International Journal of
Computer Sciences and Engineering

Scholarly, Peer-Reviewed and Fully Refereed Academic Research Journal

Flash News 

Full paper submission has now been opened for August edition. You can upload your full paper using the required templates to the Online Submission System. Deadline for uploading the full papers is 22 August 2018.

A Neoteric Fractional Image Encryption Methods Based On Logistic Mapping
Open Access   Article

A Neoteric Fractional Image Encryption Methods Based On Logistic Mapping
Shweta Chauhan1 , Pawan Kumar Mishra2
1 Computer Science Engineering, Faculty of Technology, Uttarakhand Technical University, Dehradun, India.
2 Computer Science Engineering, Faculty of Technology, Uttarakhand Technical University, Dehradun, India.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-4 , Page no. 37-42, Apr-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i4.3742

Online published on Apr 30, 2018

Copyright © Shweta Chauhan, Pawan Kumar Mishra . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 
View this paper at   Google Scholar | DPI Digital Library
  XML View PDF Download  
Citation

IEEE Style Citation: Shweta Chauhan, Pawan Kumar Mishra, “A Neoteric Fractional Image Encryption Methods Based On Logistic Mapping”, International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.37-42, 2018.

MLA Style Citation: Shweta Chauhan, Pawan Kumar Mishra "A Neoteric Fractional Image Encryption Methods Based On Logistic Mapping." International Journal of Computer Sciences and Engineering 6.4 (2018): 37-42.

APA Style Citation: Shweta Chauhan, Pawan Kumar Mishra, (2018). A Neoteric Fractional Image Encryption Methods Based On Logistic Mapping. International Journal of Computer Sciences and Engineering, 6(4), 37-42.
VIEWS PDF XML
100 106 downloads 17 downloads
  
  
           
Abstract :
Cryptography is a intelligence to absorb the ambush of the accession by barter abstracts or admonition into advisement form, so the bulletin cannot be recognized. Today, there are abounding algorithms acclimated for the for Image encryption, but the chaotic encryption methods accept a acceptable aggregate of speed and high security. In abounding years, the chaotic based cryptographic apportioned accept been acceptable some new and abstruse means to advance defended Image encryption techniques. The chaos-based encryption schemes are composed of two steps: chaotic confusion and pixel diffusion. We aboriginal accord a explain addition into chaotic Image encryption and again we investigate some important backdrop and behavior of the logistic map. The logistic map, alternate trajectory, or random-like fluctuation, could not be acquired with some best of antecedent condition. Therefore, a blatant logistic map with accretion arrangement babble is introduced.
Key-Words / Index Term :
Chaotic Confusion,Pixel Diffsion,Image Encrytion,Logistic Mapping
References :
[1] Ying-yu C. and Chong Fu, ”An Image Encryption Scheme Based on High Dimension Chaos System,” Int.Cof. Intelligent computation technology and automation,pp. 104-108, 2008.
[2]. HAN Feng-ying, “Image Encryption Algorithm Based on Improved Logistic Chaotic Systems” , Journal of central South University of Forestry and Technology,28(1):153-157,2008

[3] Weihua Z. Ying S. “Encryption Algorithms Using Chaosand CAT Methodology,” International Conference onAnti-Counterfeiting Security and Identification in
Communication (ASID) ,pp. 20 - 23,2008

[4] Mohammad Ali Bani Younes and Aman Jantan, Image EncryptionUsing Block-Based Transformation Algorithm, IAENG International Journal
of Computer Science, 35:1, IJCS_35_1_03,2008

[5 ] C.K. Huang and H.H. Nien, Multi chaotic systems based pixel shuffle for image encryption, Optics Communications 282 2123–2127,2009

[6] Musheer Ahmed, M.shamsher Alam “A new algorithm of encryption and decryption of images using chaotic mapping” International Journal on computer science and engineering,vol.2(1),pp46-50,2009

[7] V. Patidar, N. K. Pareek, and K. K. Sud, “A new substitution- diffusion based image cipher using chaotic standard and logistic maps,” Communications in Nonlinear Science and Numerical Simulation,vol.14,no.7,pp.3056–3075,2009.

