M. T. Rodriguez-Sahagun, J. B. Mercado-Sanchez, D. López-Mancilla, R. Jaimes-Reátegui, J. H. García-López
{"title":"Image Encryption Based on Logistic Chaotic Map for Secure Communications","authors":"M. T. Rodriguez-Sahagun, J. B. Mercado-Sanchez, D. López-Mancilla, R. Jaimes-Reátegui, J. H. García-López","doi":"10.1109/CERMA.2010.44","DOIUrl":null,"url":null,"abstract":"In this work, we propose a color image encryption of variable sizes using logistic chaotic map. We considered a process of permutation, followed by a diffusion algorithm. To evaluate this encryption method’s performance, we applied a statistical analysis, and developed histograms of the original and encrypted images. For the correlation analysis, we evaluate the behavior of two adjacent pixels on horizontal, vertical and diagonal directions. We also analyzed the behavior of the algorithm to the most common cryptographic attacks. Numerical simulations and graphic results are presented for image encryption and decryption using MatLab software.","PeriodicalId":119218,"journal":{"name":"2010 IEEE Electronics, Robotics and Automotive Mechanics Conference","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE Electronics, Robotics and Automotive Mechanics Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CERMA.2010.44","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13
Abstract
In this work, we propose a color image encryption of variable sizes using logistic chaotic map. We considered a process of permutation, followed by a diffusion algorithm. To evaluate this encryption method’s performance, we applied a statistical analysis, and developed histograms of the original and encrypted images. For the correlation analysis, we evaluate the behavior of two adjacent pixels on horizontal, vertical and diagonal directions. We also analyzed the behavior of the algorithm to the most common cryptographic attacks. Numerical simulations and graphic results are presented for image encryption and decryption using MatLab software.