Research on Chaotic Image Encryption Based on Fibonacci-ILogistic-IHenon

Authors

  • Yong Yang Zhejiang Industry Polytechnic College, Shaoxing, Zhejiang, 312000, China
  • Xuan Chen Zhejiang Industry Polytechnic College, Shaoxing, Zhejiang, 312000, China
  • Jiaying Xu Zhejiang Industry Polytechnic College, Shaoxing, Zhejiang, 312000, China
  • Yuxia Li Beijing Union University, Beijing, 100025, China

DOI:

https://doi.org/10.13052/jcsm2245-1439.1322

Keywords:

Chaos, Image, Encryption

Abstract

To further improve the security of image encryption, we propose an image encryption algorithm that combines Fibonacci with improved logistic and improved Henon chaotic mapping, i.e., the Fibonacci-ILogistic-IHenon algorithm. The algorithm addresses that the existing logistic chaotic algorithm is controlled by the parameter resulting in an uneven distribution, and the Henon chaotic algorithm may have the problem of periodic orbits. Using the mode-taking and sinusoidal functions for optimization, the output sequence region generated by the logistic chaotic mapping is adjusted to the input of the Henon chaotic mapping, which enables the construction of a new chaotic system (ILogistic-IHenon). In the image encryption implementation, Fibonacci is used to cure the chaos, and ILogistic-IHenon is utilized to generate chaotic sequences to complete the encryption. In the simulation experiments, we choose the improved logistic encryption algorithm, the improved Henon encryption algorithm, and the improved logistic-ent encryption algorithm as the comparison algorithms, and the results illustrate that the Fibonacci-ILogistic-IHenon algorithm has better performance in image encryption statistical analysis, encryption speed, pixel correlation analysis, information entropy analysis, differential attack analysis and other metrics.

Downloads

Download data is not yet available.

Author Biographies

Yong Yang, Zhejiang Industry Polytechnic College, Shaoxing, Zhejiang, 312000, China

Yong Yang received her bachelor’s degree in Inorganic nonmetallic materials from Chengdu University of Technology in 2001 and his master’s degree in computer science and technology from Hangzhou Dianzi University in 2009. He is currently an associate professor of Zhejiang Industry Polytechnic College, and his research interests are edge cloud computing, wireless sensing, image encryption.

Xuan Chen, Zhejiang Industry Polytechnic College, Shaoxing, Zhejiang, 312000, China

Xuan Chen received her bachelor’s degree in Information Management and Information Systems from Zhengzhou University of Aeronauticsin in 2013 and a Master’s degree in software engineering from University of Electronic Science and Technology of China in 2016. He is an associate professor at Zhejiang Industry Polytechnic College. His research interests include cloud computing, image encryption and algorithm design.

Jiaying Xu, Zhejiang Industry Polytechnic College, Shaoxing, Zhejiang, 312000, China

Jiaying Xu received her bachelor’s degree in Visual Communication Design from Hubei Academy of Fine Arts in 2015 and a Master’s degree in Visual Communication Design from Hubei Academy of Fine Arts in 2018. She is currently a teacher at the School of Design and Art at Zhejiang Industry Polytechnic College, and her research interests in graphic comprehensive project design, illustration design, packaging design.

Yuxia Li, Beijing Union University, Beijing, 100025, China

Yuxia Li received her bachelor’s degree in Physics from Inner Mongolia Normal University in 1994 and a Master’s degree in Computer Technology and Applications from Beijing Institute of Technology in 2003. She is currently an associate professor in Beijing United University, and her research interests are computer algorithms, big data, and cloud computing.

References

Porter T, Duff T. Compositing digital images[C]//Proceedings of the 11th annual conference on Computer graphics and interactive techniques. 1984: 253–259.

Madhu B, Holi G, Murthy K S. An overview of image security techiques[J]. International Journal of Computer Applications, 2016, 154(6): 37-46.

Pareek N K, Patidar V, Sud K K. Image encryption using chaotic logistic map[J]. Image and vision computing, 2006, 24(9): 926–934.

Wang X, Teng L, Qin X. A novel color image encryption algorithm based on chaos[J]. Signal Processing, 2012, 92(4): 1101–1108.

X̧elik H, Doğan N. A hybrid color image encryption method based on extended logistic map[J]. Multimedia Tools and Applications, 2023: 1–24.

