Logistic Map with Feedback Control for Resilient Image Encryption

Mohammad Fahrurrozy, Agus Suryanto, Isnani Darti

Abstract


Images are one of many forms used to store important information that is easy to use and share, but they are vulnerable to cyber-attacks. An encryption effort is needed to secure the vital information in an image. In this paper, an encryption and decryption algorithm for grayscale and RGB images is proposed using logistic map with feedback control (LMFC). This 2D map which is an improvement from the popular one-dimensional logistic map also exhibits sensitive dependence on initial conditions, known as chaos. This phenomenon is verified through bifurcation diagram and the largest Lyapunov exponent. By using the largest Lyapunov exponent and the control parameters as secret key, LMFC generates two sequences of pseudo-random number related to the original image. Subsequently, a permutation process is proposed, utilizing permutation box to rearrange the pixel positions in the plain image. Finally, a diffusion process is proposed, utilizing XOR operations and keystreams created from the pseudo-random sequence to alter the pixel values, resulting in a visually distinct cipher image. Performance analysis of the proposed algorithm indicates resilience to various cryptanalysis and robust security, as it is sensitive to both secret keys and plain image. Additionally, the proposed decryption algorithm demonstrates the ability to reconstruct the original image with good quality from a cipher image, despite data changes or losses.

Keywords


chaos, encryption, image, logistic map, Lyapunov exponent

Full Text:

PDF

References


[1] F. E. Abd El-Samie et al., Image encryption: a communication perspective. CRC Press, 2013. doi: 10.1201/b16309.

[2] C. E. Shannon, "Communication theory of secrecy systems," The Bell system technical journal, vol. 28, no. 4, pp. 656-715, 1949. doi: 10.1002/j.1538-7305.1949.tb00928.x.

[3] M. Naim and A. Ali Pacha, "A new chaotic satellite image encryption algorithm based on a 2D filter and Fisher–Yates shuffling," The Journal of Supercomputing, vol. 79, no. 15, pp. 17585-17618, 2023. doi: 10.1007/s11227-023-05346-5.

[4] Q. Zhang and Q. Ding, "Digital image encryption based on advanced encryption standard (AES)," in 2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC), 2015, pp. 1218-1221: IEEE. doi: 10.1109/IMCCC.2015.261.

[5] K. Gopalsamy and P.-X. Weng, "Feedback regulation of logistic growth," International Journal of Mathematics and Mathematical Sciences, vol. 16, pp. 177-192, 1993.

[6] D.-y. WU, "Bifurcation analysis of a discrete Logistic system with feedback control," Chinese Quarterly Journal of Mathematics, vol. 30, no. 1, p. 66, 2015.

[7] W. Alexan, Y.-L. Chen, L. Y. Por, and M. Gabr, "Hyperchaotic maps and the single neuron model: A novel framework for chaos-based image encryption," Symmetry, vol. 15, no. 5, p. 1081, 2023. doi: 10.3390/sym15051081.

[8] N. Iqbal et al., "On the image encryption algorithm based on the chaotic system, dna encoding, and castle," IEEE Access, vol. 9, pp. 118253-118270, 2021. doi: 10.1109/ACCESS.2021.3106028.

[9] H. G. Mohamed, D. H. ElKamchouchi, and K. H. Moussa, "A Novel Color Image Encryption Algorithm Based on Hyperchaotic Maps and Mitochondrial DNA Sequences," Entropy, vol. 22, no. 2, p. 158, 2020. doi: 10.3390/e22020158.

[10] A. A. Neamah and A. A. Shukur, "A Novel Conservative Chaotic System Involved in Hyperbolic Functions and Its Application to Design an Efficient Colour Image Encryption Scheme," Symmetry, vol. 15, no. 8, p. 1511, 2023. doi: 10.3390/sym15081511.

[11] N. Tsafack, J. Kengne, B. Abd-El-Atty, A. M. Iliyasu, K. Hirota, and A. A. Abd EL-Latif, "Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption," Information Sciences, vol. 515, pp. 191-217, 2020. doi: 10.1016/j.ins.2019.10.070.

[12] M. T. Elkandoz, W. Alexan, and H. H. Hussein, "Logistic sine map based image encryption," in 2019 Signal Processing: Algorithms, Architectures, Arrangements, and Applications (SPA), 2019, pp. 290-295: IEEE. doi: 10.23919/SPA.2019.8936718.

