SlideShare a Scribd company logo
1 of 13
1
Image encryption using
chaotic logistic map
Deepak Kumar Mishra
Department of Computer Science and
Engineering
Ambalika Institute of Management and
Technology Lucknow
2
Outline
 Introduction
 Proposed scheme
 Experimental results
 Conclusions
3
Introduction
Encryption
Decryption
Gray scale image encrypted image
5
Flowchart
Two chaotic
logistic maps
X,Y
Session key
Y’s
value
Block encryption
Secret key
Change
session key
6
Secret key K
 80-bit long , Ki is one 8-bit block of K
 (in hexadecimal)
 Session key: choose three blocks of secret key
 Choose two session keys for two logistic maps
 K4K5K6 for the first logistic map X
 K1K2K3 for the second logistic map Y
20194321 ... kkkkkkK =
K1 K2 K10
Formula
If X(m,n) is a pixel located at (m,n), then the 1th bit
of X(m,n) is :
8
Logistic map
X0 0.3
X1 0.839979
X2 0.537643
X3 0.996915
X4 0.012301
X5 0.048957
X6 0.095869
X7 0.346703
Initial value X0 , 0<= X0 <=1
9
Experimental results
10
Experimental results(2/3)
Encryption
11
Experimental results(3/3)
Comparisons
13
Conclusions
 Useful for real time image encryption
 Secure
 Proposed encryption algorithm can
ensure multiple criteria such as
lossless, minimum distortion,
maximum performance and maximum
speed.

More Related Content

What's hot

Ivan Sahumbaiev "Deep Learning approaches meet 3D data"
Ivan Sahumbaiev "Deep Learning approaches meet 3D data"Ivan Sahumbaiev "Deep Learning approaches meet 3D data"
Ivan Sahumbaiev "Deep Learning approaches meet 3D data"Fwdays
 
Fuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networksFuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networksmourya chandra
 
SIGNATE 国立国会図書館の画像データレイアウト認識 1st place solution
SIGNATE 国立国会図書館の画像データレイアウト認識 1st place solutionSIGNATE 国立国会図書館の画像データレイアウト認識 1st place solution
SIGNATE 国立国会図書館の画像データレイアウト認識 1st place solutionKoji Asami
 
Deep learning @ University of Oradea - part I (16 Jan. 2018)
Deep learning @ University of Oradea - part I (16 Jan. 2018)Deep learning @ University of Oradea - part I (16 Jan. 2018)
Deep learning @ University of Oradea - part I (16 Jan. 2018)Vlad Ovidiu Mihalca
 
Vc term paper-jothi1
Vc term paper-jothi1Vc term paper-jothi1
Vc term paper-jothi1Pankaj Yadav
 
Introduction to object detection
Introduction to object detectionIntroduction to object detection
Introduction to object detectionAmar Jindal
 
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat mapA New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat maptayseer Karam alshekly
 
Apache Spark™ Applications the Easy Way - Pierre Borckmans
Apache Spark™ Applications the Easy Way - Pierre BorckmansApache Spark™ Applications the Easy Way - Pierre Borckmans
Apache Spark™ Applications the Easy Way - Pierre Borckmanssparktc
 
Computer Graphics Modellering engels
Computer Graphics Modellering engelsComputer Graphics Modellering engels
Computer Graphics Modellering engelsChristian Kehl
 
Session II - Estimation methods and accuracy Li-Chun Zhang Discussion: Sess...
Session II - Estimation methods and accuracy   Li-Chun Zhang Discussion: Sess...Session II - Estimation methods and accuracy   Li-Chun Zhang Discussion: Sess...
Session II - Estimation methods and accuracy Li-Chun Zhang Discussion: Sess...Istituto nazionale di statistica
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
Assignment premier academic writing agency with industry
Assignment premier academic writing agency with industry Assignment premier academic writing agency with industry
Assignment premier academic writing agency with industry Nicole Valerio
 
