Image encryption based on Logistic-Sine self-embedding chaotic sequence

Jian Wang, Wenjing Jiang, Heming Xu, Xinpei Wu, Junseok Kim

Research output: Contribution to journalArticlepeer-review

6 Citations (Scopus)

Abstract

In this article, for the security of image transmission, we present a novel image encryption algorithm based on Logistic-Sine self-embedding (LSSE) chaotic sequence. Firstly, we verify the effectiveness and superiority of the chaotic map by using a variety of indicators such as the Lyapunov exponent, bifurcation diagram, and 0-1 test. The chaotic key is combined with Arnold scrambling transformation to scramble the image, to break the high correlation between image pixels. Then, the image is diffused based on LSSE. The robustness and effectiveness of the proposed method are verified by various computational tests, and the scheme is analyzed using the performance indicators of histogram distribution, correlation, key sensitivity, attack test, and comparison with other algorithms. The computational experiments show that the algorithm has excellent performance and adequate security.

Original languageEnglish
Article number170075
JournalOptik
Volume271
DOIs
Publication statusPublished - 2022 Dec

Bibliographical note

Funding Information:
The first author Jian Wang expresses thanks for The Startup Foundation for Introducing Talent of NUIST , and Jiangsu shuangchuang project ( JSSCBS20210473 ). The corresponding author (J.S. Kim) was supported by Korea University Grant. The authors would like to thank the reviewers for their comments regarding the revision of this article.

Publisher Copyright:
© 2022 Elsevier GmbH

Keywords

  • Chaotic sequence
  • Diffusion
  • Image encryption
  • LSSE
  • Scrambling

ASJC Scopus subject areas

  • Electronic, Optical and Magnetic Materials
  • Atomic and Molecular Physics, and Optics
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Image encryption based on Logistic-Sine self-embedding chaotic sequence'. Together they form a unique fingerprint.

Cite this