intertwining logistic map
Recently Published Documents


TOTAL DOCUMENTS

13
(FIVE YEARS 3)

H-INDEX

6
(FIVE YEARS 0)

Author(s):  
Shelza Dua ◽  
Bharath Nancharla ◽  
Maanak Gupta

The authors propose an image encryption process based on chaos that uses block scrambling to reduce the correlation among the neighboring pixels and random order substitution for slightly changing the value of the pixel. The chaotic sequence for encrypting the image is generated by using two 3D logistic maps called enhanced logistic map and intertwining logistic map; the cos function helps in reducing linearity. The entire encryption process is composed of scrambling, image rotation, and random order substitution. Scrambling is used for permuting the pixels in the image so that we can reduce the correlation among the neighboring pixels, and this is followed by image rotation which can ensure that shuffling of pixels is done to the remaining pixels in the image, and at last the authors use random order substitution where they bring the small change in the pixel value. The proposed method has the capability of encrypting digital colored images into cipher form with high security, which allows only authorized ones who hold the correct secret key to decrypt the images back to original form.


2020 ◽  
Vol 55 ◽  
pp. 102622
Author(s):  
Kamlesh Kumar Raghuvanshi ◽  
Subodh Kumar ◽  
Sunil Kumar

2019 ◽  
Vol 11 (9) ◽  
pp. 3771-3786 ◽  
Author(s):  
Mohit Dua ◽  
Aishwarya Wesanekar ◽  
Vishwas Gupta ◽  
Mayank Bhola ◽  
Shelza Dua

2018 ◽  
Vol 32 (09) ◽  
pp. 1850115 ◽  
Author(s):  
Manjit Kaur ◽  
Vijay Kumar

In this paper, a robust image encryption technique that utilizes Fourier–Mellin moments and intertwining logistic map is proposed. Fourier–Mellin moment-based intertwining logistic map has been designed to overcome the issue of low sensitivity of an input image. Multi-objective Non-Dominated Sorting Genetic Algorithm (NSGA-II) based on Reinforcement Learning (MNSGA-RL) has been used to optimize the required parameters of intertwining logistic map. Fourier–Mellin moments are used to make the secret keys more secure. Thereafter, permutation and diffusion operations are carried out on input image using secret keys. The performance of proposed image encryption technique has been evaluated on five well-known benchmark images and also compared with seven well-known existing encryption techniques. The experimental results reveal that the proposed technique outperforms others in terms of entropy, correlation analysis, a unified average changing intensity and the number of changing pixel rate. The simulation results reveal that the proposed technique provides high level of security and robustness against various types of attacks.


2018 ◽  
Vol 143 ◽  
pp. 804-811 ◽  
Author(s):  
Sunil Kumar ◽  
Manish Kumar ◽  
Rajat Budhiraja ◽  
M.K. Das ◽  
Sanjeev Singh

Sign in / Sign up

Export Citation Format

Share Document