, Rahul Pachauri, Ashutosh K. Singh
Copyright: © 2019 |Volume: 13 |Issue: 4 |Pages: 15
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781522564638|DOI: 10.4018/IJISP.2019100104
Cite Article Cite Article

MLA

Gupta, Ranu, et al. "Image Encryption Method Using Dependable Multiple Chaotic Logistic Functions." IJISP vol.13, no.4 2019: pp.53-67. http://doi.org/10.4018/IJISP.2019100104

APA

Gupta, R., Pachauri, R., & Singh, A. K. (2019). Image Encryption Method Using Dependable Multiple Chaotic Logistic Functions. International Journal of Information Security and Privacy (IJISP), 13(4), 53-67. http://doi.org/10.4018/IJISP.2019100104

Chicago

Gupta, Ranu, Rahul Pachauri, and Ashutosh K. Singh. "Image Encryption Method Using Dependable Multiple Chaotic Logistic Functions," International Journal of Information Security and Privacy (IJISP) 13, no.4: 53-67. http://doi.org/10.4018/IJISP.2019100104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article explores an efficient way of image encryption using chaotic logistic function. A set of two chaotic logistic functions and a 256 bit long external secret key are employed to enhance the security in the encrypted images. The initial condition of first logistic function has been obtained by providing the suitable weights to all bits of the secret key. The initial condition of second logistic function has been derived from first chaotic logistic function. In this proposed algorithm, ten different operations are used to encrypt the pixel of an image. The outcome of the second logistic map decides the operation to be used in the encryption of the particular image pixel. Various statistical parameter comparisons show that the proposed algorithm provides an image encryption method with better security and efficiency for all real-time applications.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.