The sophisticated of technology make easy and fast while transfering or saving digital information. There are so many techniques to encrypt data, especially digital image. The algorithm that be use in usually need a long time, although the data was goodly encrypted. But there is better if the encryption time faster with good security. Chaos function can make that possible. Logistic map and Bernoulli map is two of chaos function that can be used on cryptography. This paper will develop new chaotic map, that is composition of Bernoulli map and logistic map, (Bernoulli logistic map) and describe about algorithm digital image encryption using that map. The key sensitivity achieve 10−18 and key space of this algorithm is [(231−1)−b×k×d]×1.6×10634, by b, k, d are measure of row, column, and dimension of the image. It makes hard to break this algorithm by bruteforce attack. Based on test by National Institute of Standards and Technologies (NIST) test, the keystream produced shown to be random. The distribution of pixel intensities is uniform. Moreover, the original digital image and the decrypted digital image from this algorithm is same by PSNR value is ∞.
Skip Nav Destination
,
,
,
,
,
Article navigation
4 January 2023
THE FIRST INTERNATIONAL CONFERENCE ON NEUROSCIENCE AND LEARNING TECHNOLOGY (ICONSATIN 2021)
18–19 September 2021
Jember, Indonesia
Research Article|
January 04 2023
Bernoulli logistic map encryption algorithm for digital image
Indra Bayu Muktyas;
Indra Bayu Muktyas
a)
1)
Mathematics Education Department
, STKIP Surya, Tangerang, 15115, Indonesia
a)Corresponding author: [email protected]
Search for other works by this author on:
Suryadi, M. T.;
Suryadi, M. T.
b)
2)
Faculty of Mathematics and Natural Sciences, Universitas Indonesia
, Depok 16424, Indonesia
Search for other works by this author on:
Mohd Khairul Bazli Mohd Aziz;
Mohd Khairul Bazli Mohd Aziz
c)
3)
Faculty of Industrial Sciences and Technology, Universiti Malaysia Pahang
, 26300 Gambang, Pahang, Malaysia
Search for other works by this author on:
Margaretha Ohyver;
Margaretha Ohyver
d)
4)
Statistics Department, School of Computer Science, Bina Nusantara University
, Jakarta, 11480, Indonesia
Search for other works by this author on:
Syarifah Diana Permai;
Syarifah Diana Permai
e)
4)
Statistics Department, School of Computer Science, Bina Nusantara University
, Jakarta, 11480, Indonesia
Search for other works by this author on:
Samsul Arifin
Samsul Arifin
f)
4)
Statistics Department, School of Computer Science, Bina Nusantara University
, Jakarta, 11480, Indonesia
Search for other works by this author on:
Indra Bayu Muktyas
1,a)
Suryadi, M. T.
2,b)
Mohd Khairul Bazli Mohd Aziz
3,c)
Margaretha Ohyver
4,d)
Syarifah Diana Permai
4,e)
Samsul Arifin
4,f)
1)
Mathematics Education Department
, STKIP Surya, Tangerang, 15115, Indonesia
2)
Faculty of Mathematics and Natural Sciences, Universitas Indonesia
, Depok 16424, Indonesia
3)
Faculty of Industrial Sciences and Technology, Universiti Malaysia Pahang
, 26300 Gambang, Pahang, Malaysia
4)
Statistics Department, School of Computer Science, Bina Nusantara University
, Jakarta, 11480, Indonesia
a)Corresponding author: [email protected]
AIP Conf. Proc. 2679, 020014 (2023)
Citation
Indra Bayu Muktyas, Suryadi, M. T., Mohd Khairul Bazli Mohd Aziz, Margaretha Ohyver, Syarifah Diana Permai, Samsul Arifin; Bernoulli logistic map encryption algorithm for digital image. AIP Conf. Proc. 4 January 2023; 2679 (1): 020014. https://doi.org/10.1063/5.0111255
Download citation file:
Pay-Per-View Access
$40.00
Sign In
You could not be signed in. Please check your credentials and make sure you have an active account and try again.
Citing articles via
The implementation of reflective assessment using Gibbs’ reflective cycle in assessing students’ writing skill
Lala Nurlatifah, Pupung Purnawarman, et al.
Inkjet- and flextrail-printing of silicon polymer-based inks for local passivating contacts
Zohreh Kiaee, Andreas Lösel, et al.
Effect of coupling agent type on the self-cleaning and anti-reflective behaviour of advance nanocoating for PV panels application
Taha Tareq Mohammed, Hadia Kadhim Judran, et al.
Related Content
A cubic map chaos criterion theorem with applications in generalized synchronization based pseudorandom number generator and image encryption
Chaos (May 2015)
A new simple technique for improving the random properties of chaos-based cryptosystems
AIP Advances (March 2018)
Digital color-image encryption scheme based on elliptic curve cryptography ElGamal encryption and 3D Lorenz map
AIP Conf. Proc. (September 2021)
Hybrid cryptosystem enhanced RSA and RC4 chaotic map: A tutorial
AIP Conf. Proc. (October 2024)
A novel image encryption/decryption scheme based on integrating multiple chaotic maps
AIP Advances (July 2020)