A robust image encryption technique using dual chaotic map
by Prabir Kr. Naskar; Atal Chaudhuri
International Journal of Electronic Security and Digital Forensics (IJESDF), Vol. 7, No. 4, 2015

Abstract: This paper presents a secure image encryption technique based on logistic chaotic map. Basically, two-chaotic maps are used in this scheme, one chaotic map is used to cipher secret bytes and another chaotic map is used to shuffle the ciphered bytes. A set of three keys (K0, K1, K2) is used for encryption and decryption phase, where K0 and K1 are two IEEE double precision floating point numbers used as the initial values of two chaotic functions and K2 is a two byte random number, which is used to interchange the two-chaotic values at every K2 th iteration. This scheme is highly sensitive to the secret key and the size remains unchanged after encryption. This paper also presents security analysis like key space analysis, statistical analysis, and differential attack analysis to prove the strength of the algorithm against cryptanalysis.

Online publication date: Fri, 02-Oct-2015

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Electronic Security and Digital Forensics (IJESDF):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com