The sophisticated of technology make easy and fast while transfering or saving digital information. There are so many techniques to encrypt data, especially digital image. The algorithm that be use in usually need a long time, although the data was goodly encrypted. But there is better if the encryption time faster with good security. Chaos function can make that possible. Logistic map and Bernoulli map is two of chaos function that can be used on cryptography. This paper will develop new chaotic map, that is composition of Bernoulli map and logistic map, (Bernoulli logistic map) and describe about algorithm digital image encryption using that map. The key sensitivity achieve 10−18 and key space of this algorithm is [(231−1)−b×k×d]×1.6×10634, by b, k, d are measure of row, column, and dimension of the image. It makes hard to break this algorithm by bruteforce attack. Based on test by National Institute of Standards and Technologies (NIST) test, the keystream produced shown to be random. The distribution of pixel intensities is uniform. Moreover, the original digital image and the decrypted digital image from this algorithm is same by PSNR value is ∞.

1.
Menezes
AJ
,
van Oorschot
PC
,
Vanstone
SA
.
Handbook of Applied Cryptography [Internet]
.
CRC Press
;
2018
. (Discrete Mathematics and Its Applications). Available from: https://books.google.co.id/books?id=YyCyDwAAQBAJ
2.
W S. Cryptography and Network Security: Principles and Practices
. 4th ed.
Upper Saddle River
:
Pearson Prentice Hall
;
2006
.
3.
Arifin
S
,
Bayu Muktyas
I
,
Iswara Sukmawati
K.
 Product of two groups integers modulo m,n and their factor groups using python. In:
Journal of Physics: Conference Series
.
IOP Publishing Ltd
;
2021
.
4.
Kocarev
L
,
Lian
S.
Chaos-based Cryptography: Theory, Algorithms and Applications [Internet]
.
Springer
Berlin Heidelberg
;
2011
. (Studies in Computational Intelligence). Available from: https://books.google.co.id/books?id=GyNwXgkCUMIC
5.
Suryadi
MT
,
Nurpeti
E
,
Widya
D.
Performance of chaos-based encryption algorithm for digital image
.
Telkomnika (Telecommunication Comput Electron Control.
2014
;
12
(
3
):
675
82
.
6.
Pareek
NK
,
Patidar
V
,
Sud
KK
.
Image encryption using chaotic logistic map
.
Image Vis Comput [Internet].
2006
;
24
(
9
):
926
34
. Available from: https://www.sciencedirect.com/science/article/pii/S026288560600103X
7.
Suryadi
MT
,
Satria
Y
,
Hadidulqawi
A.
Implementation of the Gauss-Circle Map for encrypting and embedding simultaneously on digital image and digital text
.
J Phys Conf Ser.
2021
;
1821
(
1
).
8.
Schuster
HG
,
Just
W.
Deterministic Chaos: An Introduction [Internet]
.
Wiley
;
2006
. Available from: https://books.google.co.id/books?id=-14Y2WPfYgsC
9.
Rahman
B
,
Arifin
S
,
Muktyas
I.
All Cyclic Subgroups In Group (Zm x Zn,+) Using Python
.
Int J Sci Technol Res.
2019
;
8
(
9
):
2282
5
.
10.
Abderrahim
NW
,
Benmansour
FZ
,
Seddiki
O.
Integration of chaotic sequences uniformly distributedin a new image encryption algorithm
.
Int J Comput Sci Issues.
2012
;
9
(
2
):
389
94
.
11.
Ye
R
,
Ma
Y.
A Secure and Robust Image Encryption Scheme Based on Mixture of Multiple Generalized Bernoulli Shift Maps and Arnold Maps
.
Int J Comput Netw Inf Secur.
2013
;
5
(
7
):
21
33
.
12.
Alligood
K
,
Sauer
T
,
Yorke
JA
.
Chaos: An Introduction to Dynamical Systems [Internet]
.
Springer
Berlin Heidelberg
;
2012
. (Textbooks in Mathematical Sciences). Available from: https://books.google.co.id/books?id=POPtCAAAQBAJ
13.
Hirsch
M W
,
Smale
S
and
DRL
.
Differential equations, dynamical systems, and an introduction to chaos Pure and Applied Mathematics Series
.
P A
Smith
.
San
Diego
:
Academic Press Inc
.;
2004
.
14.
Gonzalez
RC
,
Woods
RE
.
Digital Image Processing [Internet]. Pearson/Prentice Hall
;
2008
. Available from: https://books.google.co.id/books?id=8uGOnjRGEzoC
15.
Devaney
R.
An Introduction To Chaotic Dynamical Systems [Internet]
.
CRC Press
;
2018
. (Advances in Mathematics and Engineering). Available from: https://books.google.co.id/books?id=8nhQDwAAQBAJ
16.
May
RM
.
Simple mathematical models with very complicated dynamics
.
Nature [Internet].
1976
;
261
(
5560
):
459
67
. Available from:
17.
Muktyas
IB
,
Sulistiawati
,
Arifin
S.
 Digital image encryption algorithm through unimodular matrix and logistic map using Python. In:
AIP Conference Proceedings
.
American Institute of Physics Inc
.;
2021
.
18.
Rukhin
A
,
Soto
J
,
Nechvatal
J.
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
.
Nist Spec Publ [Internet].
2010
;
22
(April):1/1--G/1. Available from: http://csrc.nist.gov/groups/ST/toolkit/rng/documents/SP800-22rev1a.pdf
19.
Rosen
KH
.
Discrete Mathematics and its Applications
. 8th ed.
New York, USA
:
McGraw-Hill Education
;
2019
.
20.
Walpole
RE
,
Myers
RH
,
Myers
SL
,
Ye
K.
Probability & Statistics for Engineers & Scientists: MyStatLab Update [Internet]. Pearson
;
2017
. Available from: https://books.google.co.id/books?id=GQEHwQEACAAJ
21.
Wang
Z
,
Bovik
AC
.
Modern Image Quality Assessment [Internet]
.
Morgan & Claypool Publishers
;
2006
. (Synthesis lectures on image). Available from: https://books.google.co.id/books?id=F6lYVwyZJz4C
22.
Arifin
S
,
Muktyas
IB
. Generate a system of linear equation through unimodular matrix using Python and Latex. In:
AIP Conference Proceedings
.
American Institute of Physics Inc
.;
2021
.
This content is only available via PDF.
You do not currently have access to this content.