An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps

被引:55
作者
Askar, Sameh S. [1 ,2 ]
Karawia, Abdel A. [2 ,3 ]
Al-Khedhairi, Abdulrahman [1 ]
Al-Ammar, Fatemah S. [1 ]
机构
[1] King Saud Univ, Coll Sci, Dept Stat & Operat Res, POB 2455, Riyadh 11451, Saudi Arabia
[2] Mansoura Univ, Dept Math, Fac Sci, Mansoura 35516, Egypt
[3] Qassim Univ, Deanship Educ Serv, Comp Sci Unit, POB 6595, Buraydah 51452, Saudi Arabia
关键词
logistic map; chaotic economic map; image encryption; image decryption; security analysis; 68P25; 68U10; 94A60;
D O I
10.3390/e21010044
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In the literature, there are many image encryption algorithms that have been constructed based on different chaotic maps. However, those algorithms do well in the cryptographic process, but still, some developments need to be made in order to enhance the security level supported by them. This paper introduces a new cryptographic algorithm that depends on a logistic and two-dimensional chaotic economic map. The robustness of the introduced algorithm is shown by implementing it on several types of images. The implementation of the algorithm and its security are partially analyzed using some statistical analyses such as sensitivity to the key space, pixels correlation, the entropy process, and contrast analysis. The results given in this paper and the comparisons performed have led us to decide that the introduced algorithm is characterized by a large space of key security, sensitivity to the secret key, few coefficients of correlation, a high contrast, and accepted information of entropy. In addition, the results obtained in experiments show that our proposed algorithm resists statistical, differential, brute-force, and noise attacks.
引用
收藏
页数:17
相关论文
共 32 条
[1]  
[Anonymous], 2010, INT COMPUT THEORY EN
[2]   Image Encryption Algorithm Based on Chaotic Economic Model [J].
Askar, S. S. ;
Karawia, A. A. ;
Alshamrani, Ahmad .
MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
[3]   Complex dynamic properties of Cournot duopoly games with convex and log-concave demand function [J].
Askar, S. S. .
OPERATIONS RESEARCH LETTERS, 2014, 42 (01) :85-90
[4]   Cryptographic algorithm based on pixel shuffling and dynamical chaotic economic map [J].
Askar, Sameh S. ;
Karawia, Abdelrahman A. ;
Alammar, Fatmah S. .
IET IMAGE PROCESSING, 2018, 12 (01) :158-167
[5]   An Image Encryption Scheme Based on High Dimension Chaos System [J].
Cao, Ying-yu ;
Fu, Chong .
International Conference on Intelligent Computation Technology and Automation, Vol 2, Proceedings, 2008, :104-108
[6]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[7]   A new chaotic algorithm for video encryption [J].
Chiaraluce, F ;
Ciccarelli, L ;
Gambi, E ;
Pierleoni, P ;
Reginelli, M .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2002, 48 (04) :838-844
[8]   A New Method of Information Encryption [J].
E, Xu ;
Shao, Liangshan ;
Cao, Guanghui ;
Ren, Yongchang ;
Qu, Tao .
2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, :583-+
[9]   ON THE CHAOTIC BEHAVIOR OF FORCED FLUIDIZED-BED CATALYTIC REACTORS [J].
ELNASHAIE, SSEH ;
ABASHAR, ME .
CHAOS SOLITONS & FRACTALS, 1995, 5 (05) :797-831
[10]  
Hanchinamani G., 2014, International Journal of Hospitality Information Technology, V7, P185, DOI [10.14257/ijhit.2014.7.4.16, DOI 10.14257/IJHIT.2014.7.4.16]