Skip to main content
Log in

Generating logistic chaotic sequence using geometric pattern to decompose and recombine the pixel values

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The Secret Sharing Scheme plays a vital role in cryptography which allows to transmit the secret digital information (image, video, audio, handwriting, etc.,) over a communication channel. This cryptographic technique involves encrypting the secret images into noisy shares and transmitted. The transmitted image shares are reconstructed using simple logical computation. In this paper, we propose a secure (n, n)- Multi-Secret-Sharing (MSS) scheme using image scrambling algorithm which is based on the logistic chaotic sequence generated using the secret key which is retrieved from the geometric pattern named as spirograph which drawn by the users with their private values. Also, decomposition and recombination of image pixels which points to change the position and values of the pixels. The experimental results estimate that the standard metrics NPCR, UACI, Entropy, Coefficient Correlation values proves the rigidness of the implemented algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Ahmad M, Shamsher Alam M (2009) A new algorithm of encryption and decryption of images using chaotic mapping. International Journal on computer science and engineering 2(1):46–50

    Google Scholar 

  2. Amin M, Faragallah OS, Abd El-Latif AA (2010) A chaotic block cipher algorithm for image cryptosystems. Commun Nonlinear Sci Numer Simul 15(11):3484–3497

    MathSciNet  MATH  Google Scholar 

  3. Borujeni E, Shahram, Eshghi M (2009) Chaotic image encryption design using Tompkins-Paige algorithm. Math Probl Eng (2009)

  4. El-Latif, Abd AA et al (2011) Image encryption scheme of pixel bit based on combination of chaotic systems. 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE

  5. Han F, Hu J, Xinghuo Y (2006) A biometric encryption approach incorporating fingerprint indexing in key generation. International conference on intelligent computing. Springer, Berlin, Heidelberg, A Biometric Encryption Approach Incorporating Fingerprint Indexing in Key Generation.

  6. Huang X, Ye G, Wong KW (2013) Chaotic image encryption algorithm based on circulant operation. Abstr Appl Anal. Hindawi, 2013

  7. Ismail IA, Amin M, Diab H (2010) A digital image encryption algorithm based a composition of two chaotic logistic maps. IJ Network Security 11.1:1–10

    Google Scholar 

  8. Li B, Jia-wei X (2005) Period of Arnold transformation and its application in image scrambling. J Cent S Univ Technol 12(1):278–282

    Google Scholar 

  9. Lin X-H, Cai L-D (2004) Scrambling research of digital image based on Hilbert curve. Chinese journal of stereology and image analysis 9(4):224–227

    MathSciNet  Google Scholar 

  10. Logeshwari R, Rama Parvathi L (2019) A Quantitative and Qualitative Reasoning of Various Visual Cryptographic Schemes to Uphold Secrecy. International Journal of Innovative Technology and Exploring Engineering 8(11):1148–1151

    Google Scholar 

  11. Loukhaoukha K, Chouinard J-Y, Berdai A (2012) A secure image encryption algorithm based on Rubik's cube principle. Journal of Electrical and Computer Engineering 2012:1–13

    MathSciNet  MATH  Google Scholar 

  12. Prasad M, Sudha KL (2011) Chaos image encryption using pixel shuffling. CCSEA 169–179

  13. Praveenkumar P, Amirtharajan R, Thenmozhi K, Balaguru Rayappan JB (2015) Medical data sheet in safe havens–a tri-layer cryptic solution. Comput Biol Med 62:264–276

    Google Scholar 

  14. Praveenkumar P, Amirtharajan R, Thenmozhi K, Rayappan JBB (2015) Pixel scattering matrix formalism for image encryption—a key scheduled substitution and diffusion approach. AEU-International Journal of Electronics and Communications 69(2):562–572

    Google Scholar 

  15. Praveenkumar P, Amirtharajan R, Thenmozhi K, Rayappan JBB (2015) Triple chaotic image scrambling on RGB–a random image encryption approach. Security and Communication Networks 8(18):3335–3345

    Google Scholar 

  16. Praveenkumar P, Amirtharajan R, Thenmozhi K, Rayappan JBB (2017) Fusion of confusion and diffusion: a novel image encryption approach. Telecommun Syst 65(1):65–78

    Google Scholar 

  17. Rama Parvathi L, Logeshwari R (2019) A Design and Analysis of Geo-Crypto Key Exchange Algorithm for Secure Transmission. International Journal of Recent Technology and Engineering 8:223–226

    Google Scholar 

  18. Ravichandran D, Praveenkumar P, Balaguru Rayappan JB, Amirtharajan R (2016) Chaos based crossover and mutation for securing DICOM image. Comput Biol Med 72:170–184

    Google Scholar 

  19. Shatheesh SI, Devaraj P, Bhuvaneswaran RS (2011) Chaos based image encryption scheme based on enhanced logistic map. International Conference on Distributed Computing and Internet Technology. Springer, Berlin, Heidelberg

  20. Shen J, Jin X, Zhou C (2005) A color image encryption algorithm based on magic cube transformation and modular arithmetic operation. Pacific-Rim conference on multimedia. Springer, Berlin, Heidelberg, A Color Image Encryption Algorithm Based on Magic Cube Transformation and Modular Arithmetic Operation.

  21. Sridevi R et al (2016) Logistic and standard coupled mapping on pre and post shuffled images: a method of image encryption. Asian J Sci Res 10(1):10–23

    Google Scholar 

  22. Steffi AA, Sharma D (2013) Modified algorithm of encryption and decryption of images using chaotic mapping. International Journal of Science and Research (IJSR) 2(2):77–80

    Google Scholar 

  23. Tang Z, Zhang X (2011) Secure image encryption without size limitation using Arnold transform and random strategies. J Multimed 6(2):202

    MathSciNet  Google Scholar 

  24. Wang D, Jin Y (2005) Semi-period of doubly even order magic square transformed digital image. Journal-Zhejiang University-Sciences Edition 32(3):273

    MathSciNet  MATH  Google Scholar 

  25. Ye G (2010) Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn Lett 31(5):347–354

    Google Scholar 

  26. Ye R, Zhao H (2012) An efficient chaos-based image encryption scheme using affine modular maps. International Journal of Computer Network and Information Security 4(7):41–50

    Google Scholar 

  27. Yin-nu SI, Bao-sheng KANG (2008) Digital image scrambling based on improved Arnold transformation. Computer Technology and Development 18(2):74–76

    Google Scholar 

  28. Zhang L, Liao X, Wang X (2005) An image encryption approach based on chaotic maps. Chaos, Solitons Fractals 24(3):759–765

    MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to L. Rama Parvathy.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Logeshwari, R., Rama Parvathy, L. Generating logistic chaotic sequence using geometric pattern to decompose and recombine the pixel values. Multimed Tools Appl 79, 22375–22388 (2020). https://doi.org/10.1007/s11042-020-08957-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08957-9

Keywords

Navigation