B.Sc.IT: Semester - VI (October - 2016) [IDOL - Revised Course | Question Paper]
B.Sc.IT: Semester - VI (October - 2016) [IDOL - Revised Course | Question Paper]B.Sc.IT: Semester - VI (October - 2016) [IDOL - Revised Course | Question Paper]
B.Sc.IT: Semester - VI (October - 2016) [IDOL - Revised Course | Question Paper]Mumbai B.Sc.IT Study
 
Pattern learning and recognition on statistical manifolds: An information-geo...
Pattern learning and recognition on statistical manifolds: An information-geo...Pattern learning and recognition on statistical manifolds: An information-geo...
Pattern learning and recognition on statistical manifolds: An information-geo...Frank Nielsen
 
R05410102 finiteelementmethodsincivilengineering
R05410102 finiteelementmethodsincivilengineeringR05410102 finiteelementmethodsincivilengineering
R05410102 finiteelementmethodsincivilengineeringimaduddin91
 
Presentation of my master thesis - Image Processing
Presentation of my master thesis - Image ProcessingPresentation of my master thesis - Image Processing
Presentation of my master thesis - Image ProcessingMichaelRra
 

What's hot (19)

Ivan Sahumbaiev "Deep Learning approaches meet 3D data"
Ivan Sahumbaiev "Deep Learning approaches meet 3D data"Ivan Sahumbaiev "Deep Learning approaches meet 3D data"
Ivan Sahumbaiev "Deep Learning approaches meet 3D data"
 
Fuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networksFuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networks
 
SIGNATE 国立国会図書館の画像データレイアウト認識 1st place solution
SIGNATE 国立国会図書館の画像データレイアウト認識 1st place solutionSIGNATE 国立国会図書館の画像データレイアウト認識 1st place solution
SIGNATE 国立国会図書館の画像データレイアウト認識 1st place solution
 
Deep learning @ University of Oradea - part I (16 Jan. 2018)
Deep learning @ University of Oradea - part I (16 Jan. 2018)Deep learning @ University of Oradea - part I (16 Jan. 2018)
Deep learning @ University of Oradea - part I (16 Jan. 2018)
 
Vc term paper-jothi1
Vc term paper-jothi1Vc term paper-jothi1
Vc term paper-jothi1
 
Introduction to object detection
Introduction to object detectionIntroduction to object detection
Introduction to object detection
 
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat mapA New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
 
Pc 11.3 notes_cross
Pc 11.3 notes_crossPc 11.3 notes_cross
Pc 11.3 notes_cross
 
Apache Spark™ Applications the Easy Way - Pierre Borckmans
Apache Spark™ Applications the Easy Way - Pierre BorckmansApache Spark™ Applications the Easy Way - Pierre Borckmans
Apache Spark™ Applications the Easy Way - Pierre Borckmans
 
Poster venezia
Poster veneziaPoster venezia
Poster venezia
 
Computer Graphics Modellering engels
Computer Graphics Modellering engelsComputer Graphics Modellering engels
Computer Graphics Modellering engels
 
Session II - Estimation methods and accuracy Li-Chun Zhang Discussion: Sess...
Session II - Estimation methods and accuracy   Li-Chun Zhang Discussion: Sess...Session II - Estimation methods and accuracy   Li-Chun Zhang Discussion: Sess...
Session II - Estimation methods and accuracy Li-Chun Zhang Discussion: Sess...
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
Assignment premier academic writing agency with industry
Assignment premier academic writing agency with industry Assignment premier academic writing agency with industry
Assignment premier academic writing agency with industry
 
B.Sc.IT: Semester - VI (October - 2016) [IDOL - Revised Course | Question Paper]
B.Sc.IT: Semester - VI (October - 2016) [IDOL - Revised Course | Question Paper]B.Sc.IT: Semester - VI (October - 2016) [IDOL - Revised Course | Question Paper]
B.Sc.IT: Semester - VI (October - 2016) [IDOL - Revised Course | Question Paper]
 
Pattern learning and recognition on statistical manifolds: An information-geo...
Pattern learning and recognition on statistical manifolds: An information-geo...Pattern learning and recognition on statistical manifolds: An information-geo...
Pattern learning and recognition on statistical manifolds: An information-geo...
 
