The application of one dimensional (1D) logistic map in information security has been studied for years by the cryptanalyst and recent studies have shown that without improvement on chaotic maps such as the quadratic map and the logistic map that have been studied for the past forty years in securing sensitive images, our applications will remain unchanged and might be subject to different attacks in the future. In view of this, various modified versions of 1D logistic map have been developed for cryptographic applications by many researchers. In this paper, a novel gray scale image encryption algorithm using a modified 1D logistic map was developed and analyzed. The algorithm was simulated using two standard test gray images: Lena and Cameraman. Both images are of size 256 x 256 and stored with TIF file format. Performance analysis using the Histogram Uniformity Analysis, Correlation Coefficient Analysis, Number of Pixel Change Rate (NPCR) and Unified Average Changing Intensity (UACI) were carried out on the proposed scheme. The results obtained from the analysis show that the scheme has proved to resists the known attacks (Statistical, Differential and Brute-force attacks).
Abd El-Samie, E. F. H. Ahmed, E. H. Elashry, F. I. Shahieen, H. M. Faragallah, S.O. El-Rabaie, M. E. and Alshebeili, A. S. Image Encryption-A Communication Perspective, 1st Ed, CRC Press, London, 2014, pp. 1-86.
Abraham, L. and Daniel, N. “Secure Image Encryption Algorithms: A- Review,” International Journal of Scientific and Technology Research, vol.2, (2013), pp. 186 –189.
Alligood, K. T. Sauer, T. D. and Yorke, J. A. Chaos-An Introduction to Dynamical Systems, Springer- Verlag, New York, Inc. USA, 1996, pp. 1-147.
Biswas, R. H. “One Dimensional Chaotic Dynamical System”, Journal of Pure and Applied Mathematics: Advances and Applications, Vol. 10, No. 1, (2013), pp. 69 -101.
Borujeni S. E. and Ehsani, M. S. Modified Logistic Maps for Cryptographic Application, Journal of Applied Mathematics, 2015, No. 6, pp. 773-782.
Cao, Y. “A New Hybrid Chaotic Map and its Application on Image Encryption and Hiding”, Mathematical Problems in Engineering, (2013), 13pp.
Denning, D. E. Cryptography and Data Security, Addison-Wesley Publishing Company Inc. USA, 1982, pp. 1-116.
Gonzalez,R. C. Woods R. E. and Eddins, S. L. Digital Image Processing Using MATLAB. 2ndEdition. USA: Gates mark Publishing-LLC, 2009, pp. 1-85.
Jastrzębski K. and Kotulski, Z. “On Improved Image Encryption Scheme Based on Chaotic Map Lattices,” Engineering Transactions, Vol. 57, (2009), pp. 69-84,.
Kumar, A. and Sharma, R. “A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique,” International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, 2013, pp. 363 – 372.
Lynch, S. Dynamical Systems with Applications Using MATLAB, New York, USA: Springer Science + Business Media, LLC, 2004, pp. 35-68.
McAndrew, A. An Introduction to Digital Image Processing, A Lecture Notes at School of Computer Science and Mathematics, Victoria University of Technology, 2008, Pp. 1-50.
Mishkovski, I. and Kocarev, L. “Chaos- Based Public-key Cryptography,” Springer-Verlag Berlin Heidelberg. SCI 354. 2011, pp 27-65.
Mishra, M. Mishra, P. Adhikary M. C. and Kumar, S. “Image Encryption Using Fibonacci-Lucas Transformation,” International Journal on Cryptography and Information Security, Vol. 2, 2012, pp. 131-141.
Ramadan, N. Ahmed, H. H. Elkhamy, S. E. Abd El-Samie, F. E. “Chaos- Based Image Encryption Using an Improved Quadratic Chaotic Map,” American Journal of Signal Processing, vol. 6, pp. 1-13. 2016.
Solomon, C. and Breckon, T. Fundamentals of Digital Image Processing, UK: John Wiley & Sons Ltd., 2011, pp. 1-81.
Wu, Y. Yang, G. H. Jin, and Noonan, J. P. “Image Encryption Using the Two-Dimensional Logistics Chaotic Map”, Journal of Electronic Imaging, Vol. 21, 2012, 28pp.
Wu, Y. Noonan, J. P. and Agaian, S. “NPCR and UACI Randomness Tests for Image Encryption,” Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunication, pp. 31-38, 2011.
Ye, R. “A Highly Secure Image Encryption Scheme Using Compound Chaotic Maps,” Journal of Emerging Trends in Computing and Information Sciences, vol. 4, pp. 532 – 544,