This paper is published in Volume-7, Issue-3, 2021
Area
Image Security
Author
Aasha Suresh
Org/Univ
SASTRA Deemed To Be University, Thanjavur, Tamil Nadu, India
Pub. Date
02 June, 2021
Paper ID
V7I3-1643
Publisher
Keywords
Encryption, Decryption, Key Space, Logistic Space, Sine Map

Citationsacebook

IEEE
Aasha Suresh. Combined Sine-Logistic chaotic map and its application in an image encryption scheme, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Aasha Suresh (2021). Combined Sine-Logistic chaotic map and its application in an image encryption scheme. International Journal of Advance Research, Ideas and Innovations in Technology, 7(3) www.IJARIIT.com.

MLA
Aasha Suresh. "Combined Sine-Logistic chaotic map and its application in an image encryption scheme." International Journal of Advance Research, Ideas and Innovations in Technology 7.3 (2021). www.IJARIIT.com.

Abstract

With the rapid growth of technology, Information Security has become a significant concern in the contemporary world. Today, many new-fangled methods have been developed to transmit data in a fast and secure way. Among all the data that is being transmitted, digital images play a vital role. About 60 percent of the data that is being transmitted is in the form of digital images. These digital images require a safe and concealed method of transmission. Researchers have developed many concepts to execute image encryption like chaos theory, data encryption standard (DES), image filtering technology, advanced encryption standard (AES), neural network-based image encryption, DNA coding, fractional Fourier transforms, quantum theory, and compressive sensing. In the late years, additional scholars have focused on executing chaos theory in image encryption schemes due to large key space’s advantages and high-level security. In the project, we have provided a new logic for digital image encryption. This method combines the usage of the logistic map and sine map to create a new chaotic map. By doing this, the randomness, sensitivity and robustness are further increased. The proposed system used row by row and column by column confusion and diffusion mechanisms, which increases the security multi-fold. Unlike conventional methods, this method uses scrambling pixels from their actual rows and columns and applies bit-level manipulation to each pixel. This disrupts the interrelationship between adjacent pixels of the ciphered image. Further, the security and simulation analysis show that 1DSP-1E has a greater level of reliability than the other encryption schemes