R05410102 finiteelementmethodsincivilengineering
R05410102 finiteelementmethodsincivilengineeringR05410102 finiteelementmethodsincivilengineering
R05410102 finiteelementmethodsincivilengineering
 
Presentation of my master thesis - Image Processing
Presentation of my master thesis - Image ProcessingPresentation of my master thesis - Image Processing
Presentation of my master thesis - Image Processing
 
Implementation
ImplementationImplementation
Implementation
 

Viewers also liked

Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniqueAncy Mariam Babu
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...Sajid Iqbal
 
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаосМ.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаосProject KRIT
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabMuhammad Saif Ul Islam
 
Chaos Theory: An Introduction
Chaos Theory: An IntroductionChaos Theory: An Introduction
Chaos Theory: An IntroductionAntha Ceorote
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 
What Kind of Institution
What Kind of InstitutionWhat Kind of Institution
What Kind of InstitutionShannon Brown
 
11 le thithuydung.mul1
11 le thithuydung.mul111 le thithuydung.mul1
11 le thithuydung.mul1Dung Le
 
2015 global recruiting trends
2015 global recruiting trends2015 global recruiting trends
2015 global recruiting trendsAndreas Persson
 

Viewers also liked (20)

Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
P1151351311
P1151351311P1151351311
P1151351311
 
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
 
Sacolloq
SacolloqSacolloq
Sacolloq
 
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаосМ.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
 
Logistic map
Logistic mapLogistic map
Logistic map
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on Matlab
 
Chaos Theory
Chaos TheoryChaos Theory
Chaos Theory
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Chaos Theory: An Introduction
Chaos Theory: An IntroductionChaos Theory: An Introduction
Chaos Theory: An Introduction
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
What Kind of Institution
What Kind of InstitutionWhat Kind of Institution
What Kind of Institution
 
Triko Décor
Triko DécorTriko Décor
Triko Décor
 
Cultura china
Cultura chinaCultura china
Cultura china
 
PBDB
PBDBPBDB
PBDB
 
David2013resume
David2013resumeDavid2013resume
David2013resume
 
11 le thithuydung.mul1
11 le thithuydung.mul111 le thithuydung.mul1
11 le thithuydung.mul1
 
2015 global recruiting trends
2015 global recruiting trends2015 global recruiting trends
2015 global recruiting trends
 

Similar to Jammer

Efficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixelsEfficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixelsIOSR Journals
 
Output Primitives in Computer Graphics and Multimedia
Output Primitives in Computer Graphics and MultimediaOutput Primitives in Computer Graphics and Multimedia
Output Primitives in Computer Graphics and Multimediasaranyan75
 
Computer Graphics and Multimedia Output primitives
Computer Graphics and Multimedia Output primitivesComputer Graphics and Multimedia Output primitives
Computer Graphics and Multimedia Output primitivessaranyan75
 
Computer graphics lab report with code in cpp
Computer graphics lab report with code in cppComputer graphics lab report with code in cpp
Computer graphics lab report with code in cppAlamgir Hossain
 
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Editor IJCATR
 
Clustering techniques
Clustering techniquesClustering techniques
Clustering techniquestalktoharry
 
EXTENDED K-MAP FOR MINIMIZING MULTIPLE OUTPUT LOGIC CIRCUITS
EXTENDED K-MAP FOR MINIMIZING MULTIPLE OUTPUT LOGIC CIRCUITSEXTENDED K-MAP FOR MINIMIZING MULTIPLE OUTPUT LOGIC CIRCUITS
EXTENDED K-MAP FOR MINIMIZING MULTIPLE OUTPUT LOGIC CIRCUITSVLSICS Design
 
Enhancement and Analysis of Chaotic Image Encryption Algorithms
Enhancement and Analysis of Chaotic Image Encryption Algorithms Enhancement and Analysis of Chaotic Image Encryption Algorithms
Enhancement and Analysis of Chaotic Image Encryption Algorithms cscpconf
 
