Back to Issue

Image Encryption Method based on Chaotic Logistic Map and JAYA Algorithm

Author(s) - Jaspreet Kaur, Puneet Jain, Sarabjeet Kaur, Ajay Kumar

Original Article | Open Access

About Authors

The Chaotic logistic map is the most preferred algorithm for image security. The security of it depends on its parameter values. In the literature, metaheuristic algorithm such as grasshopper optimization algorithm is successfully applied for determined optimal parameter values. However, this algorithm required a number of parameters which increases algorithm complexity. To overcome this limitation, we have used the JAYA algorithm for determining the optimal parameter value of the chaotic logistic map algorithm. JAYA algorithm is not required parameter tuning over other algorithms. Thus, we have selected for the proposed method. Entropy is taken as objective function in the JAYA algorithm. After determining the optimal parameter value, the image is encrypted using chaotic logistic map algorithm. The simulation results are performed in MATLAB for standard dataset images. Further, subjective and objective analysis is done. The result shows the proposed method provides better encryption and superior results over existing methods.

1Research Scholar, Electronics and Communication Engineering Dept., Adesh Institute of Engineering & Technology, Faridkot, Punjab, India.

2Assistant Professor, Electrical Engineering Dept., Adesh Institute of Engineering & Technology, Faridkot, Punjab, India.

3Assistant Professor, Computer Science Engineering Dept., Adesh Institute of Engineering & Technology, Faridkot, Punjab, India.

4Research Scholar, Electronics and Communication Engineering Dept., Thapar Institute of Engineering & Technology, Patiala, Punjab, India.

Chaotic Logistic Map Algorithm, Digital Communication, Image Security, JAYA Algorithm

Published: 01 November 2022

PAPER ID: IRJEEEV1I107221222000007

Pages: 21-29

DOI: 10.55083/cct.irjeee.2022.v01i01007

Journal: IRJEEE, Volume 1, Issue 1






[1] Kaur, M., Singh, S. and Kaur, M., 2021. Computational image encryption techniques: a comprehensive review. Mathematical Problems in Engineering2021.

[2] Xie, Y., Yu, J., Guo, S., Ding, Q. and Wang, E., 2019. Image encryption scheme with compressed sensing based on new three-dimensional chaotic system. Entropy21(9), p.819.

[3] Kaur, M. and Kumar, V., 2020. A comprehensive review on image encryption techniques. Archives of Computational Methods in Engineering27(1), pp.15-43.

[4] Belazi, A., Abd El-Latif, A.A. and Belghith, S., 2016. A novel image encryption scheme based on substitution-permutation network and chaos. Signal Processing128, pp.155-170.

[5] Kaur, M. and Kumar, V., 2018. Adaptive differential evolution-based lorenz chaotic system for image encryption. Arabian Journal for Science and Engineering43(12), pp.8127-8144.

[6] Kaur, M. and Kumar, V., 2018. Beta chaotic map based image encryption using genetic algorithm. International Journal of Bifurcation and Chaos28(11), p.1850132.

[7] Kaur, M., Singh, D., Sun, K. and Rawat, U., 2020. Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map. Future Generation Computer Systems107, pp.333-350.

[8] Wang, X. and Luan, D., 2013. A novel image encryption algorithm using chaos and reversible cellular automata. Communications in Nonlinear Science and Numerical Simulation18(11), pp.3075-3085.

[9] Ghazvini, M., Mirzadi, M. and Parvar, N., 2020. A modified method for image encryption based on chaotic map and genetic algorithm. Multimedia Tools and Applications79(37), pp.26927-26950.

[10] Luo, Y., Ouyang, X., Liu, J., Cao, L. and Zou, Y., 2022. An image encryption scheme based on particle swarm optimization algorithm and hyperchaotic system. Soft Computing26(11), pp.5409-5435.

[11] Khaitan, S., Sagar, S. and Agarwal, R., 2022. Chaos cryptosystem with optimal key selection for image encryption. Multimedia Tools and Applications, pp.1-16.

[12] Zhou, Y., Wang, E., Song, X. and Shi, M., 2022. Image Encryption Algorithm Based on Artificial Bee Colony Algorithm and Chaotic System. Security and Communication Networks2022.

[13] Khalaf, K.S., Sharif, M.A. and Wahhab, M.S., 2022. Digital communication based on image security using grasshopper optimization and chaotic map.

[14] Liu, W., Sun, K. and Zhu, C., 2016. A fast image encryption algorithm based on chaotic map. Optics and Lasers in Engineering84, pp.26-36.

[15] Hua, Z. and Zhou, Y., 2016. Image encryption using 2D Logistic-adjusted-Sine map. Information Sciences339, pp.237-253.

[16] Pareek, N.K., Patidar, V. and Sud, K.K., 2006. Image encryption using chaotic logistic map. Image and vision computing24(9), pp.926-934.

[17] Hassan, M.A.S. and Abuhaiba, I.S.I., 2011. Image encryption using differential evolution approach in frequency domain. arXiv preprint arXiv:1103.5783.

[18] Rao, R., 2016. Jaya: A simple and new optimization algorithm for solving constrained and unconstrained optimization problems. International Journal of Industrial Engineering Computations7(1), pp.19-34.

[19] Wadood, A., Farkoush, S.G., Khurshaid, T., Yu, J.T., Kim, C.H. and Rhee, S.B., 2019. Application of the jaya algorithm in solving the problem of the optimal coordination of overcurrent relays in single-and multi-loop distribution systems. Complexity2019.

[20] Wang, X. and Li, Y., 2021. Chaotic image encryption algorithm based on hybrid multi-objective particle swarm optimization and DNA sequence. Optics and Lasers in Engineering137, p.106393.

Jaspreet Kaur, Puneet Jain, Sarabjeet Kaur, Ajay Kumar. (2022). Image Encryption Method based on Chaotic Logistic Map and JAYA Algorithm. International Research Journal of Electrical & Electronics Engineering  (IRJEEE), Vol.1 Issue 1, pp 21-29.