CFP last date
20 August 2024
Call for Paper
September Edition
IJCA solicits high quality original research papers for the upcoming September edition of the journal. The last date of research paper submission is 20 August 2024

Submit your paper
Know more
Reseach Article

Article:Improved Image Encryption Algorithm using Chaotic Map

by Joshi Rohit A, Joshi Sumit S, G. P. Bhole
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 32 - Number 9
Year of Publication: 2011
Authors: Joshi Rohit A, Joshi Sumit S, G. P. Bhole
10.5120/3930-5561

Joshi Rohit A, Joshi Sumit S, G. P. Bhole . Article:Improved Image Encryption Algorithm using Chaotic Map. International Journal of Computer Applications. 32, 9 ( October 2011), 6-10. DOI=10.5120/3930-5561

@article{ 10.5120/3930-5561,
author = { Joshi Rohit A, Joshi Sumit S, G. P. Bhole },
title = { Article:Improved Image Encryption Algorithm using Chaotic Map },
journal = { International Journal of Computer Applications },
issue_date = { October 2011 },
volume = { 32 },
number = { 9 },
month = { October },
year = { 2011 },
issn = { 0975-8887 },
pages = { 6-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume32/number9/3930-5561/ },
doi = { 10.5120/3930-5561 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:18:43.505657+05:30
%A Joshi Rohit A
%A Joshi Sumit S
%A G. P. Bhole
%T Article:Improved Image Encryption Algorithm using Chaotic Map
%J International Journal of Computer Applications
%@ 0975-8887
%V 32
%N 9
%P 6-10
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper proposes an improved image encryption scheme over existing scheme. The distinct feature of improved encryption scheme is that it encrypts the image using chaotic maps only without further confusing this encrypted image as illustrated in existing scheme. Further, the advantages over existing scheme are 1) the proposed algorithm is completely retrievable in contrast to the existing algorithm 2) the experimental results of proposed algorithm are better than existing algorithm which governs added security level and 3) lesser computational complexity which governs improved speed performance.

References
  1. Long Min; Huang Lu,”Design and Analysis of a novel Chaotic Image Encryption,”International Conference on Computer Modelling and Simulation( ICCMS’10), vol 1,2010.pp. 517-520.
  2. N. K. Pareek, Vinod Patidar and K. K. Sud, “Image encryption using chaotic logistic map,” Image and Vision Computing, vol. 24, 2006, pp. 926-934.
  3. H.S. Kwok, W. K. S.Tang, “A fast image encryption system based on chaotic maps with finite precision representation,” Chaos, Solitons and Fractals, vol. 32, 2007, pp. 1518–1529.
  4. S. Behnia, A. Akhshani, H. Mahmodi and A. Akhavan, “A novel algorithm for image encryption based on mixture of chaotic maps,” Chaos, Solitons and Fractals, vol. 35, 2008, pp. 408–419.
  5. Di Xiao, Xiaofeng Liao, Pengcheng Wei. Analysis and improvement of a chaos-based image encryption algorithm. Chaos, Solitons, and Fractals, vol.40,pp. 2191-2199, 2009.
  6. Cahit Cokal, Ercan Solak. Cryptanalysis of a chaos-based image encryption algorithm. Physics Letters A, vol. 373,pp. 1357-1360,2009.
  7. Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez, Guanrong Chen. On the security defects of an image encryption scheme. Image and Vision Computing, vol. 27, no.9, pp. 1371-1381, 2009.
  8. Patidar, V.; Purohit, G.; Sud, K.K.; Pareek, N.K., “Image encryption through a novel permutation-substitution scheme based on chaotic standard map,”International Workshop on Chaos Fractals Theories and Applications(IWCTA) 2010,pp. 164 – 169.
  9. Ali Kanso, Nejib Smaoui. Logistic chaotic maps for binary numbers generations. Chaos, Solitons and Fractals,vol.40, pp.2557-2568,2009.
  10. Vinod Patidar, N. K. Pareek and K. K. Sud, “A new substitution- diffusion based image cipher using chaotic standard and logistic maps,” CNSNS, vol. 14, 2009, pp. 3056-3075.
Index Terms

Computer Science
Information Sciences

Keywords

Chaos Security