{"title":"A New Pi-based Chaotic Map for Image Encryption","authors":"U. Erkan, A. Toktas, Feyza Toktas","doi":"10.1109/APSIT52773.2021.9641441","DOIUrl":null,"url":null,"abstract":"Novel chaotic map (CM) based on pi number socalled Pi-map is introduced for image encryption scheme (ImES). The chaotic behavior of the Pi-map is appreciated with respect to Lyapunov Exponent (LE) and bifurcation graphs. The LE which is stable and highest is also compared those reported elsewhere. The image encryption performance of Pi-map is corroborated on a simple ImES consisting of only two operations which are permutation and diffusion. The ImES with Pi-map is crypto-studied through various analysis and, they are even crosschecked with the others in the literature. It is shown that ImES is eminent and reliable thanks to the capability of the Pi-map regarding randomness and complexness.","PeriodicalId":436488,"journal":{"name":"2021 International Conference in Advances in Power, Signal, and Information Technology (APSIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference in Advances in Power, Signal, and Information Technology (APSIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APSIT52773.2021.9641441","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Novel chaotic map (CM) based on pi number socalled Pi-map is introduced for image encryption scheme (ImES). The chaotic behavior of the Pi-map is appreciated with respect to Lyapunov Exponent (LE) and bifurcation graphs. The LE which is stable and highest is also compared those reported elsewhere. The image encryption performance of Pi-map is corroborated on a simple ImES consisting of only two operations which are permutation and diffusion. The ImES with Pi-map is crypto-studied through various analysis and, they are even crosschecked with the others in the literature. It is shown that ImES is eminent and reliable thanks to the capability of the Pi-map regarding randomness and complexness.