Al-Hazaimeh O M. A new speech encryption algorithm based on dual shuffling Hénon chaotic map[J]. International Journal of Electrical and Computer Engineering, 2021, 11(3): 2203–2210.

Luo H, Ge B. Image encryption based on Henon chaotic system with nonlinear term[J]. Multimedia Tools and Applications, 2019, 78: 34323–34352.

Bakhshandeh A, Eslami Z. An authenticated image encryption scheme based on chaotic maps and memory cellular automata[J]. Optics and Lasers in Engineering, 2013, 51(6):665–673.

Wang X, Liu C. A novel and effective image encryption algorithm based on chaos and DNA encoding[J]. Multimedia Tools and Applications, 2017, 76: 6229–6245.

Ding L, Ding Q. The establishment and dynamic properties of a new 4D hyperchaotic system with its application and statistical tests in gray images[J]. Entropy, 2020, 22(3):310–328.

Zhou H L, Liu H Q. Fast Chaotic Image Encryption Algorithm Combined with DNA Encoding[J]. Journal of Northeastern University (Natural Science), 2021, 42(10): 1391–1399.

Wang Q, Yu S, Li C, et al. Theoretical Design and FPGA-Based Implementation of Higher-Dimensional Digital Chaotic Systems[J]. Circuits and Systems I: Regular Papers, IEEE Transactions on, 2016, 63(3): 1–12.

Pak C, Kim J, Pang R, et al. A new color image encryption using 2D improved logistic coupling map[J]. Multimedia Tools and Applications, 2021, 80: 25367–25387.

Lai Q, Hu G, Erkan U, et al. High-efficiency medical image encryption method based on 2D Logistic-Gaussian hyperchaotic map[J]. Applied Mathematics and Computation, 2023, 442: 127738.

Khan H, Hazzazi M M, Jamal S S, et al. New color image encryption technique based on three-dimensional logistic map and Gray wolf optimization based generated substitution boxes[J]. Multimedia Tools and Applications, 2023, 82(5): 6943–6964.

Luo Y, Yu J, Lai W, et al. A novel chaotic image encryption algorithm based on improved baker map and logistic map[J]. Multimedia Tools and Applications, 2019, 78: 22023–22043.

Zhou Y C, Bao L, Chen C L. A new 1D chaotic system for image encryption [J]. Signal Processing, 2014, 97: 172–182.

Shao S, Li J, Shao P, et al. Chaotic Image Encryption Using Piecewise-Logistic-Sine Map[J]. IEEE Access, 2023, 11: 27477–27488.

Hua Z, Zhu Z, Yi S, et al. Cross-plane color image encryption using a two-dimensional logistic tent modular map[J]. Information Sciences, 2021, 546: 1063–1083.

Wang X, Guan N. A novel chaotic image encryption algorithm based on extended Zigzag confusion and RNA operation[J]. Optics&Laser Technology, 2020, 131: 106366.

Basha S M, Mathivanan P, Ganesh A B. Bit level color image encryption using Logistic-Sine-Tent-Chebyshev (LSTC) map[J]. Optik, 2022, 259: 168956.

Akraam M, Rashid T, Zafar S. An image encryption scheme proposed by modifying chaotic tent map using fuzzy numbers[J]. Multimedia Tools and Applications, 2023, 82(11): 16861–16879.

Adhikari S, Karforma S. An Efficient Image Encryption Method Using Henon-Logistic-Tent Chaotic Pseudo Random Number Sequence[J]. Wireless Personal Communications, 2023, 129(4): 2843–2859.

Ding Y, Duan Z, Li S. 2D arcsine and sine combined logistic map for image encryption[J]. The Visual Computer, 2023, 39(4): 1517–1532.

Rukhin A, Soto J, Nechvatal J, et al. A statistical test suite for random and pseudorandom number generators for cryptographic applications[J]. NIST Special Publication 800-22, Gaithersburg, MD, US, 2001, 800: 163.

Downloads

Published

2024-02-12

How to Cite

1.
Yang Y, Chen X, Xu J, Li Y. Research on Chaotic Image Encryption Based on Fibonacci-ILogistic-IHenon. JCSANDM [Internet]. 2024 Feb. 12 [cited 2024 Apr. 27];13(02):215-38. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/23875

Issue

Section

Cyber Security Issues and Solutions