Random Chaotic Number Generation based Clustered Image Encryption
Random Chaotic Number Generation based Clustered Image EncryptionRandom Chaotic Number Generation based Clustered Image Encryption
Random Chaotic Number Generation based Clustered Image EncryptionAM Publications
 
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in BlockchainBlockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in BlockchainFerdin Joe John Joseph PhD
 
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdfCD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdfRajJain516913
 
Unit 2
Unit 2Unit 2
Unit 2ypnrao
 
5 DimensionalityReduction.pdf
5 DimensionalityReduction.pdf5 DimensionalityReduction.pdf
5 DimensionalityReduction.pdfRahul926331
 
Output Primitive and Brenshamas Line.pptx
Output Primitive and Brenshamas Line.pptxOutput Primitive and Brenshamas Line.pptx
Output Primitive and Brenshamas Line.pptxNaveenaKarthik3
 
Lecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationLecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationVARUN KUMAR
 
Bca1040 digital logic
Bca1040   digital logicBca1040   digital logic
Bca1040 digital logicsmumbahelp
 

Similar to Jammer (20)

lecture 1.pptx
lecture 1.pptxlecture 1.pptx
lecture 1.pptx
 
Efficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixelsEfficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixels
 
Output Primitives in Computer Graphics and Multimedia
Output Primitives in Computer Graphics and MultimediaOutput Primitives in Computer Graphics and Multimedia
Output Primitives in Computer Graphics and Multimedia
 
Computer Graphics and Multimedia Output primitives
Computer Graphics and Multimedia Output primitivesComputer Graphics and Multimedia Output primitives
Computer Graphics and Multimedia Output primitives
 
Computer graphics lab report with code in cpp
Computer graphics lab report with code in cppComputer graphics lab report with code in cpp
Computer graphics lab report with code in cpp
 
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
 
Clustering techniques
Clustering techniquesClustering techniques
Clustering techniques
 
EXTENDED K-MAP FOR MINIMIZING MULTIPLE OUTPUT LOGIC CIRCUITS
EXTENDED K-MAP FOR MINIMIZING MULTIPLE OUTPUT LOGIC CIRCUITSEXTENDED K-MAP FOR MINIMIZING MULTIPLE OUTPUT LOGIC CIRCUITS
EXTENDED K-MAP FOR MINIMIZING MULTIPLE OUTPUT LOGIC CIRCUITS
 
Enhancement and Analysis of Chaotic Image Encryption Algorithms
Enhancement and Analysis of Chaotic Image Encryption Algorithms Enhancement and Analysis of Chaotic Image Encryption Algorithms
Enhancement and Analysis of Chaotic Image Encryption Algorithms
 
Clustering-beamer.pdf
Clustering-beamer.pdfClustering-beamer.pdf
Clustering-beamer.pdf
 
Random Chaotic Number Generation based Clustered Image Encryption
Random Chaotic Number Generation based Clustered Image EncryptionRandom Chaotic Number Generation based Clustered Image Encryption
Random Chaotic Number Generation based Clustered Image Encryption
 
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in BlockchainBlockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
 
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdfCD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
 
Unit 2
Unit 2Unit 2
Unit 2
 
5 DimensionalityReduction.pdf
5 DimensionalityReduction.pdf5 DimensionalityReduction.pdf
5 DimensionalityReduction.pdf
 
Output Primitive and Brenshamas Line.pptx
Output Primitive and Brenshamas Line.pptxOutput Primitive and Brenshamas Line.pptx
Output Primitive and Brenshamas Line.pptx
 
Lecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationLecture 3 image sampling and quantization
Lecture 3 image sampling and quantization
 
Bca1040 digital logic
Bca1040   digital logicBca1040   digital logic
Bca1040 digital logic
 
Backtraking pic&amp;def
Backtraking pic&amp;defBacktraking pic&amp;def
Backtraking pic&amp;def
 
E33018021
E33018021E33018021
E33018021
 

Jammer