• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Image Encryption with The Cross Diffusion of Two Chaotic Maps

Vol. 13, No. 2, February 27, 2019
10.3837/tiis.2019.02.031, Download Paper (Free):

Abstract

Information security has become increasingly important with the rapid development of mobile devices and internet. An efficient encryption system is a key to this end. In this paper, we propose an image encryption method based on the cross diffusion of two chaotic maps. We use two chaotic sequences, namely the Logistic map and the Chebyshev map, for key generation which has larger security key space than single one. Moreover, we use these two sequences for further image encryption diffusion which decreases the correlation of neighboring pixels significantly. We conduct extensive experiments on several well-known images like Lena, Baboon, Koala, etc. Experimental results show that our algorithm has the characteristics of large key space, fast, robust to statistic attack, etc.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
G. Jiao, X. Peng and K. Duan, "Image Encryption with The Cross Diffusion of Two Chaotic Maps," KSII Transactions on Internet and Information Systems, vol. 13, no. 2, pp. 1064-1079, 2019. DOI: 10.3837/tiis.2019.02.031.

[ACM Style]
Ge Jiao, Xiaojiang Peng, and Kaiwen Duan. 2019. Image Encryption with The Cross Diffusion of Two Chaotic Maps. KSII Transactions on Internet and Information Systems, 13, 2, (2019), 1064-1079. DOI: 10.3837/tiis.2019.02.031.