Abstract
Background: Image security is a major concern in the digital communication media. So there are so many algorithms symmetric and asymmetric are available for securely transmit the image. In symmetric key algorithm many algorithms are available based on bit plane decomposition and random scrambling using chaotic maps.
Objective: A secure image encryption algorithm is proposed based on the combination of (n, k, p) gray code and chaotic logistic map to improve the performance of decomposition encryption methods.
Methods: We suggest a new algorithm that improves the security of image encryption based on (n, k, p) gray code and bit plane decomposition method. This new encryption technique uses the bit plane decomposition of (n, k, p) gray code then random scrambling of each bit plane and chaotic logistic by map using pixel substitution method.
Results: The performance and security of proposed algorithm have been analyzed on different evaluation metrics like MSE, PSNR, UAIC and NPCR and Correlation Coefficient etc. The experimental results show that the proposed algorithm is secure and provides better results from the XOR based substitution method.
Conclusion: This new method can be utilized in imaging systems like tomography images of medical field, tele-medicine and digital video, video conferencing in communication system. Further, we will study to enhance and examine the execution of (n, k, p) gray code for data hiding and picture de-noising.
Keywords: Image encryption, decomposition of bit plane, random scrambling, (n, k, p) gray code, chaotic logistic map, transformation.
Graphical Abstract
Recent Advances in Computer Science and Communications
Title:A Novel and Secure Image Encryption Scheme Based on Chaotic Logistic Map and Random Scrambling Using a Special Parameter of Gray Code Transformation
Volume: 14 Issue: 2
Author(s): Sudeept S. Yadav*Yashpal Singh
Affiliation:
- Department of Computer Science and Engineering, Bundelkhand Institute of Engineering & Technology, Jhansi- 284128, U.P.,India
Keywords: Image encryption, decomposition of bit plane, random scrambling, (n, k, p) gray code, chaotic logistic map, transformation.
Abstract:
Background: Image security is a major concern in the digital communication media. So there are so many algorithms symmetric and asymmetric are available for securely transmit the image. In symmetric key algorithm many algorithms are available based on bit plane decomposition and random scrambling using chaotic maps.
Objective: A secure image encryption algorithm is proposed based on the combination of (n, k, p) gray code and chaotic logistic map to improve the performance of decomposition encryption methods.
Methods: We suggest a new algorithm that improves the security of image encryption based on (n, k, p) gray code and bit plane decomposition method. This new encryption technique uses the bit plane decomposition of (n, k, p) gray code then random scrambling of each bit plane and chaotic logistic by map using pixel substitution method.
Results: The performance and security of proposed algorithm have been analyzed on different evaluation metrics like MSE, PSNR, UAIC and NPCR and Correlation Coefficient etc. The experimental results show that the proposed algorithm is secure and provides better results from the XOR based substitution method.
Conclusion: This new method can be utilized in imaging systems like tomography images of medical field, tele-medicine and digital video, video conferencing in communication system. Further, we will study to enhance and examine the execution of (n, k, p) gray code for data hiding and picture de-noising.
Export Options
About this article
Cite this article as:
Yadav S. Sudeept *, Singh Yashpal , A Novel and Secure Image Encryption Scheme Based on Chaotic Logistic Map and Random Scrambling Using a Special Parameter of Gray Code Transformation, Recent Advances in Computer Science and Communications 2021; 14 (2) . https://dx.doi.org/10.2174/2213275912666190617154236
DOI https://dx.doi.org/10.2174/2213275912666190617154236 |
Print ISSN 2666-2558 |
Publisher Name Bentham Science Publisher |
Online ISSN 2666-2566 |

- Author Guidelines
- Bentham Author Support Services (BASS)
- Graphical Abstracts
- Fabricating and Stating False Information
- Research Misconduct
- Post Publication Discussions and Corrections
- Publishing Ethics and Rectitude
- Increase Visibility of Your Article
- Archiving Policies
- Peer Review Workflow
- Order Your Article Before Print
- Promote Your Article
- Manuscript Transfer Facility
- Editorial Policies
- Allegations from Whistleblowers