Authors: Prabir Kr. Naskar; Atal Chaudhuri
Addresses: Department of Computer Science and Engineering, MCKV Institute of Engineering, Liluah, Howrah-711204, West Bengal, India ' Department of Computer Science and Engineering, Jadavpur University, Jadavpur, Kolkata-700032, West Bengal, India
Abstract: This paper presents a secure image encryption technique based on logistic chaotic map. Basically, two-chaotic maps are used in this scheme, one chaotic map is used to cipher secret bytes and another chaotic map is used to shuffle the ciphered bytes. A set of three keys (K0, K1, K2) is used for encryption and decryption phase, where K0 and K1 are two IEEE double precision floating point numbers used as the initial values of two chaotic functions and K2 is a two byte random number, which is used to interchange the two-chaotic values at every K2 th iteration. This scheme is highly sensitive to the secret key and the size remains unchanged after encryption. This paper also presents security analysis like key space analysis, statistical analysis, and differential attack analysis to prove the strength of the algorithm against cryptanalysis.
Keywords: symmetric encryption; logistic chaotic map; total shuffling; key sensitivity analysis; statistical analysis; image encryption; cryptography; dual chaotic map; security analysis; key space analysis; differential attack analysis; cryptanalysis.
International Journal of Electronic Security and Digital Forensics, 2015 Vol.7 No.4, pp.358 - 380
Received: 18 Sep 2014
Accepted: 16 May 2015
Published online: 02 Oct 2015 *