Image Encryption Based on Chaotic Logistic Map

Authors

  • Mahmoud Hasan College of Information Technology, Alasmarya Islamic University, Zliten – Libya https://orcid.org/0009-0007-5868-1880
  • Adel Eluheshi Department of Electrical Engineering and Computer, Libyan Academy, Tripoli, Libya

Keywords:

Image encryption, Chaotic Logistic Map, XOR operation

Abstract

One of the most efficient methods for ensuring privacy in the digital
world is image encryption. We should facilitate and secure the transfer of private
images from one location to another when sent over a public network, such as
when sending them to be stored on a cloud drive. This paper proposed an algorithm to encrypt and decrypt the images. The approach uses a chaotic logistic
map to generate a keystream and then applies an XOR operation for the encryption and decryption of images. The findings indicate that the proposed technique
is an effective method for image encryption and decryption. We evaluate the metrics for encryption performance analysis: information entropy, histogram analysis, correlation coefficients between plain and cipher images, energy, contrast,
and homogeneity, and the analysis of the key's sensitivity. The results indicate
that the proposed technique demonstrates efficacy.

Downloads

Published

2025-06-30

How to Cite

[1]
M. Hasan and A. . Eluheshi, “Image Encryption Based on Chaotic Logistic Map”, LJI, vol. 2, no. 01, pp. 1–16, Jun. 2025.

Issue

Section

Articles

Categories

#