An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps
In the literature, there are many image encryption algorithms that have been constructed based on different chaotic maps. However, those algorithms do well in the cryptographic process, but still, some developments need to be made in order to enhance the security level supported by them. This paper...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-01-01
|
Series: | Entropy |
Subjects: | |
Online Access: | http://www.mdpi.com/1099-4300/21/1/44 |
id |
doaj-9a24a9f1130d4cc88edfc4f0f84f25fb |
---|---|
record_format |
Article |
spelling |
doaj-9a24a9f1130d4cc88edfc4f0f84f25fb2020-11-24T21:05:41ZengMDPI AGEntropy1099-43002019-01-012114410.3390/e21010044e21010044An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic MapsS. S. Askar0A. A. Karawia1A. Al-Khedhairi2F. S. Al-Ammar3Department of Statistics and Operations Researches, College of Science, King Saud University, P.O. Box 2455, Riyadh 11451, Saudi ArabiaDepartment of Mathematics, Faculty of Science, Mansoura University, Mansoura 35516, EgyptDepartment of Statistics and Operations Researches, College of Science, King Saud University, P.O. Box 2455, Riyadh 11451, Saudi ArabiaDepartment of Statistics and Operations Researches, College of Science, King Saud University, P.O. Box 2455, Riyadh 11451, Saudi ArabiaIn the literature, there are many image encryption algorithms that have been constructed based on different chaotic maps. However, those algorithms do well in the cryptographic process, but still, some developments need to be made in order to enhance the security level supported by them. This paper introduces a new cryptographic algorithm that depends on a logistic and two-dimensional chaotic economic map. The robustness of the introduced algorithm is shown by implementing it on several types of images. The implementation of the algorithm and its security are partially analyzed using some statistical analyses such as sensitivity to the key space, pixels correlation, the entropy process, and contrast analysis. The results given in this paper and the comparisons performed have led us to decide that the introduced algorithm is characterized by a large space of key security, sensitivity to the secret key, few coefficients of correlation, a high contrast, and accepted information of entropy. In addition, the results obtained in experiments show that our proposed algorithm resists statistical, differential, brute-force, and noise attacks.http://www.mdpi.com/1099-4300/21/1/44logistic mapchaotic economic mapimage encryptionimage decryptionsecurity analysis |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
S. S. Askar A. A. Karawia A. Al-Khedhairi F. S. Al-Ammar |
spellingShingle |
S. S. Askar A. A. Karawia A. Al-Khedhairi F. S. Al-Ammar An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps Entropy logistic map chaotic economic map image encryption image decryption security analysis |
author_facet |
S. S. Askar A. A. Karawia A. Al-Khedhairi F. S. Al-Ammar |
author_sort |
S. S. Askar |
title |
An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps |
title_short |
An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps |
title_full |
An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps |
title_fullStr |
An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps |
title_full_unstemmed |
An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps |
title_sort |
algorithm of image encryption using logistic and two-dimensional chaotic economic maps |
publisher |
MDPI AG |
series |
Entropy |
issn |
1099-4300 |
publishDate |
2019-01-01 |
description |
In the literature, there are many image encryption algorithms that have been constructed based on different chaotic maps. However, those algorithms do well in the cryptographic process, but still, some developments need to be made in order to enhance the security level supported by them. This paper introduces a new cryptographic algorithm that depends on a logistic and two-dimensional chaotic economic map. The robustness of the introduced algorithm is shown by implementing it on several types of images. The implementation of the algorithm and its security are partially analyzed using some statistical analyses such as sensitivity to the key space, pixels correlation, the entropy process, and contrast analysis. The results given in this paper and the comparisons performed have led us to decide that the introduced algorithm is characterized by a large space of key security, sensitivity to the secret key, few coefficients of correlation, a high contrast, and accepted information of entropy. In addition, the results obtained in experiments show that our proposed algorithm resists statistical, differential, brute-force, and noise attacks. |
topic |
logistic map chaotic economic map image encryption image decryption security analysis |
url |
http://www.mdpi.com/1099-4300/21/1/44 |
work_keys_str_mv |
AT ssaskar analgorithmofimageencryptionusinglogisticandtwodimensionalchaoticeconomicmaps AT aakarawia analgorithmofimageencryptionusinglogisticandtwodimensionalchaoticeconomicmaps AT aalkhedhairi analgorithmofimageencryptionusinglogisticandtwodimensionalchaoticeconomicmaps AT fsalammar analgorithmofimageencryptionusinglogisticandtwodimensionalchaoticeconomicmaps AT ssaskar algorithmofimageencryptionusinglogisticandtwodimensionalchaoticeconomicmaps AT aakarawia algorithmofimageencryptionusinglogisticandtwodimensionalchaoticeconomicmaps AT aalkhedhairi algorithmofimageencryptionusinglogisticandtwodimensionalchaoticeconomicmaps AT fsalammar algorithmofimageencryptionusinglogisticandtwodimensionalchaoticeconomicmaps |
_version_ |
1716767920318578688 |