Javascript must be enabled to continue!
Digital Image Encryption Using Logistic Map
View through CrossRef
This study focuses on the application of the logistic map algorithm in the Python programming language for digital image encryption and decryption. It investigates the impact of image type, image size, and logistic map parameter values on computational speed, memory usage, encryption, and decryption results. Three image sizes (300px 300px, 500px x 500px, and 1024px x 1024px) are considered in TIFF, JPG, and PNG formats. The digital image encryption and Decryption process utilizes the logistic map algorithm implemented in Python. Various parameter values are tested for each image type and size to analyze encryption and decryption outcomes. The findings indicate that the type of image does not affect memory usage, which remains consistent regardless of image type. However, image type significantly influences the decryption results and computation time. In particular, the TIFF image type exhibits the fastest computation time, with durations of 0.17188 seconds, 0.28125 seconds, and 1.10938 seconds for 300px x 300px, 500px x 500px, and 1024px x 1024px images, respectively. In addition, the encryption results vary depending on the type of image. The logistic map algorithm is unable to restore encryption results accurately for JPG images. Furthermore, research highlights that higher values of x, Mu and Chaos lead to narrower histogram values, resulting in improved encryption outcomes. This study contributes to the field by exploring the application of the logistic map algorithm in Python and analyzing the effects of image type, image size, and Logistic Map parameter values on computation time, memory usage, and digital image encryption and Decryption results. Prior research has not extensively addressed these aspects in relation to the Logistic Map algorithm in Python.
Ikatan Ahli Informatika Indonesia (IAII)
Title: Digital Image Encryption Using Logistic Map
Description:
This study focuses on the application of the logistic map algorithm in the Python programming language for digital image encryption and decryption.
It investigates the impact of image type, image size, and logistic map parameter values on computational speed, memory usage, encryption, and decryption results.
Three image sizes (300px 300px, 500px x 500px, and 1024px x 1024px) are considered in TIFF, JPG, and PNG formats.
The digital image encryption and Decryption process utilizes the logistic map algorithm implemented in Python.
Various parameter values are tested for each image type and size to analyze encryption and decryption outcomes.
The findings indicate that the type of image does not affect memory usage, which remains consistent regardless of image type.
However, image type significantly influences the decryption results and computation time.
In particular, the TIFF image type exhibits the fastest computation time, with durations of 0.
17188 seconds, 0.
28125 seconds, and 1.
10938 seconds for 300px x 300px, 500px x 500px, and 1024px x 1024px images, respectively.
In addition, the encryption results vary depending on the type of image.
The logistic map algorithm is unable to restore encryption results accurately for JPG images.
Furthermore, research highlights that higher values of x, Mu and Chaos lead to narrower histogram values, resulting in improved encryption outcomes.
This study contributes to the field by exploring the application of the logistic map algorithm in Python and analyzing the effects of image type, image size, and Logistic Map parameter values on computation time, memory usage, and digital image encryption and Decryption results.
Prior research has not extensively addressed these aspects in relation to the Logistic Map algorithm in Python.
Related Results
Access Denied
Access Denied
Introduction
As social-distancing mandates in response to COVID-19 restricted in-person data collection methods such as participant observation and interviews, researchers turned t...
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
Introduction: With the advent of quantum computing, traditional encryption methods face significant challenges in maintaining security. This study explores quantum information proc...
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Abstract
This study examines the use of chaos theory to image encryption by proposing a unique algorithm for image encryption based on two chaotic maps: Arnold’s CatMap and...
Color Image Encryption Using E0 Keystream Generator with Chaotic Map
Color Image Encryption Using E0 Keystream Generator with Chaotic Map
Development and advancement of technology and the transfer and sending of images over the Internet, it has become necessary to protect images from brute-force attacks. Therefore, o...
Layered Image Encryption Method Based on Combination of Logistic Map, Henon Map, and Sine Map to Enhance Digital Image Security
Layered Image Encryption Method Based on Combination of Logistic Map, Henon Map, and Sine Map to Enhance Digital Image Security
In today's digital era, ensuring the confidentiality of image data is crucial due to the widespread use of images in fields such as medical imaging, military communication, and mul...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map. The mathem...

