Article
Version 1
Preserved in Portico This version is not peer-reviewed
Image Encryption Using Improved Hybrid Chaotic Map and Spiral Transformation
Version 1
: Received: 6 October 2023 / Approved: 6 October 2023 / Online: 6 October 2023 (15:27:21 CEST)
A peer-reviewed article of this Preprint also exists.
Jiang, M.; Yang, H. Image Encryption Using a New Hybrid Chaotic Map and Spiral Transformation. Entropy 2023, 25, 1516. Jiang, M.; Yang, H. Image Encryption Using a New Hybrid Chaotic Map and Spiral Transformation. Entropy 2023, 25, 1516.
Abstract
Image encryption based on chaotic maps is an important way to ensure the secure communication of digital multimedia on the Internet. To improve the encryption performance and security of image encryption systems, a new image encryption algorithm is proposed by employing a compound chaotic map and random cyclic shift. Firstly, an improved Hybrid chaotic system is designed by coupling Logistic, ICMIC, Tent, and Chebyshev maps (HLITC). Comparison tests with previous chaotic maps in terms of chaotic trajectory, Lyapunov exponent, and Kolmogorov entropy illustrate the new hybrid chaotic map has better chaotic performance. Then the proposed HLITC chaotic system is used to develop a new chaotic image encryption scheme with the double cyclic shift. The improved HLITC chaotic system is performed to generate key sequences used in the image scrambling and diffusion stage. The spiral transformation controlled by chaotic sequence is used to scramble the pixels of the plaintext image, while the XOR operation based on a chaotic map is used for pixel diffusion. Extensive experiments of statistical analysis, key sensitivity, and keyspace analysis are conducted. Experimental results show the proposed encryption scheme has good robustness against brute force attacks, statistical attacks, and differential attacks, and is more effective than many existing chaotic image encryption algorithms.
Keywords
image encryption; Chebyshev map; spiral transformation; security analysis
Subject
Computer Science and Mathematics, Computer Science
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment