Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Image Encryption Using Improved Hybrid Chaotic Map and Spiral Transformation

Version 1 : Received: 6 October 2023 / Approved: 6 October 2023 / Online: 6 October 2023 (15:27:21 CEST)

A peer-reviewed article of this Preprint also exists.

Jiang, M.; Yang, H. Image Encryption Using a New Hybrid Chaotic Map and Spiral Transformation. Entropy 2023, 25, 1516. Jiang, M.; Yang, H. Image Encryption Using a New Hybrid Chaotic Map and Spiral Transformation. Entropy 2023, 25, 1516.

Abstract

Image encryption based on chaotic maps is an important way to ensure the secure communication of digital multimedia on the Internet. To improve the encryption performance and security of image encryption systems, a new image encryption algorithm is proposed by employing a compound chaotic map and random cyclic shift. Firstly, an improved Hybrid chaotic system is designed by coupling Logistic, ICMIC, Tent, and Chebyshev maps (HLITC). Comparison tests with previous chaotic maps in terms of chaotic trajectory, Lyapunov exponent, and Kolmogorov entropy illustrate the new hybrid chaotic map has better chaotic performance. Then the proposed HLITC chaotic system is used to develop a new chaotic image encryption scheme with the double cyclic shift. The improved HLITC chaotic system is performed to generate key sequences used in the image scrambling and diffusion stage. The spiral transformation controlled by chaotic sequence is used to scramble the pixels of the plaintext image, while the XOR operation based on a chaotic map is used for pixel diffusion. Extensive experiments of statistical analysis, key sensitivity, and keyspace analysis are conducted. Experimental results show the proposed encryption scheme has good robustness against brute force attacks, statistical attacks, and differential attacks, and is more effective than many existing chaotic image encryption algorithms.

Keywords

image encryption; Chebyshev map; spiral transformation; security analysis

Subject

Computer Science and Mathematics, Computer Science

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.