Javascript must be enabled to continue!
Digital Image Encryption Using Logistic Map
View through CrossRef
This study focuses on the application of the logistic map algorithm in the Python programming language for digital image encryption and decryption. It investigates the impact of image type, image size, and logistic map parameter values on computational speed, memory usage, encryption, and decryption results. Three image sizes (300px 300px, 500px x 500px, and 1024px x 1024px) are considered in TIFF, JPG, and PNG formats. The digital image encryption and Decryption process utilizes the logistic map algorithm implemented in Python. Various parameter values are tested for each image type and size to analyze encryption and decryption outcomes. The findings indicate that the type of image does not affect memory usage, which remains consistent regardless of image type. However, image type significantly influences the decryption results and computation time. In particular, the TIFF image type exhibits the fastest computation time, with durations of 0.17188 seconds, 0.28125 seconds, and 1.10938 seconds for 300px x 300px, 500px x 500px, and 1024px x 1024px images, respectively. In addition, the encryption results vary depending on the type of image. The logistic map algorithm is unable to restore encryption results accurately for JPG images. Furthermore, research highlights that higher values of x, Mu and Chaos lead to narrower histogram values, resulting in improved encryption outcomes. This study contributes to the field by exploring the application of the logistic map algorithm in Python and analyzing the effects of image type, image size, and Logistic Map parameter values on computation time, memory usage, and digital image encryption and Decryption results. Prior research has not extensively addressed these aspects in relation to the Logistic Map algorithm in Python.
Ikatan Ahli Informatika Indonesia (IAII)
Title: Digital Image Encryption Using Logistic Map
Description:
This study focuses on the application of the logistic map algorithm in the Python programming language for digital image encryption and decryption.
It investigates the impact of image type, image size, and logistic map parameter values on computational speed, memory usage, encryption, and decryption results.
Three image sizes (300px 300px, 500px x 500px, and 1024px x 1024px) are considered in TIFF, JPG, and PNG formats.
The digital image encryption and Decryption process utilizes the logistic map algorithm implemented in Python.
Various parameter values are tested for each image type and size to analyze encryption and decryption outcomes.
The findings indicate that the type of image does not affect memory usage, which remains consistent regardless of image type.
However, image type significantly influences the decryption results and computation time.
In particular, the TIFF image type exhibits the fastest computation time, with durations of 0.
17188 seconds, 0.
28125 seconds, and 1.
10938 seconds for 300px x 300px, 500px x 500px, and 1024px x 1024px images, respectively.
In addition, the encryption results vary depending on the type of image.
The logistic map algorithm is unable to restore encryption results accurately for JPG images.
Furthermore, research highlights that higher values of x, Mu and Chaos lead to narrower histogram values, resulting in improved encryption outcomes.
This study contributes to the field by exploring the application of the logistic map algorithm in Python and analyzing the effects of image type, image size, and Logistic Map parameter values on computation time, memory usage, and digital image encryption and Decryption results.
Prior research has not extensively addressed these aspects in relation to the Logistic Map algorithm in Python.
Related Results
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Abstract
This study examines the use of chaos theory to image encryption by proposing a unique algorithm for image encryption based on two chaotic maps: Arnold’s CatMap and...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map. The mathem...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
A Lightweight Image Encryption Algorithm Based on Chaotic Map and Random Substitution
A Lightweight Image Encryption Algorithm Based on Chaotic Map and Random Substitution
Chaotic-maps-based image encryption methods have been a topic of research interest for a decade. However, most of the proposed methods suffer from slow encryption time or compromis...
Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences
Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences
Abstract
With technological advances, sharing sensitive information, such as multimedia data, especially images, is common. To protect the integrity of such data, advanced ...

