79
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

A novel and efficacious use of three-dimensional intertwining logistic map for the security of greyscale images

&
Pages 288-301 | Received 25 Aug 2022, Accepted 07 Dec 2022, Published online: 05 Feb 2023
 

ABSTRACT

A chaos-based security algorithm for images using symmetric keys is presented in this work. The chaotic 3D intertwining logistic map (ILM) is employed in a compact and efficacious way in the proposed work. The three chaotic sequences generated by the 3D ILM are utilized in an effective way to confuse and diffuse the original image and form an encrypted image. The dependency of initial key values and the controlling parameters of the 3D ILM on the plain image and 128-bit key stream are promising features. These features significantly increase the security of the proposed encryption method. The simulation outcomes and comparative findings with the existing schemes are favourable and satisfactory, thus support the performance and reliability of the suggested encryption system. In addition, the advantageous and acceptable results of theoretical value tests, key sensitivity results and high key space help to counter different kinds of attacks such as statistical, differential and exhaustive attacks.

Acknowledgements

Authors are extremely grateful to the editors and the anonymous reviewers for their valuable comments and suggestions in improving the overall quality of paper.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Additional information

Notes on contributors

Manzoor A. Lone

Manzoor Ahmad Lone is presently enrolled as sponsored research scholar in Computer Science and Engineering department, NIT, Srinagar (J&K), India. His research interests are Image processing, Image Encryption and Chaos theory.

Shaima Qureshi

Dr. Shaima Qureshi is working as an Associate Professor in the Computer Science and Engineering department, NIT, Srinagar (J&K), India. Her areas of research include Mobile Networks, Algorithms, Machine learning and Image Encryption.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.