Abstract Semi
Abstract Semi
ABSTRACT
In the rapidly advancing digital era, ensuring the security of multimedia data, particularly
images, has become a paramount concern. Traditional encryption algorithms like AES and DES,
while effective for textual data, often struggle to efficiently handle the unique characteristics of
image data, such as large size and strong pixel correlations. Chaotic systems, known for their
sensitivity to initial conditions, randomness, and complex dynamical behavior, present a
promising alternative for image encryption. This paper explores a chaotic image encryption
scheme based on the Logistic Map, a simple yet powerful chaotic system that exhibits complex
behavior with slight variations in its parameters.
The proposed Logistic Map-based chaotic image encryption algorithm operates in two primary
phases: pixel shuffling and pixel value transformation. The first phase employs the Logistic Map
to generate a pseudo-random sequence that dictates a new arrangement of the pixels within the
image. This shuffling phase is designed to break the strong correlations inherent in natural
images, ensuring that adjacent pixels in the original image no longer have a predictable
relationship in the encrypted image. This disruption of pixel order significantly enhances the
confusion aspect of the encryption, making it difficult for attackers to deduce the structure of the
original image.
Following the shuffling process, the second phase introduces diffusion through pixel value
modification. Here, the Logistic Map is again utilized to produce a chaotic key stream that is
XORed with the pixel values of the shuffled image. This operation ensures that even minor
changes in the original image or the encryption key result in drastically different encrypted
images, thus strengthening the overall security of the system. The chaotic nature of the Logistic
Map ensures that the encryption process is highly sensitive to initial conditions, making it
computationally infeasible for attackers to reverse-engineer the encryption without the correct
key.
In conclusion, the Logistic Map-based chaotic image encryption scheme offers a robust, efficient, and
lightweight solution for securing digital images. Its ability to provide strong encryption while maintaining
computational efficiency makes it well-suited for real-time applications and resource-constrained
environments. This work contributes to the growing field of chaotic encryption by demonstrating the
potential of simple chaotic maps, such as the Logistic Map, to achieve high levels of security in image
encryption.