Abstract: Background: The agenda of secret and secured communication is in the lead list of digital communication schemes. Image encryption
plays a lead role in both spatial and transforms domains. Materials and Methods: In this study, logistic and standard coupled mapping
were employed on a pre and post shuffled image to attain the higher-order cryptic image to convey information between private
nodes. The initial conditions to the maps were generated by a trigonometric function, which will provide sternness against hackers.
Results: To analyse the rigidness of the implemented algorithm, the standard metrics, that is the Unified Average Changing Intensity
(UACI), Number of Pixels Change Rate (NPCR), entropy, correlation values, pixel distribution and histogram tests were estimated. The
results were compared with the existing literature and found to be superior or comparable. Conclusion: First, the key space is 2256, which
is considerably resistive to brute-force attack. Second, the obtained NPCR, entropy, correlation coefficient and UACI values of 99.6901,
7.99, -0.0015 and 33.44, respectively, prove that the proposed method resists statistical and differential attacks. |