A Digital Image Encryption Scheme Based on the Hybrid of Cellular Neural Network and Logistic Map

Author(s):  
Wei Zhang ◽  
Jun Peng ◽  
Huaqian Yang ◽  
Pengcheng Wei
2014 ◽  
Vol 7 (4) ◽  
pp. 65 ◽  
Author(s):  
Obaida M. Al-hazaimeh

In this paper, an implementation of digital image encryption scheme based on one dimensional logistic map is proposed. The chaotic cryptography technique concentrates in general on the symmetric key cryptographic technique. In the proposed algorithm, a random key table lookup criterion was combined with a one-dimensional chaotic map were used for high degree 2-stage security image encryption while maintaining acceptable overhead delay time. The proposed algorithm is based on image row shuffling and pixel-wise XOR encryption. To increase the security of row shuffling variable rotation and inversion were applied to each shuffled row, based on the difference between old and new row location. The experimental results showed that the proposed algorithm is effective and applicable. The combination of logistic map and key table lookup shows advantages of large random key space and high-level of security. The resulting cipher image is suitable for practical use in secure image storing and transmission.


2012 ◽  
Vol 13 (2) ◽  
pp. 67-88 ◽  
Author(s):  
Ahmed A. Abd El-Latif ◽  
Li Li ◽  
Tiejun Zhang ◽  
Ning Wang ◽  
Xianhua Song ◽  
...  

2021 ◽  
Author(s):  
Krasimir Kordov ◽  
Stanimir Zhelezov ◽  
Atanas Nachev ◽  
Nikolay Gueorguiev ◽  
Daniela Pavlova

2014 ◽  
Vol 2014 ◽  
pp. 1-13 ◽  
Author(s):  
Adelaïde Nicole Kengnou Telem ◽  
Colince Meli Segning ◽  
Godpromesse Kenne ◽  
Hilaire Bertrand Fotsin

A robust gray image encryption scheme using chaotic logistic map and artificial neural network (ANN) is introduced. In the proposed method, an external secret key is used to derive the initial conditions for the logistic chaotic maps which are employed to generate weights and biases matrices of the multilayer perceptron (MLP). During the learning process with the backpropagation algorithm, ANN determines the weight matrix of the connections. The plain image is divided into four subimages which are used for the first diffusion stage. The subimages obtained previously are divided into the square subimage blocks. In the next stage, different initial conditions are employed to generate a key stream which will be used for permutation and diffusion of the subimage blocks. Some security analyses such as entropy analysis, statistical analysis, and key sensitivity analysis are given to demonstrate the key space of the proposed algorithm which is large enough to make brute force attacks infeasible. Computing validation using experimental data with several gray images has been carried out with detailed numerical analysis, in order to validate the high security of the proposed encryption scheme.


Sign in / Sign up

Export Citation Format

Share Document