Secure Image Encryption using Two Dimensional Logistic Map
* Gangadhar Tiwari1, Debashis Nandi2, Abhishek Kumar3, Madhusudhan Mishra4 1, 2Department of Information Technology, NIT Durgapur (W.B.), India 3Department of Electronics and Electrical Engineering, NITAP, (A.P.), India 4Department of Electronics and Communication Engineering, NERIST, (A.P.), India
DC MACHINE-Motoring and generation, Armature circuit equation
P1151351311
1. Secure Image Encryption using Two Dimensional
Logistic Map
* Gangadhar Tiwari1, Debashis Nandi2, Abhishek Kumar3, Madhusudhan Mishra4 1,
2Department of Information Technology, NIT Durgapur (W.B.), India 3Department of
Electronics and Electrical Engineering, NITAP, (A.P.), India 4Department of Electronics and
Communication Engineering, NERIST, (A.P.), India
1www.icgst.com
http://www.icgst.com/paper.aspx?pid=P1151351311
2. Current researches in image encryption techniques suggest using chaotic systems.
But, one-dimensional (1D) chaotic schemes have drawbacks like small key space
and weak security. This paper proposes a novel chaotic image encryption scheme
based on two-dimensional (2D) logistic map. The 2D logistic map has more
complex chaotic behaviors with respect to 1D logistic map like basin structures
and attractors. The proposed scheme is based on permutation-substitution
network and offers good confusion and diffusion properties in stream and block
ciphers both. It encrypts plaintext image into random-like ciphertext image by
generating the pseudorandom sequences from logistic map. The key schedule
algorithm translates a binary encryption key to initial values and system
parameters used in the 2D logistic map. This scheme uses 256 bit long cipher key
for encryption/decryption. Experimental result indicates that the proposed
scheme is secure against known cryptanalytic attacks and offers superior
performance compared to existing chaotic image encryption schemes.
2www.icgst.com
http://www.icgst.com/paper.aspx?pid=P1151351311
Secure Image Encryption using Two Dimensional Logistic Map
Abstract
3. 3www.icgst.com
Mr. Gangadhar Tiwari completed B.Sc.(Mathematics) from Guwahati University,
Guwahati in 2006 and M.Sc.(Information Technology) from Punjab Technical
University,Jalandhar in 2011. Currently, he is pursuing PhD at NIT Durgapur, India.His
research interests include Information Security and Digital Image Processing.
NIT Durgapur
http://www.nitdgp.ac.in/
4. 4www.icgst.com
Dr. Debashis Nandi received his BE degree in Electronics and Communication
Engineering from RE College, Durgapur (University of Burdwan), India, in 1994 and M.
Tech. Degree from Burdwan University on Microwave Engineering in 1997. He
received his PhD degree from IIT, Kharagpur, India on Medical Imaging Technology.
His area of research includes Computer security and cryptography, Secure chaotic
communication, Video coding. He is an Associate Professor in the Department of
Information Technology, NIT, Durgapur, India.
NIT Durgapur
http://www.nitdgp.ac.in/
5. 5www.icgst.com
Mr. Abhishek Kumar received his B.Tech degree in Electrical and Electronics
Engineering from Pondicherry University in 2009 and M.Tech degree in Power System
Engineering from North Eastern Regional Institute of Science and Technology, India in
the 2012.He is currently working as an Assistant Professor with Department of
Electrical & Electronics Engineering, National Institute of Technology, Arunachal
Pradesh, India.
National Institute of Technology, Arunachal
Prades
http://www.nitap.in/
6. 6www.icgst.com
Mr. Madhusudhan Mishra has completed his B.Tech in Electronics and
Communication Engineering from North Eastern Regional Institute of Science and
Technology (NERIST), Nirjuli, Arunachal Pradesh in 2004 and M.Tech in Signal
Processing from IIT Guwahati in 2011. He worked in Sankara Institute of Technology,
Kukas, Jaipur for some years and joined NERIST as Assistant Professor in 2006. His
main interest of research area includes Digital Signal and Image Processing.
National Institute of Technology, Arunachal
Prades
http://www.nitap.in/