A Study of Period Doubling in Logistic Map for Shift Parameter

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2014 by IJETT Journal
Volume-13 Number-6
Year of Publication : 2014
Authors : H.B.Kekre , Tanuja Sarode , Pallavi N.Halarnkar
  10.14445/22315381/IJETT-V13P256

Citation 

H.B.Kekre , Tanuja Sarode , Pallavi N.Halarnkar. "A Study of Period Doubling in Logistic Map for Shift Parameter", International Journal of Engineering Trends and Technology (IJETT), V13(6),281-286 July 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

Securing Images is very important. The traditional methods available for data security are sometimes not feasible for securing images as images have large amount of data. To secure images chaotic sequences are useful. In this paper the traditional logistic map is shifted, the shifting operation results in a wide range of chaotic sequences, which may be used for encrypting images and making them more robust.

References

[1] Beck, Amy, “Advising undecided students: Lessons from chaos theory”, NACADA Journal 19,1 45-49, 1999.
[2] Chen, C. P., Zhang, T., & Zhou, Y., “Image Encryption Algorithm based on a New Combined Chaotic System”. International Conference on Systems, Man, and Cybernetics (SMC), 2500-2504., 2012
[3] Fan, J. L., & Zhang, X. F., “Image Encryption Algorithm based on Chaotic System”. 7th International Conference on Computer-Aided Industrial Design and Conceptual Design. CAIDCD`06. 1-6., 2006
[4] Garnett, Williams P., “Chaos theory tamed”. Taylor & Francis Ltd., 405, 1997
[5] Gershenson, Carlos “Introduction to chaos in deterministic systems.” Working paper. University of Sussex, Brighton, UK.,2003
[6] Hong, Z., & Ji-xue, D., “Chaos theory and its application in modern cryptography”. International Conference on Computer Application and System Modeling ,ICCASM. 7,. 332-334, 2010
[7] Jian-liang, M., Hui-jing, P., & Wan-qing, G. “New color image encryption algorithm based on chaotic sequences ranking”. International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP`08 , 1348-1351, 2008
[8] Li-Hong, L., Feng-Ming, B., & Xue-Hui, H. “New Image Encryption Algorithm Based on Logistic Map and Hyper-Chaos”. Fifth International Conference on Computational and Information Sciences (ICCIS), 713-716.,2013
[9] Makris, G., & Antoniou, I. “Cryptography with Chaos”. Chaotic Modeling and Simulation (CMSIM), 1, 169-178.,2013
[10] Shou-Dong, L., “A New Color Digital Image Scrambling Algorithm Based on Chaotic Sequence”. International Conference on Computer Science & Service System (CSSS), 922-925., 2012
[11] Wood, C. A. , “Chaos-Based Symmetric Key Cryptosystems”. In other words, 1, 3, 1-9.,2011.
[12] Yanling, W. “ Image scrambling method based on chaotic sequences and mapping”. First International Workshop on Education Technology and Computer Science, ETCS`09. 3, 453-457., 2009.

Keywords
Chaotic, Logistic Map, Period Doubling, Image Encryption.