A Color Image Encryption Technique Based on Bit-Level Permutation and Alternate Logistic Maps

被引:28
作者
Bisht, Ankita [2 ]
Dua, Mohit [1 ]
Dua, Shelza [3 ]
Jaroli, Priyanka [2 ]
机构
[1] NIT Kurukshetra, Dept Comp Engn, Kurukshetra, Haryana, India
[2] Banasthali Vidyapith Banasthali, Dept Comp Sci, Newai, India
[3] NIT Kurukshetra, Dept Elect & Commun Engn, Kurukshetra, Haryana, India
关键词
ACM; LSM; LTM; TSM; Lorenz system; alternate logistic map; CHAOTIC STANDARD; ALGORITHM; SCHEME; IMPLEMENTATION; STEGANOGRAPHY; DESIGN;
D O I
10.1515/jisys-2018-0365
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper presents an approach to encrypt the color images using bit-level permutation and alternate logistic map. The proposed method initially segregates the color image into red, green, and blue channels, transposes the segregated channels from the pixel-plane to bit-plane, and scrambles the bit-plane matrix using Arnold cat map (ACM). Finally, the red, blue, and green channels of the scrambled image are confused and diffused by applying alternate logistic map that uses a four-dimensional Lorenz system to generate a pseudorandom number sequence for the three channels. The parameters of ACM are generated with the help of Logistic-Sine map and Logistic-Tent map. The intensity values of scrambled pixels are altered by Tent-Sine map. One-dimensional and two-dimensional logistic maps are used for alternate logistic map implementation. The performance and security parameters histogram, correlation distribution, correlation coefficient, entropy, number of pixel change rate, and unified averaged changed intensity are computed to show the potential of the proposed encryption technique.
引用
收藏
页码:1246 / 1260
页数:15
相关论文
共 49 条
[1]   A new four-scroll chaotic attractor and its engineering applications [J].
Akgul, Akif ;
Moroz, Irene ;
Pehlivan, Ihsan ;
Vaidyanathan, Sundarapandian .
OPTIK, 2016, 127 (13) :5491-5499
[2]   Chaos-based engineering applications with a 3D chaotic system without equilibrium points [J].
Akgul, Akif ;
Calgan, Haris ;
Koyuncu, Ismail ;
Pehlivan, Ihsan ;
Istanbullu, Ayhan .
NONLINEAR DYNAMICS, 2016, 84 (02) :481-495
[3]   A resource-efficient encryption algorithm for multimedia big data [J].
Aljawarneh, Shadi ;
Yassein, Muneer Bani ;
Talafha, We'am Adel .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (21) :22703-22724
[4]  
[Anonymous], 2013, INT J SIGNAL PROCESS
[5]  
Bishaev A. M., 2018, J AMB INTEL HUM COMP, P1
[6]   An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps [J].
Chen, Guo ;
Chen, Yong ;
Liao, Xiaofeng .
CHAOS SOLITONS & FRACTALS, 2007, 31 (03) :571-579
[7]   A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism [J].
Chen, Jun-xin ;
Zhu, Zhi-liang ;
Fu, Chong ;
Yu, Hai ;
Zhang, Li-bo .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2015, 20 (03) :846-860
[8]  
Diaconu AV, 2016, INT CONF COMM, P411, DOI 10.1109/ICComm.2016.7528310
[9]   Circular inter-intra pixels bit-level permutation and chaos-based image encryption [J].
Diaconu, Adrian-Viorel .
INFORMATION SCIENCES, 2016, 355 :314-327
[10]   A novel chaos-based bit-level permutation scheme for digital image encryption [J].
Fu, Chong ;
Lin, Bin-bin ;
Miao, Yu-sheng ;
Liu, Xiao ;
Chen, Jun-jie .
OPTICS COMMUNICATIONS, 2011, 284 (23) :5415-5423