[8]Xiang Di, L. X. and Wang P., “Analysis and Improvement of a Chaos Image Encryption Algorithm,”Chaos, Solution and Fractal .Journal on computer science and engineering,vol.2(1), 2009

[9]Jonathan M.Blackedge,Musheer Ahmed ,Omar Farooq“Chaiotic image encryption algorithm based onfrequency domain scrambling” ,School of ElectricalEngineering systems Articles,Dublin Institute ofTechnolog,2010

[10]. C. J., S. G. and S. R., “An Image Encryption Scheme Based on One Time Pads - A Chaotic Approach,” Int.Conf. on Computing , Communication and Networking
Technologies, pp. 1 – 6, July. 2010.

[11].Chenghang Yu, Baojun Zhang and Xiang Ruan,The Chaotic Feature ofTrigonometric Function and Its Use for Image Encryption, EighthInternational Conference on Fuzzy Systems and Knowledge Discovery(FSKD),2011
[12]. G.A.Sathishkumar, Dr.K.Bhoopathy bagan and Dr.N.Sriraam, ImageEncryption Based on Diffusion and Multiple Chaotic Maps, InternationalJournal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March,2011.

[13] Komal D Patel, Sonal Belani,”Image Encryption Using DifferentTechniques”:A Review, International Journal of Emerging Technology andAdvanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume1, Issue 1, November 2011

[14] John Justin M, Manimurugan S, A Survey on Various EncryptionTechniques, International Journal of Soft Computing and Engineering (IJSCE)ISSN: 2231-2307, Volume-2, Issue-1, March 2012.

[15] Ruisong, Y. and Haiying ,Z.(2012). An Efficient Chaos-based Image Encryption Scheme Using Affine Modular Maps. I. J. Computer Network and Information Security, 7, pp.41-50.

[16] LEI Li-hong ,BAI Feng-ming,HAN Xue-hui, New Image EncryptionAlgorithm Based on Logistic Map and Hyper-chaos, International Conferenceon Computational and Information Sciences,2013

[17] A Novel Image Encryption Using Arnold Cat proposed by Pan Tian-gong and Li Da-yong College of Measurement-Control Tech & Communications Engineering, International Journal of Security and Its Applications Vol.7, No.5 2013

[18] F.K Tabash, M.F Rafiq, M Izharrudin”Image Encryption Algorithm based on Chaotic Map, International Journal of Computer Applications (0975-8887) Vol 64, number13 2013

[19] Ninth International Conference on Computational Intelligence and Security, A SymmetricImage Encryption Scheme Using Chaotic Baker map and Lorenz System, Chong Fu*, Wen-jingLi, Zhao-yu Meng, Tao Wang, Pei-xuan Li, (2013), (IEEE).

[20] Sukhjeevan Kaur Et Al , Int.J.Computer Technology & Applications, , A Review Of ImageEncryption Schemes Based On The Chaotic Map, Vol 5 (1),144-149, 2014

[21] Sandhya Rani et al. International Journal of Advanced Computer Research (ISSN) (print):2249-7277 ISSN (online): 2277-7970) Volume-4 Number-2 Issue, 2014

[22] Jun-xinChen,Zhi-liangZhu, Li-boZhang, ChongFu, andHaiYu An Efficient Diffusion Scheme for Chaos-Based Digital Image Encryption, Volume 2014, Article ID 427349, 13 pages http://dx.doi.org/10.1155/2014/427349.

[23]. Mayank Mishra, Prashant Mishra, Chinmay Garg “A new Algorithm of encryption and decryption of images using Chaotic Mapping, International Journal of Information and computing Technology ISSN 0974-2239 Vol 4 November 7,2014

[24] Pawan Mishra, Surbhi Prakash “Encryption Of images By Multiple Chaotic Maps, IJAFRC Vol 2, Issues 4, April-.ISSN 2348-4853, 2015

[25] ]LingFeng Liu, Suoxia Miao,”A new image encryption algorithm based on logistic map with varying parameter, SpringerPlus, received 20 September 2015, Accepted 1 March 2016, Published 8 March, 2016.