UM  > Faculty of Science and Technology
2D Sine Logistic modulation map for image encryption
Hua Z.; Zhou Y.; Pun C.-M.; Chen C.L.P.
Source PublicationInformation Sciences

Because of the excellent properties of unpredictability, ergodicity and sensitivity to their parameters and initial values, chaotic maps are widely used in security applications. In this paper, we introduce a new two-dimensional Sine Logistic modulation map (2D-SLMM) which is derived from the Logistic and Sine maps. Compared with existing chaotic maps, it has the wider chaotic range, better ergodicity, hyperchaotic property and relatively low implementation cost. To investigate its applications, we propose a chaotic magic transform (CMT) to efficiently change the image pixel positions. Combining 2D-SLMM with CMT, we further introduce a new image encryption algorithm. Simulation results and security analysis demonstrate that the proposed algorithm is able to protect images with low time complexity and a high security level as well as to resist various attacks. © 2014 Elsevier Inc. All rights reserved.

Keyword2d Sine Logistic Modulation Map Chaotic Magic Transform Image Encryption
URLView the original
Indexed BySCIE
WOS Research AreaComputer Science
WOS SubjectComputer Science, Information Systems
WOS IDWOS:000347862200004
The Source to ArticleScopus
Fulltext Access
Citation statistics
Cited Times [WOS]:354   [WOS Record]     [Related Records in WOS]
Document TypeJournal article
CollectionFaculty of Science and Technology
Corresponding AuthorZhou Y.
AffiliationUniv Macau, Dept Comp & Informat Sci, Macau 999078, Peoples R China
First Author AffilicationUniversity of Macau
Corresponding Author AffilicationUniversity of Macau
Recommended Citation
GB/T 7714
Hua Z.,Zhou Y.,Pun C.-M.,et al. 2D Sine Logistic modulation map for image encryption[J]. Information Sciences,2014,297:80.
APA Hua Z.,Zhou Y.,Pun C.-M.,&Chen C.L.P..(2014).2D Sine Logistic modulation map for image encryption.Information Sciences,297,80.
MLA Hua Z.,et al."2D Sine Logistic modulation map for image encryption".Information Sciences 297(2014):80.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Hua Z.]'s Articles
[Zhou Y.]'s Articles
[Pun C.-M.]'s Articles
Baidu academic
Similar articles in Baidu academic
[Hua Z.]'s Articles
[Zhou Y.]'s Articles
[Pun C.-M.]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Hua Z.]'s Articles
[Zhou Y.]'s Articles
[Pun C.-M.]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.