An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps

In the literature, there are many image encryption algorithms that have been constructed based on different chaotic maps. However, those algorithms do well in the cryptographic process, but still, some developments need to be made in order to enhance the security level supported by them. This paper...

Full description

Bibliographic Details
Main Authors: S. S. Askar, A. A. Karawia, A. Al-Khedhairi, F. S. Al-Ammar
Format: Article
Language:English
Published: MDPI AG 2019-01-01
Series:Entropy
Subjects:
Online Access:http://www.mdpi.com/1099-4300/21/1/44
id doaj-9a24a9f1130d4cc88edfc4f0f84f25fb
record_format Article
spelling doaj-9a24a9f1130d4cc88edfc4f0f84f25fb2020-11-24T21:05:41ZengMDPI AGEntropy1099-43002019-01-012114410.3390/e21010044e21010044An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic MapsS. S. Askar0A. A. Karawia1A. Al-Khedhairi2F. S. Al-Ammar3Department of Statistics and Operations Researches, College of Science, King Saud University, P.O. Box 2455, Riyadh 11451, Saudi ArabiaDepartment of Mathematics, Faculty of Science, Mansoura University, Mansoura 35516, EgyptDepartment of Statistics and Operations Researches, College of Science, King Saud University, P.O. Box 2455, Riyadh 11451, Saudi ArabiaDepartment of Statistics and Operations Researches, College of Science, King Saud University, P.O. Box 2455, Riyadh 11451, Saudi ArabiaIn the literature, there are many image encryption algorithms that have been constructed based on different chaotic maps. However, those algorithms do well in the cryptographic process, but still, some developments need to be made in order to enhance the security level supported by them. This paper introduces a new cryptographic algorithm that depends on a logistic and two-dimensional chaotic economic map. The robustness of the introduced algorithm is shown by implementing it on several types of images. The implementation of the algorithm and its security are partially analyzed using some statistical analyses such as sensitivity to the key space, pixels correlation, the entropy process, and contrast analysis. The results given in this paper and the comparisons performed have led us to decide that the introduced algorithm is characterized by a large space of key security, sensitivity to the secret key, few coefficients of correlation, a high contrast, and accepted information of entropy. In addition, the results obtained in experiments show that our proposed algorithm resists statistical, differential, brute-force, and noise attacks.http://www.mdpi.com/1099-4300/21/1/44logistic mapchaotic economic mapimage encryptionimage decryptionsecurity analysis
collection DOAJ
language English
format Article
sources DOAJ
author S. S. Askar
A. A. Karawia
A. Al-Khedhairi
F. S. Al-Ammar
spellingShingle S. S. Askar
A. A. Karawia
A. Al-Khedhairi
F. S. Al-Ammar
An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps
Entropy
logistic map
chaotic economic map
image encryption
image decryption
security analysis
author_facet S. S. Askar
A. A. Karawia
A. Al-Khedhairi
F. S. Al-Ammar
author_sort S. S. Askar
title An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps
title_short An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps
title_full An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps
title_fullStr An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps
title_full_unstemmed An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps
title_sort algorithm of image encryption using logistic and two-dimensional chaotic economic maps
publisher MDPI AG
series Entropy
issn 1099-4300
publishDate 2019-01-01
description In the literature, there are many image encryption algorithms that have been constructed based on different chaotic maps. However, those algorithms do well in the cryptographic process, but still, some developments need to be made in order to enhance the security level supported by them. This paper introduces a new cryptographic algorithm that depends on a logistic and two-dimensional chaotic economic map. The robustness of the introduced algorithm is shown by implementing it on several types of images. The implementation of the algorithm and its security are partially analyzed using some statistical analyses such as sensitivity to the key space, pixels correlation, the entropy process, and contrast analysis. The results given in this paper and the comparisons performed have led us to decide that the introduced algorithm is characterized by a large space of key security, sensitivity to the secret key, few coefficients of correlation, a high contrast, and accepted information of entropy. In addition, the results obtained in experiments show that our proposed algorithm resists statistical, differential, brute-force, and noise attacks.
topic logistic map
chaotic economic map
image encryption
image decryption
security analysis
url http://www.mdpi.com/1099-4300/21/1/44
work_keys_str_mv AT ssaskar analgorithmofimageencryptionusinglogisticandtwodimensionalchaoticeconomicmaps
AT aakarawia analgorithmofimageencryptionusinglogisticandtwodimensionalchaoticeconomicmaps
AT aalkhedhairi analgorithmofimageencryptionusinglogisticandtwodimensionalchaoticeconomicmaps
AT fsalammar analgorithmofimageencryptionusinglogisticandtwodimensionalchaoticeconomicmaps
AT ssaskar algorithmofimageencryptionusinglogisticandtwodimensionalchaoticeconomicmaps
AT aakarawia algorithmofimageencryptionusinglogisticandtwodimensionalchaoticeconomicmaps
AT aalkhedhairi algorithmofimageencryptionusinglogisticandtwodimensionalchaoticeconomicmaps
AT fsalammar algorithmofimageencryptionusinglogisticandtwodimensionalchaoticeconomicmaps
_version_ 1716767920318578688