Image Encryption Using 2D Chaotic Map
Image Encryption Using 2D Chaotic Map
Map
WHY?
Introduction
Image Encryption
Image encryption techniques are broadly
classified in to four categories:
• Optical
• Spatial Domain
• Transform Domain
• Compressive Sensing
Chaos a Spatial Domain Based Image
Encryption Techniques
• 2D Rational Maps
• Exponential map
Image encryption based on a new 2D logistic
adjusted logistic map
Objective of the proposed research
• For the visualization of the behavior of the 1-D chaotic maps two
plots are used:
1. Bifurcation diagram
2. Iteration diagram
Bifurcation diagram
[10]
2D Sine Logistic xi+1 = μ[sin(πyi) + 3]xi(1 - xi)
Modulation Map (2D- yi+1 = μ[sin(πxi+1) + 3]yi(1 - yi)
SLMM) μ ∈ (0, 1]
[11] 2D-LASM xi+1 = sin[πμ(yi + 3)xi(1 - xi)]
yi+1 = sin[πμ(xi+1 + 3)yi(1 - yi)]
μ ∈ (0, 1]
2D Logistic Adjusted Logistic Map (2D-LALM)2-
D map
The Proposed Map
• The proposed map is evolved from the above discussed
referred 2-D map. The equation for the proposed map
are:
• Where μ ∈ (0, 1].
• The proposed model is more chaotic with non-uniform
trajectory plots as compared to the previous.
Lyapunov Stability analysis
• The proposed map is compared with the maps
mentioned above using Lyapunov stability analysis.
Where the analysis provides the intuition about the
sensitivity of the system on the initial condition
• dij = (i - 1)N-dash + j
[
2
G. Gu and J. Ling, "A fast image encryption method by using chaotic 3D cat maps," Optik, vol. 125, pp. 4700-4705,
] 2014.
[
3
X. Huang and G. Ye, "An efficient self-adaptive model for chaotic image encryption algorithm," Communications in
] Nonlinear Science and Numerical Simulation, vol. 19, pp. 4094-4104, 2014.
[
4
A. Ono and T. Kohda, "Solvable three-dimensional rational chaotic map defined by Jacobian elliptic functions,"
] International Journal of Bifurcation and Chaos, vol. 17, pp. 3645-3650, 2007.
[
5
A. Umamageswari and G. R. Suresh, "Security in medical image communication with arnold's cat map method and
] reversible watermarking," in 2013 International Conference on Circuits, Power and Computing Technologies (ICCPCT),
2013.
[ D. Chattopadhyay, M. K. Mandal and D. Nandi, "Symmetric key chaotic image encryption using circle map," Indian
6
] Journal of Science and Technology, vol. 4, pp. 593-599, 2011.
[ N. K. Pareek, V. Patidar and K. K. Sud, "Image encryption using chaotic logistic map," Image and vision computing, vol.
7
] 24, pp. 926-934, 2006.
[ M. C. Shastry, N. Nagaraj and P. G. Vaidya, "The B-exponential map: A generalization of the logistic
8map, and its applications in generating pseudo-random numbers," arXiv preprint cs/0607069, 2006.
]
[ M. Sharma, "Image encryption based on a new 2D logistic adjusted logistic map," Multimedia Tools and Applications,
9vol. 79, pp. 355-374, 2020.
]
[ Y. Wu, J. P. Noonan, G. Yang and H. Jin, "Image encryption using the two-dimensional logistic chaotic map," Journal
1 of Electronic Imaging, vol. 21, p. 013014, 2012.
0
]
[ Z. Hua, Y. Zhou, C.-M. Pun and C. L. P. Chen, "2D Sine Logistic modulation map for image encryption," Information
1 Sciences, vol. 297, pp. 80-94, 2015.
1
]
[ Z. Hua and Y. Zhou, "Image encryption using 2D Logistic-adjusted-Sine map," Information Sciences, vol. 339, pp. 237-
1 253, 2016.
2
]
[ G. Benettin, L. Galgani and J.-M. Strelcyn, "Kolmogorov entropy and numerical experiments," Physical Review A, vol.
1 14, p. 2338, 1976.
3
]
[ R. Brown, P. Bryant and H. D. I. Abarbanel, "Computing the Lyapunov spectrum of a dynamical system from an
1 observed time series," Physical Review A, vol. 43, p. 2787, 1991.