Next Article in Journal
A New Recurrence-Network-Based Time Series Analysis Approach for Characterizing System Dynamics
Previous Article in Journal
Approximation of Densities on Riemannian Manifolds
Previous Article in Special Issue
User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks
Article Menu
Issue 1 (January) cover image

Export Article

Open AccessArticle
Entropy 2019, 21(1), 44; https://doi.org/10.3390/e21010044

An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps

1
Department of Statistics and Operations Researches, College of Science, King Saud University, P.O. Box 2455, Riyadh 11451, Saudi Arabia
2
Department of Mathematics, Faculty of Science, Mansoura University, Mansoura 35516, Egypt
3
Computer Science Unit, Deanship of Educational Services, Qassim University, P.O. Box 6595, Buraidah 51452, Saudi Arabia
*
Author to whom correspondence should be addressed.
Received: 26 November 2018 / Revised: 30 December 2018 / Accepted: 31 December 2018 / Published: 9 January 2019
Full-Text   |   PDF [4164 KB, uploaded 11 January 2019]   |  
  |   Review Reports

Abstract

In the literature, there are many image encryption algorithms that have been constructed based on different chaotic maps. However, those algorithms do well in the cryptographic process, but still, some developments need to be made in order to enhance the security level supported by them. This paper introduces a new cryptographic algorithm that depends on a logistic and two-dimensional chaotic economic map. The robustness of the introduced algorithm is shown by implementing it on several types of images. The implementation of the algorithm and its security are partially analyzed using some statistical analyses such as sensitivity to the key space, pixels correlation, the entropy process, and contrast analysis. The results given in this paper and the comparisons performed have led us to decide that the introduced algorithm is characterized by a large space of key security, sensitivity to the secret key, few coefficients of correlation, a high contrast, and accepted information of entropy. In addition, the results obtained in experiments show that our proposed algorithm resists statistical, differential, brute-force, and noise attacks. View Full-Text
Keywords: logistic map; chaotic economic map; image encryption; image decryption; security analysis logistic map; chaotic economic map; image encryption; image decryption; security analysis
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Askar, S.S.; Karawia, A.A.; Al-Khedhairi, A.; Al-Ammar, F.S. An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps. Entropy 2019, 21, 44.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Entropy EISSN 1099-4300 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top