ISSN 2278-9723
 

- 


An improved RSA image encryption algorithm using 1-D logistic map

Yakubu1 H. J., Aboiyar2 T., Zirra3 P. B..

Abstract
The need to have a more secured ways of protecting sensitive images in this modern age of technology has become necessary for ensuring that such images sent via the insecure public network called the Internet are protected from attacks. To this end, various image encryption algorithms have been proposed by many researchers and RSA image encryption algorithm is one of them. Studies on RSA image encryption algorithm reveal that some images when encrypted using the algorithm, gives encrypted images that do expose some features of the plain images on visual inspection no matter the size of primes used. This is due to the fact that digital images have high redundancy and high correlation of image data that make RSA algorithm image dependent. Cryptanalysis has been a major source of concern (in particular the brute-force attack) when designing a cryptosystem since it is assumed that the cryptanalyst knows exactly the design and working of the cryptosystem under study except the secret key. Thus, making the secret key access much more difficult to the cryptanalyst makes the encryption algorithm a more reliable one. In view of these, an improved RSA image encryption algorithm using 1-D logistic map was proposed. The proposed scheme has two stages. In the first stage, the plain-image is shuffled using the chaotic properties of the map and in the second stage; the shuffled image is encryption using the RSA algorithm. The proposed algorithm and the RSA algorithm were tested on two standard test gray scale images: cameraman.tif and clock.tif using four different set of keys. Security analysis such as histogram analysis and correlation coefficient analysis were also carried out on the results obtained from the two methods. The results of the analysis show that the proposed scheme is more secured and stronger against the brute-force attack ( encrypted image which does not reveals any hint about the plain image to the attacker and also its key space has double: the two primes, initial condition and control parameter) than the RSA image encryption scheme.

Key words: Brute-force attack; Chaos; Cryptanalyst; Image encryption, Public/Private-key,


 
ARTICLE TOOLS
Abstract
PDF Fulltext
How to cite this articleHow to cite this article
Citation Tools
Related Records
 Articles by Yakubu1 H. J.
Articles by Aboiyar2 T.
Articles by Zirra3 P. B.
on Google
on Google Scholar


How to Cite this Article
Pubmed Style

Yakubu H. J., Aboiyar T., Zirra P. B.. An improved RSA image encryption algorithm using 1-D logistic map. . 2016; 4(1): 01-10. doi:10.31838/ijccts/06.01.01


Web Style

Yakubu H. J., Aboiyar T., Zirra P. B.. An improved RSA image encryption algorithm using 1-D logistic map. http://www.ijccts.org/?mno=302643845 [Access: September 20, 2020]. doi:10.31838/ijccts/06.01.01


AMA (American Medical Association) Style

Yakubu H. J., Aboiyar T., Zirra P. B.. An improved RSA image encryption algorithm using 1-D logistic map. . 2016; 4(1): 01-10. doi:10.31838/ijccts/06.01.01



Vancouver/ICMJE Style

Yakubu H. J., Aboiyar T., Zirra P. B.. An improved RSA image encryption algorithm using 1-D logistic map. . (2016), [cited September 20, 2020]; 4(1): 01-10. doi:10.31838/ijccts/06.01.01



Harvard Style

Yakubu H. J., Aboiyar T., Zirra P. B. (2016) An improved RSA image encryption algorithm using 1-D logistic map. , 4 (1), 01-10. doi:10.31838/ijccts/06.01.01



Turabian Style

Yakubu H. J., Aboiyar T., Zirra P. B.. 2016. An improved RSA image encryption algorithm using 1-D logistic map. International Journal of Communication and Computer Technologies, 4 (1), 01-10. doi:10.31838/ijccts/06.01.01



Chicago Style

Yakubu H. J., Aboiyar T., Zirra P. B.. "An improved RSA image encryption algorithm using 1-D logistic map." International Journal of Communication and Computer Technologies 4 (2016), 01-10. doi:10.31838/ijccts/06.01.01



MLA (The Modern Language Association) Style

Yakubu H. J., Aboiyar T., Zirra P. B.. "An improved RSA image encryption algorithm using 1-D logistic map." International Journal of Communication and Computer Technologies 4.1 (2016), 01-10. Print. doi:10.31838/ijccts/06.01.01



APA (American Psychological Association) Style

Yakubu H. J., Aboiyar T., Zirra P. B. (2016) An improved RSA image encryption algorithm using 1-D logistic map. International Journal of Communication and Computer Technologies, 4 (1), 01-10. doi:10.31838/ijccts/06.01.01





Most Viewed Articles
  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • Most Downloaded
  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Most Cited Articles