[13] A. A. A. El-Latif, B. Abd-El-Atty, A. Belazi, and A. M. Iliyasu, "Efficient chaos-based substitution-box and its application to image encryption," Electronics, vol. 10, no. 12, p. 1392, 2021. doi: 10.3390/electronics10121392.

[14] D. Herbadji, N. Derouiche, A. Belmeguenai, A. Herbadji, and S. Boumerdassi, "A tweakable image encryption algorithm using an improved logistic chaotic map," Traitement du Signal, vol. 36, no. 5, pp. 407-417, 2019. doi: 10.18280/ts.360505.

[15] R. Li, Q. Liu, and L. Liu, "Novel image encryption algorithm based on improved logistic map," IET Image Processing, vol. 13, no. 1, pp. 125-134, 2019. doi : 10.1049/iet-ipr.2018.5900.

[16] Q. Lu, L. Yu, and C. Zhu, "Symmetric image encryption algorithm based on a new product trigonometric chaotic map," Symmetry, vol. 14, no. 2, p. 373, 2022. doi: 10.3390/sym14020373.

[17] Y. Luo, J. Yu, W. Lai, and L. Liu, "A novel chaotic image encryption algorithm based on improved baker map and logistic map," Multimedia Tools and Applications, vol. 78, pp. 22023-22043, 2019. doi: 10.1007/s11042-019-7453-3.

[18] S. Zhu, X. Deng, W. Zhang, and C. Zhu, "Image encryption scheme based on newly designed chaotic map and parallel DNA coding," Mathematics, vol. 11, no. 1, p. 231, 2023. doi: 10.3390/math11010231.

[19] M. Demirtaş, "A novel multiple grayscale image encryption method based on 3D bit-scrambling and diffusion," Optik, vol. 266, p. 169624, 2022. doi: 10.1016/j.ijleo.2022.169624.

[20] M. Akraam, T. Rashid, and S. Zafar, "A chaos-based image encryption scheme is proposed using multiple chaotic maps," Mathematical Problems in Engineering, vol. 2023, 2023. doi : 10.1155/2023/2003724.

[21] J. Arif et al., "A novel chaotic permutation-substitution image encryption scheme based on logistic map and random substitution," IEEE Access, vol. 10, pp. 12966-12982, 2022. doi: 10.1109/ACCESS.2022.3146792.

[22] S. De, J. Bhaumik, and D. Giri, "A secure image encryption scheme based on three different chaotic maps," Multimedia Tools and Applications, vol. 81, no. 4, pp. 5485-5514, 2022. doi: 10.1007/s11042-021-11696-0.

[23] A. Pikovsky and A. Politi, Lyapunov exponents: a tool to explore complex dynamics. Cambridge University Press, 2016. doi: 10.1063/PT.3.3499.

[24] C. Chen, K. Sun, and S. He, "An improved image encryption algorithm with finite computing precision," Signal Processing, vol. 168, p. 107340, 2020. doi: 10.1016/j.sigpro.2019.107340.

[25] J. Liu, D. Yang, H. Zhou, and S. Chen, "A digital image encryption algorithm based on bit-planes and an improved logistic map," Multimedia Tools and Applications, vol. 77, pp. 10217-10233, 2018. doi: 10.1007/s11042-017-5406-2.

[26] Y. Wu, J. P. Noonan, and S. Agaian, "NPCR and UACI randomness tests for image encryption," Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT), vol. 1, no. 2, pp. 31-38, 2011.

[27] P. N. Andono, "Improved Pixel and Bit Confusion-Diffusion Based on Mixed Chaos and Hash Operation for Image Encryption," IEEE Access, vol. 10, pp. 115143-115156, 2022. doi: 10.1109/ACCESS.2022.3218886.




DOI: https://doi.org/10.18860/cauchy.v10i1.30783

Refbacks

  • There are currently no refbacks.


Copyright (c) 2025 Mohammad Fahrurrozy, Agus Suryanto

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Editorial Office
Mathematics Department,
Universitas Islam Negeri Maulana Malik Ibrahim Malang
Gajayana Street 50 Malang, East Java, Indonesia 65144
Faximile (+62) 341 558933
e-mail: cauchy@uin-malang.ac.id

Creative Commons License
CAUCHY: Jurnal Matematika Murni dan Aplikasi is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.