Skip to main content

Performance Evaluation of Modified Henon Map in Image Encryption

  • Conference paper
  • First Online:
Information Systems Security (ICISS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10063))

Included in the following conference series:

Abstract

The dynamic properties of chaos based algorithm such as large key space, high sensitivity to initial conditions/system parameters, erratic behavior, ergodicity and simplicity make it a novel and an efficient way of evolving chaotic maps that can meet the security requirements. They also exhibit broad array of chaotic regime over a range that can be further enhanced by modifying these maps. In this paper, Henon chaotic map is modified and dynamic behavior of this map is being analyzed through Bifurcation diagram and Lyapunov exponent. The simulation results illustrate that the map has a chaotic regime over an extensive range of system parameters. One of the cryptographic applications of this map in image encryption for different test images is considered. Further, the encryption capability of the algorithm is verified through security analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sam, I.S., Devaraj, P., Bhuvaneswaran, R.S.: A novel image cipher based on mixed transformed logistic maps. Multimedia Tools Appl. 56(2), 315–330 (2012). doi:10.1007/s11042-010-0652-6

    Article  Google Scholar 

  2. Xu, L., Li, Z., Li, J., Hua, W.: A novel bit-level image encryption algorithm based on chaotic maps. Optics Lasers Eng. 78, 17–25 (2016). doi:10.1016/j.optlaseng.2015.09.007

    Article  Google Scholar 

  3. Yaghoobi, M.: A new approach for image encryption using chaotic logistic map. In: IEEE International Conference on Advanced Computer Theory and Engineering, pp. 585–590 (2008). doi:10.1109/ICACTE.2008.177

  4. El-Latif, A.A.A., Li, L., Zhang, T., Wang, N., Song, X., Niu, X.: Digital image encryption scheme based on multiple chaotic systems. Int. J. Sens. Imaging 13(2), 67–88 (2012). doi:10.1007/s11220-012-0071-z

    Article  Google Scholar 

  5. Kocarev, L.: Chaos-based cryptography: a brief overview. IEEE Circuits Syst. Mag. 1(3), 6–21 (2001). doi:10.1109/7384.963463

    Article  Google Scholar 

  6. Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24(9), 926–934 (2006). doi:10.1016/j.imavis.2006.02.021

    Article  Google Scholar 

  7. Sun, F., Liu, S., Li, Z., Lu, Z.: A novel image encryption scheme based on spatial chaos map. Chaos, Solitons Fractals 38(3), 631–640 (2008). doi:10.1016/j.chaos.2008.01.028

    Article  MathSciNet  MATH  Google Scholar 

  8. Henon, M.: A two-dimensional mapping with a strange attractor. Commun. Math. Phys. 50(1), 69–77 (1976). doi:10.1007/BF01608556

    Article  MathSciNet  MATH  Google Scholar 

  9. Soleymani, A., Nordin, M.J., Sundararajan, E.: A chaotic cryptosystem for images based on Henon and Arnold cat map. Sci. World J. (2014). doi:10.1155/2014/536930

    Google Scholar 

  10. Bakhache, B., Ghazal, J.M., El Assad, S.: Improvement of the security of zigbee by a new chaotic algorithm. IEEE Syst. J. 8(4), 1024–1033 (2014). doi:10.1109/JSYST.2013.2246011

    Article  Google Scholar 

  11. Mandal, M.K., Banik, G.D., Chattopadhyay, D., Nandi, D.: An image encryption process based on chaotic logistic map. IETE Tech. Rev. 29(5), 395–404 (2012). doi:10.4103/0256-4602.103173

    Article  Google Scholar 

  12. Huang, C.K., Liao, C.W., Hsu, S.L., Jeng, Y.C.: Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommun. Syst. 52(2), 563–571 (2013). doi:10.1007/s11235-011-9461-0

    Google Scholar 

  13. Huang, X.: Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn. 67(4), 2411–2417 (2012). doi:10.1007/s11071-011-0155-7

    Article  MathSciNet  Google Scholar 

  14. Ye, G., Wong, K.W.: An efficient chaotic image encryption algorithm based on a generalized Arnold map. Nonlinear Dyn. 69(4), 2079–2087 (2012). doi:10.1007/s11071-012-0409-z

    Article  MathSciNet  Google Scholar 

  15. Alligood, K.T., Sauer, T.D., Yorke, J.A.: Chaos: An Introduction to Dynamic systems. Textbooks in Mathematical Sciences. Springer, NewYork (1997)

    Book  MATH  Google Scholar 

  16. Zhu, C.: A novel image encryption scheme based on improved hyperchaotic sequences. Optics Commun. 285(1), 29–37 (2012). doi:10.1016/j.optcom.2011.08.079

    Article  Google Scholar 

  17. Wang, Z., Bovik, A.C.: A universal image quality index. IEEE Sign. Proces. Lett. 9(3), 81–84 (2002). doi:10.1109/97.995823

    Article  Google Scholar 

  18. Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Proces. 13(4), 600–612 (2004). doi:10.1109/TIP.2003.819861

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. J. Sheela .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Sheela, S.J., Suresh, K.V., Tandur, D. (2016). Performance Evaluation of Modified Henon Map in Image Encryption. In: Ray, I., Gaur, M., Conti, M., Sanghi, D., Kamakoti, V. (eds) Information Systems Security. ICISS 2016. Lecture Notes in Computer Science(), vol 10063. Springer, Cham. https://doi.org/10.1007/978-3-319-49806-5_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49806-5_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49805-8

  • Online ISBN: 978-3-319-49806-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics