Chaotic Image Encryption Using Piecewise-Logistic-Sine Map
نویسندگان
چکیده
The classical one-dimension chaotic maps are not adequately secure, and some improved usually have a high time complexity. To address these problems, this paper presents new Piecewise-Logistic-Sine map (PLSM). bifurcation diagrams, Lyapunov exponent, running of the proposed PLSM analyzed, outcomes show that it has better behavior with low Furthermore, diffusion by certain rules is vulnerable to attack, so PLSM-based image encryption scheme random exclusive OR proposed. Using 256-bit secret key, initial value parameters calculated key distribution method. Then four sequences generated PLSM, they used in three rounds diffusion. This can spread small change original all pixels, performance evaluation shows security scheme.
منابع مشابه
Image encryption using chaotic logistic map
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. In this communication,wepropose a newapproach for image encryption basedon chaotic logisticmaps in order tomeet the requirements of the secure image transfer. In the proposed image encryption scheme, an external secret key of 80-bit and two chaotic ...
متن کاملImage encryption using the two-dimensional logistic chaotic map
Chaos maps and chaotic systems have been proved to be useful and effective for cryptography. In this paper, the two-dimensional logistic map with complicated basin structures and attractors are first used for image encryption. The proposed method adopts the classic framework of the permutation-substitution network in cryptography and thus ensures both confusion and diffusion properties for a se...
متن کاملAn Improved Piecewise Linear Chaotic Map Based Image Encryption Algorithm
An image encryption algorithm based on improved piecewise linear chaotic map (MPWLCM) model was proposed. The algorithm uses the MPWLCM to permute and diffuse plain image simultaneously. Due to the sensitivity to initial key values, system parameters, and ergodicity in chaotic system, two pseudorandom sequences are designed and used in the processes of permutation and diffusion. The order of pr...
متن کاملEncryption of Image Using Chaotic Map
The advent of internet has paved the way for transmitting more and more information over the internet in a very less time and multimedia technology is also not untouched with it. Audio, images & other multimedia are being transmitted over the internet. The traditional encryption schemes appear not to be ideal for image applications, due to some intrinsic features of images such as bulk data cap...
متن کاملA New Encryption Method Using Chaotic Logistic Map
Encryption is to rearrange the message into difference form so that the message is keep secret. The goal of encryption is to provide an easy and inexpensive means of encryption and decryption to all authorized users in possession of the appropriate key and difficult and expensive means to estimate the plain text without use of the key Nowadays the Internet becomes popular and encryption technol...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2023
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2023.3257349