Research on digital image encryption algorithm based on double logistic chaotic map

被引:52
作者
Pan, Hailan [1 ,2 ,3 ]
Lei, Yongmei [1 ]
Jian, Chen [2 ,3 ]
机构
[1] Shanghai Univ, Sch Comp Engn & Sci, 99 Shangda Rd, Shanghai, Peoples R China
[2] Shanghai Polytech Univ, Res Ctr Resource Recycling Sci & Engn, 2360 Jinhai Rd, Shanghai, Peoples R China
[3] Shanghai Polytech Univ, Sch Econ & Management, 2360 Jinhai Rd, Shanghai, Peoples R China
关键词
Chaos technology; Logistic mapping; Digital image; Encryption;
D O I
10.1186/s13640-018-0386-3
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the development of information technology, image information has become the main content of network information transmission. With the development of image encryption technology, it is also about the development of image information theft technology. In order to cope with the evolving information theft technology, we must seek a better image encryption algorithm. Among many algorithms, due to the superiority of chaos technology, when the image is encrypted with chaos technology, the ciphertext presents a randomness, which makes the possibility of deciphering greatly reduced. Therefore, the research of digital image encryption algorithm based on chaos technology has become an important means of modern digital image encryption. In this paper, the digital image encryption technology is studied with the dual logistic chaotic map as a tool. The simulation experiments are carried out by using the classical Lena image and the life picture, and the results are analyzed from the histogram, pixel correlation, information entropy, key space size, key sensitivity, and so on. The results show that the method used in this paper has a better security effect.
引用
收藏
页数:10
相关论文
共 27 条
[1]   A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices [J].
Ahmad, Jawad ;
Khan, Muazzam A. ;
Hwang, Seong Oun ;
Khan, Jan Sher .
NEURAL COMPUTING & APPLICATIONS, 2017, 28 :S953-S967
[2]  
[Anonymous], 2010, IJ NETWORK SECURITY
[3]  
Cai Z, 2017, COM MEA CON, V25, P241
[4]  
Caulfield T., 2016, INT C FIN CRYP DAT S, P271
[5]   An image encryption scheme based on three-dimensional Brownian motion and chaotic system [J].
Chai, Xiu-Li ;
Gan, Zhi-Hua ;
Yuan, Ke ;
Lu, Yang ;
Chen, Yi-Ran .
CHINESE PHYSICS B, 2017, 26 (02)
[6]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[7]  
Chisanga E., 2017, 1 AFR WEEK C, P1
[8]   An Improved Secure Image Encryption Algorithm Based on Rubik's Cube Principle and Digital Chaotic Cipher [J].
Diaconu, Adrian-Viorel ;
Loukhaoukha, Khaled .
MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
[9]   Symmetric ciphers based on two-dimensional chaotic maps [J].
Fridrich, J .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06) :1259-1284
[10]  
Habutsu T, 1991, WORKSH ADV CRYPT EUR, V13, P1