Image encryption and decryption using combined key sequence of Logistic map and Lozi map

In this paper image encryption and decryption using combined key sequence of Logistic map and Lozi map is proposed. Initially discrete key sequence {K<sub>1i</sub>}={K<sub>11</sub>, K<sub>12</sub>, K<sub>13</sub>... K<sub>1n</sub>} where `n' is size of the image and K<sub>1i</sub> €{0, 255} is generated using Logistic function. Then Lozi map is used to generate a discrete key sequence {K<sub>2i</sub>}={K<sub>21</sub>, K<sub>22</sub>, K<sub>23</sub>... K<sub>2n</sub>} K<sub>2i</sub> €{0, 255}. Both the Key sequences are combined using XOR function to obtain single key sequence {K<sub>i</sub>}. The obtained Key sequence {K<sub>i</sub>} is used to encrypt the image. To study the performance of the proposed scheme a set of five different gray scale medical images are chosen. Also proposed scheme is compared with encryption scheme using key sequences generated by (i) Logistic map{K<sub>1i</sub>} alone (ii) Lozi map {K<sub>1i</sub>} alone. Security analysis of the scheme is analyzed using parameters such as (i) Visual analysis (ii) Histogram (iii) Correlation (iv) Entropy (v) Mean Square Error (MSE). Result shows that proposed scheme is immune to statistical attacks. Also the performances of the proposed scheme for all the five image cases are fairly same and scheme is independent of image chosen.

[1]  Xin Wang,et al.  Medical image encryption based on a composition of Logistic Maps and Chebyshev Maps , 2012, 2012 IEEE International Conference on Information and Automation.

[3]  Mrinal Kanti Mandal,et al.  An Image Encryption Process based on Chaotic Logistic Map , 2012 .

[4]  J.A. Hernandez,et al.  Chaos Theory Applied to Communications -- Part I: Chaos Generators , 2007, Electronics, Robotics and Automotive Mechanics Conference (CERMA 2007).

[5]  Yueh-Min Huang,et al.  Image encryption algorithm based on chaotic maps , 2010, 2010 International Computer Symposium (ICS2010).

[6]  E. Lorenz Deterministic nonperiodic flow , 1963 .

[7]  R. Lozi UN ATTRACTEUR ÉTRANGE (?) DU TYPE ATTRACTEUR DE HÉNON , 1978 .

[8]  Lian Li,et al.  An improved BMP image encryption algorithm based on logistic map , 2010, 2010 International Conference on Computer and Communication Technologies in Agriculture Engineering.

[9]  Yu Honglei,et al.  The Compounded Chaotic Sequence Research in Image Encryption Algorithm , 2009, 2009 WRI Global Congress on Intelligent Systems.

[10]  Wang Kejun,et al.  Logistic-map chaotic spread spectrum sequences under linear transformation , 2000, Proceedings of the 3rd World Congress on Intelligent Control and Automation (Cat. No.00EX393).

[11]  Chuanmu Li,et al.  A novel color image encryption approach based on multi-chaotic system , 2008, 2008 2nd International Conference on Anti-counterfeiting, Security and Identification.

[12]  Yicong Zhou,et al.  Image encryption using a new parametric switching chaotic system , 2013, Signal Process..

[13]  N. Sethi,et al.  Comparative Image Encryption Method Analysis Using New Transformed - Mapped Technique , 2013 .

[14]  Behrouz A. Forouzan,et al.  Cryptography and network security , 1998 .

[15]  S. Rohith,et al.  Image encryption and decryption using chaotic key sequence generated by sequence of logistic map and sequence of states of Linear Feedback Shift Register , 2014, 2014 International Conference on Advances in Electronics Computers and Communications.

[16]  R. Eberhart Chaos theory for the biomedical engineer , 1989, IEEE Engineering in Medicine and Biology Magazine.