A fast hybrid image cryptosystem based on random generator and modified logistic map

This paper demonstrates an image encryption technique using a hybrid method. This method consists of two stages. The image is XORed with the Pseudo-Random Number Generator (PRNG) in the first stage. The confusion and diffusion processes are applied by using the Logistic map and its’ three modificati...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Multimedia tools and applications 2019-06, Vol.78 (12), p.16177-16193
Hauptverfasser: Hemdan, Ayman M., Faragallah, Osama S., Elshakankiry, Osama, Elmhalaway, Ahmed
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 16193
container_issue 12
container_start_page 16177
container_title Multimedia tools and applications
container_volume 78
creator Hemdan, Ayman M.
Faragallah, Osama S.
Elshakankiry, Osama
Elmhalaway, Ahmed
description This paper demonstrates an image encryption technique using a hybrid method. This method consists of two stages. The image is XORed with the Pseudo-Random Number Generator (PRNG) in the first stage. The confusion and diffusion processes are applied by using the Logistic map and its’ three modifications in the second stage. The original Logistic map has a small range of key-space. The three modifications of Logistic map increased key-space range due to expanding the range of the original Logistic map parameter. Multiple tests have been performed on the hybrid method such as security analysis and encryption quality. The hybrid method presented a good evaluation.
doi_str_mv 10.1007/s11042-018-6948-7
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2156282651</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2156282651</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-cdc0c1025a12380be679bdb376fadbec5f3532471303568deb3321433bd5a3953</originalsourceid><addsrcrecordid>eNp1kE1LAzEQhoMoWKs_wFvAczSTbJLtsRS_oOClnkO-dt3S3azJ9rD_3pQKnjzNDDzvOzMvQvdAH4FS9ZQBaMUIhZrIVVUTdYEWIBQnSjG4LD2vKVGCwjW6yXlPKUjBqgXarXFj8oS_Zps6j7vetAG7NI9TzHOeQo-tycHjOOBkBh973IYhJDPFhMuM--i7pivAIbZdnjqHezPeoqvGHHK4-61L9PnyvNu8ke3H6_tmvSWOg5yI8446oEwYYOU8G6RaWW-5ko3xNjjRcMFZpYBTLmTtg-WcQcW59cLwleBL9HD2HVP8PoY86X08pqGs1AyEZDWTAgoFZ8qlmHMKjR5T-TPNGqg-hafP4ekSnj6Fp1XRsLMmF3ZoQ_pz_l_0A8iZcYQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2156282651</pqid></control><display><type>article</type><title>A fast hybrid image cryptosystem based on random generator and modified logistic map</title><source>SpringerLink Journals</source><creator>Hemdan, Ayman M. ; Faragallah, Osama S. ; Elshakankiry, Osama ; Elmhalaway, Ahmed</creator><creatorcontrib>Hemdan, Ayman M. ; Faragallah, Osama S. ; Elshakankiry, Osama ; Elmhalaway, Ahmed</creatorcontrib><description>This paper demonstrates an image encryption technique using a hybrid method. This method consists of two stages. The image is XORed with the Pseudo-Random Number Generator (PRNG) in the first stage. The confusion and diffusion processes are applied by using the Logistic map and its’ three modifications in the second stage. The original Logistic map has a small range of key-space. The three modifications of Logistic map increased key-space range due to expanding the range of the original Logistic map parameter. Multiple tests have been performed on the hybrid method such as security analysis and encryption quality. The hybrid method presented a good evaluation.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-018-6948-7</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Computer Communication Networks ; Computer Science ; Cryptography ; Data Structures and Information Theory ; Encryption ; Generators ; Information technology ; Multimedia ; Multimedia Information Systems ; Pseudorandom ; Random numbers ; Special Purpose and Application-Based Systems</subject><ispartof>Multimedia tools and applications, 2019-06, Vol.78 (12), p.16177-16193</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2018</rights><rights>Multimedia Tools and Applications is a copyright of Springer, (2018). All Rights Reserved.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-cdc0c1025a12380be679bdb376fadbec5f3532471303568deb3321433bd5a3953</citedby><cites>FETCH-LOGICAL-c316t-cdc0c1025a12380be679bdb376fadbec5f3532471303568deb3321433bd5a3953</cites><orcidid>0000-0001-6020-2630</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-018-6948-7$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-018-6948-7$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Hemdan, Ayman M.</creatorcontrib><creatorcontrib>Faragallah, Osama S.</creatorcontrib><creatorcontrib>Elshakankiry, Osama</creatorcontrib><creatorcontrib>Elmhalaway, Ahmed</creatorcontrib><title>A fast hybrid image cryptosystem based on random generator and modified logistic map</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>This paper demonstrates an image encryption technique using a hybrid method. This method consists of two stages. The image is XORed with the Pseudo-Random Number Generator (PRNG) in the first stage. The confusion and diffusion processes are applied by using the Logistic map and its’ three modifications in the second stage. The original Logistic map has a small range of key-space. The three modifications of Logistic map increased key-space range due to expanding the range of the original Logistic map parameter. Multiple tests have been performed on the hybrid method such as security analysis and encryption quality. The hybrid method presented a good evaluation.