Logistic Map with Feedback Control for Resilient Image Encryption
Abstract
Keywords
Full Text:
PDFReferences
[1] F. E. Abd El-Samie et al., Image encryption: a communication perspective. CRC Press, 2013. doi: 10.1201/b16309.
[2] C. E. Shannon, "Communication theory of secrecy systems," The Bell system technical journal, vol. 28, no. 4, pp. 656-715, 1949. doi: 10.1002/j.1538-7305.1949.tb00928.x.
[3] M. Naim and A. Ali Pacha, "A new chaotic satellite image encryption algorithm based on a 2D filter and Fisher–Yates shuffling," The Journal of Supercomputing, vol. 79, no. 15, pp. 17585-17618, 2023. doi: 10.1007/s11227-023-05346-5.
[4] Q. Zhang and Q. Ding, "Digital image encryption based on advanced encryption standard (AES)," in 2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC), 2015, pp. 1218-1221: IEEE. doi: 10.1109/IMCCC.2015.261.
[5] K. Gopalsamy and P.-X. Weng, "Feedback regulation of logistic growth," International Journal of Mathematics and Mathematical Sciences, vol. 16, pp. 177-192, 1993.
[6] D.-y. WU, "Bifurcation analysis of a discrete Logistic system with feedback control," Chinese Quarterly Journal of Mathematics, vol. 30, no. 1, p. 66, 2015.
[7] W. Alexan, Y.-L. Chen, L. Y. Por, and M. Gabr, "Hyperchaotic maps and the single neuron model: A novel framework for chaos-based image encryption," Symmetry, vol. 15, no. 5, p. 1081, 2023. doi: 10.3390/sym15051081.
[8] N. Iqbal et al., "On the image encryption algorithm based on the chaotic system, dna encoding, and castle," IEEE Access, vol. 9, pp. 118253-118270, 2021. doi: 10.1109/ACCESS.2021.3106028.
[9] H. G. Mohamed, D. H. ElKamchouchi, and K. H. Moussa, "A Novel Color Image Encryption Algorithm Based on Hyperchaotic Maps and Mitochondrial DNA Sequences," Entropy, vol. 22, no. 2, p. 158, 2020. doi: 10.3390/e22020158.
[10] A. A. Neamah and A. A. Shukur, "A Novel Conservative Chaotic System Involved in Hyperbolic Functions and Its Application to Design an Efficient Colour Image Encryption Scheme," Symmetry, vol. 15, no. 8, p. 1511, 2023. doi: 10.3390/sym15081511.
[11] N. Tsafack, J. Kengne, B. Abd-El-Atty, A. M. Iliyasu, K. Hirota, and A. A. Abd EL-Latif, "Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption," Information Sciences, vol. 515, pp. 191-217, 2020. doi: 10.1016/j.ins.2019.10.070.
[12] M. T. Elkandoz, W. Alexan, and H. H. Hussein, "Logistic sine map based image encryption," in 2019 Signal Processing: Algorithms, Architectures, Arrangements, and Applications (SPA), 2019, pp. 290-295: IEEE. doi: 10.23919/SPA.2019.8936718.
[13] A. A. A. El-Latif, B. Abd-El-Atty, A. Belazi, and A. M. Iliyasu, "Efficient chaos-based substitution-box and its application to image encryption," Electronics, vol. 10, no. 12, p. 1392, 2021. doi: 10.3390/electronics10121392.
[14] D. Herbadji, N. Derouiche, A. Belmeguenai, A. Herbadji, and S. Boumerdassi, "A tweakable image encryption algorithm using an improved logistic chaotic map," Traitement du Signal, vol. 36, no. 5, pp. 407-417, 2019. doi: 10.18280/ts.360505.
[15] R. Li, Q. Liu, and L. Liu, "Novel image encryption algorithm based on improved logistic map," IET Image Processing, vol. 13, no. 1, pp. 125-134, 2019. doi : 10.1049/iet-ipr.2018.5900.
[16] Q. Lu, L. Yu, and C. Zhu, "Symmetric image encryption algorithm based on a new product trigonometric chaotic map," Symmetry, vol. 14, no. 2, p. 373, 2022. doi: 10.3390/sym14020373.
[17] Y. Luo, J. Yu, W. Lai, and L. Liu, "A novel chaotic image encryption algorithm based on improved baker map and logistic map," Multimedia Tools and Applications, vol. 78, pp. 22023-22043, 2019. doi: 10.1007/s11042-019-7453-3.
[18] S. Zhu, X. Deng, W. Zhang, and C. Zhu, "Image encryption scheme based on newly designed chaotic map and parallel DNA coding," Mathematics, vol. 11, no. 1, p. 231, 2023. doi: 10.3390/math11010231.
[19] M. Demirtaş, "A novel multiple grayscale image encryption method based on 3D bit-scrambling and diffusion," Optik, vol. 266, p. 169624, 2022. doi: 10.1016/j.ijleo.2022.169624.
[20] M. Akraam, T. Rashid, and S. Zafar, "A chaos-based image encryption scheme is proposed using multiple chaotic maps," Mathematical Problems in Engineering, vol. 2023, 2023. doi : 10.1155/2023/2003724.
[21] J. Arif et al., "A novel chaotic permutation-substitution image encryption scheme based on logistic map and random substitution," IEEE Access, vol. 10, pp. 12966-12982, 2022. doi: 10.1109/ACCESS.2022.3146792.
[22] S. De, J. Bhaumik, and D. Giri, "A secure image encryption scheme based on three different chaotic maps," Multimedia Tools and Applications, vol. 81, no. 4, pp. 5485-5514, 2022. doi: 10.1007/s11042-021-11696-0.
[23] A. Pikovsky and A. Politi, Lyapunov exponents: a tool to explore complex dynamics. Cambridge University Press, 2016. doi: 10.1063/PT.3.3499.
[24] C. Chen, K. Sun, and S. He, "An improved image encryption algorithm with finite computing precision," Signal Processing, vol. 168, p. 107340, 2020. doi: 10.1016/j.sigpro.2019.107340.
[25] J. Liu, D. Yang, H. Zhou, and S. Chen, "A digital image encryption algorithm based on bit-planes and an improved logistic map," Multimedia Tools and Applications, vol. 77, pp. 10217-10233, 2018. doi: 10.1007/s11042-017-5406-2.
[26] Y. Wu, J. P. Noonan, and S. Agaian, "NPCR and UACI randomness tests for image encryption," Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT), vol. 1, no. 2, pp. 31-38, 2011.
[27] P. N. Andono, "Improved Pixel and Bit Confusion-Diffusion Based on Mixed Chaos and Hash Operation for Image Encryption," IEEE Access, vol. 10, pp. 115143-115156, 2022. doi: 10.1109/ACCESS.2022.3218886.
DOI: https://doi.org/10.18860/cauchy.v10i1.30783
Refbacks
- There are currently no refbacks.
Copyright (c) 2025 Mohammad Fahrurrozy, Agus Suryanto

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Editorial Office
Mathematics Department,
Universitas Islam Negeri Maulana Malik Ibrahim Malang
Gajayana Street 50 Malang, East Java, Indonesia 65144
Faximile (+62) 341 558933
e-mail: cauchy@uin-malang.ac.id

CAUCHY: Jurnal Matematika Murni dan Aplikasi is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.








