2023
DOI: 10.3390/cryptography7020020
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps

Abstract: This research paper presents a novel digital color image encryption approach that ensures high-level security while remaining simple and efficient. The proposed method utilizes a composite key r and x of 128-bits to create a small in-dimension private key (a chaotic map), which is then resized to match the color matrix dimension. The proposed method is uncomplicated and can be applied to any image without any modification. Image quality, sensitivity analysis, security analysis, correlation analysis, quality an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
19
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(20 citation statements)
references
References 38 publications
1
19
0
Order By: Relevance
“…The evaluation of P SN R is conducted in decibels and exhibits an inverse relationship with the mean squared error, as determined by Eq. (11).…”
Section: Analysis Of the Peak Signal-to-noise Ratio (Psnr) Metricmentioning
confidence: 99%
See 1 more Smart Citation
“…The evaluation of P SN R is conducted in decibels and exhibits an inverse relationship with the mean squared error, as determined by Eq. (11).…”
Section: Analysis Of the Peak Signal-to-noise Ratio (Psnr) Metricmentioning
confidence: 99%
“…The most important component of the ciphering process is the key, which plays a vital role in protection and ciphering data confidentiality. Hence, the key must satisfy various criteria, encompassing considerations such as length, space, and complexity [10,11]. This implies that the user-inputted key for image encryption needs preprocessing to generate a more intricate form, such as a pseudorandom sequence [12].…”
Section: Introductionmentioning
confidence: 99%
“…Additionally, various chaotic maps can be incorporated into chaos-based cryptosystems, increasing the options. Thus, chaotic cryptography has gained more attention than conventional methods because of its lower mathematical complexity and better security [26]- [28].…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, the diffusion phase is necessary, which modifies the pixel values of the entire image in sequence with the help of a chaotic map. The confusion-diffusion process is repeated several times until an acceptable level of security is achieved [8], [28]. In the proposed method, the confusion-diffusion process is applied in four consecutive rounds to ensure full randomness so that any spatial correlation among neighbor pixels vanishes.…”
Section: Related Workmentioning
confidence: 99%
“…Digital color image (DCI) [25][26][27][28][29][30] is a big number of pixels arranged in a 3D matrix as shown in figure 1 (one channel or 2D matrix for each color: red, green and blue) [31][32][33][34][35][36]. Each of these channels can be separately extracted and treated alone [1][2][3][4][5][6][7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%