4.6 Article

A new Grayscale image encryption algorithm composed of logistic mapping, Arnold cat, and image blocking

Journal

MULTIMEDIA TOOLS AND APPLICATIONS
Volume 80, Issue 12, Pages 18317-18344

Publisher

SPRINGER
DOI: 10.1007/s11042-021-10576-x

Keywords

Arnold cat; Displacement of pixels; Image blocking; Image encryption; Logistic map

Ask authors/readers for more resources

This paper presents a new chaotic-based encryption algorithm utilizing a combination of Arnold cat, logistic mapping, and image blocking for effective and secure image encryption. The proposed algorithm involves multiple pixel relocations through image blocking and Arnold cat mapping, as well as the generation of image keys using chaotic logistic mapping for encryption. Statistical tests and security analyses have demonstrated the excellent security of the algorithm.
This paper proposes a new chaotic-based encryption algorithm to encrypt images securely and effectively. A combination of Arnold cat, logistic mapping and image blocking has been used to design this algorithm. The proposed algorithm is a special algorithm that not only does it use image blocking once to relocate the pixels in four areas of the image separately but also uses an Arnold cat mapping to relocate the pixels across the whole image once again. This results in a higher number of pixel relocations which makes it impossible to decode without the key. The other interesting and new point is the particular use of chaotic logistic mapping to develop three image keys and to combine them with the input image, and to develop four other image keys to encrypt the image. Relocation of the input image blocks and the images generated by the logistic mapping are conducted through sorting the numbers generated by the mapping and how they have been relocated. Then, Arnold cat is used to relocate the pixels across the whole image (which is a combination of the input image and three images generated by logistic mapping). Eventually, the encryption operation is conducted on the obtained image using the encryption key (the image generated through the combination of the four keys). Numerous statistical tests and security analyses indicate the excellent security of our proposed algorithm.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available