</description><subject>Algorithms</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Cryptography</subject><subject>Data Structures and Information Theory</subject><subject>Encryption</subject><subject>Generators</subject><subject>Information technology</subject><subject>Multimedia</subject><subject>Multimedia Information Systems</subject><subject>Pseudorandom</subject><subject>Random numbers</subject><subject>Special Purpose and Application-Based Systems</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp1kE1LAzEQhoMoWKs_wFvAczSTbJLtsRS_oOClnkO-dt3S3azJ9rD_3pQKnjzNDDzvOzMvQvdAH4FS9ZQBaMUIhZrIVVUTdYEWIBQnSjG4LD2vKVGCwjW6yXlPKUjBqgXarXFj8oS_Zps6j7vetAG7NI9TzHOeQo-tycHjOOBkBh973IYhJDPFhMuM--i7pivAIbZdnjqHezPeoqvGHHK4-61L9PnyvNu8ke3H6_tmvSWOg5yI8446oEwYYOU8G6RaWW-5ko3xNjjRcMFZpYBTLmTtg-WcQcW59cLwleBL9HD2HVP8PoY86X08pqGs1AyEZDWTAgoFZ8qlmHMKjR5T-TPNGqg-hafP4ekSnj6Fp1XRsLMmF3ZoQ_pz_l_0A8iZcYQ</recordid><startdate>20190630</startdate><enddate>20190630</enddate><creator>Hemdan, Ayman M.</creator><creator>Faragallah, Osama S.</creator><creator>Elshakankiry, Osama</creator><creator>Elmhalaway, Ahmed</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0001-6020-2630</orcidid></search><sort><creationdate>20190630</creationdate><title>A fast hybrid image cryptosystem based on random generator and modified logistic map</title><author>Hemdan, Ayman M. ; Faragallah, Osama S. ; Elshakankiry, Osama ; Elmhalaway, Ahmed</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-cdc0c1025a12380be679bdb376fadbec5f3532471303568deb3321433bd5a3953</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Algorithms</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Cryptography</topic><topic>Data Structures and Information Theory</topic><topic>Encryption</topic><topic>Generators</topic><topic>Information technology</topic><topic>Multimedia</topic><topic>Multimedia Information Systems</topic><topic>Pseudorandom</topic><topic>Random numbers</topic><topic>Special Purpose and Application-Based Systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hemdan, Ayman M.</creatorcontrib><creatorcontrib>Faragallah, Osama S.</creatorcontrib><creatorcontrib>Elshakankiry, Osama</creatorcontrib><creatorcontrib>Elmhalaway, Ahmed</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Access via ABI/INFORM (ProQuest)</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hemdan, Ayman M.</au><au>Faragallah, Osama S.</au><au>Elshakankiry, Osama</au><au>Elmhalaway, Ahmed</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A fast hybrid image cryptosystem based on random generator and modified logistic map</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2019-06-30</date><risdate>2019</risdate><volume>78</volume><issue>12</issue><spage>16177</spage><epage>16193</epage><pages>16177-16193</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>This paper demonstrates an image encryption technique using a hybrid method. This method consists of two stages. The image is XORed with the Pseudo-Random Number Generator (PRNG) in the first stage. The confusion and diffusion processes are applied by using the Logistic map and its’ three modifications in the second stage. The original Logistic map has a small range of key-space. The three modifications of Logistic map increased key-space range due to expanding the range of the original Logistic map parameter. Multiple tests have been performed on the hybrid method such as security analysis and encryption quality. The hybrid method presented a good evaluation.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-018-6948-7</doi><tpages>17</tpages><orcidid>https://orcid.org/0000-0001-6020-2630</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1380-7501
ispartof Multimedia tools and applications, 2019-06, Vol.78 (12), p.16177-16193
issn 1380-7501
1573-7721
language eng
recordid cdi_proquest_journals_2156282651
source SpringerLink Journals
subjects Algorithms
Computer Communication Networks
Computer Science
Cryptography
Data Structures and Information Theory
Encryption
Generators
Information technology
Multimedia
Multimedia Information Systems
Pseudorandom
Random numbers
Special Purpose and Application-Based Systems
title A fast hybrid image cryptosystem based on random generator and modified logistic map
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T14%3A26%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20fast%20hybrid%20image%20cryptosystem%20based%20on%20random%20generator%20and%20modified%20logistic%20map&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Hemdan,%20Ayman%20M.&rft.date=2019-06-30&rft.volume=78&rft.issue=12&rft.spage=16177&rft.epage=16193&rft.pages=16177-16193&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-018-6948-7&rft_dat=%3Cproquest_cross%3E2156282651%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2156282651&rft_id=info:pmid/&rfr_iscdi=true