SlideShare a Scribd company logo
1 of 8
Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications
14
A New Approach of Colour Image Encryption Based on Henon
like Chaotic Map
Ramesh Kumar yadava#
, Dr. B. K.singh*, S.K.sinha*, K. K.pandey*
, #
#
Department of computer science and engineering, AISECT University BHOPAL
1
mailramesh28@gmail.com
3
third.author@first-third.edu
*
AISECT UNIVERSITY
Mendua, Bhojpur Raisen Bhopal INDIA
2
skrishna24it@gmail.com
Abstract
In modern era of digital world, exchange of information in form of image often very frequently over
communication channel, the secrecy of multimedia data like images becomes very important, The issue of
secrecy for image resolved In many digital applications such as sensitive visual aids, broadcasting, military
services, rare satellites images and confidential medical images etc. To reduce the processing overhead with the
concern of Real-time data transmission application, to reduce such a huge file processing cost, we needs to
enhance our encryption/decryption techniques. This paper proposed a novel image encryption technique based
on Hannon like chaotic map. Chaos-based image encryption technique is one of the more promising encryption
algorithms that provide very efficient and fast way of image encryption due to its ubiquitous phenomenon in
deterministic nonlinear systems that exhibit extreme sensitivity to initial condition and random like behaviours.
Keywords— Image RGB colour component, image encryption, Henon map, chaotic system.
I. INTRODUCTION
Encryption is a common technique to uphold multimedia image security in storage and transmission over the
network due to some inherent features of image like high data redundancy and bulk data capacity. The
encryption of image differs from that of text. With the development of multimedia technology the transmission
of information as image and video is extensively used in real time data transmission. The digital image is widely
used in our lives to resolve in many applications such as Geoinformation system, military image database,
medical imaging system etc. for secure transmission of data, there is prime concern to provide security to these
multimedia data, resulting in encryption of data. Most of conventional algorithm does not have the efficient
capability for securing multimedia data containing image due to the complexity of algorithm and perfect
correlation between pixel values of image. Several reviews has been proposed on multimedia data protection
such as information hiding which include steganography, anonymity, watermarking. The other is encryption
which includes conventional encryption technique. Last some decade relatively new approach has been
extensively used, namely chaos based selective image encryption which provides relatively sufficient security
and confidentiality. A symmetric block encryption algorithm creates a chaotic map used for permuting and
diffusing multimedia image data. In permutation the pixel of image are replaced by another value and in the
process of diffusion the pixel values are shuffled within the image. This paper proposed a colour image
encryption technique which is very simple in implementation with high level of efficiency, which is based on
Henon chaotic system. Henon map is a discrete time dynamic system which exhibit chaotic behaviour which we
used to produce a uniform distribution of pixels of image. In proposed method we take a bit stream of RGB
component of colour image which is the input for the Encryption algorithm. The rest or this paper is organized as
follows. Section 2 describes the feature of chaos. Section 3 explains Henon map and its implementation. Section
4 present Encryption and decryption algorithm. Section 5 describes the experimental result to show the proof of
robust algorithm. Section 6 shows the simulation analysis of security through Mat Lab. Section 7 concludes the
paper.
II. FEATURE OF CHAOS
Chaos is a ubiquitous phenomenon existing in deterministic nonlinear systems that exhibit sensitivity to initial
conditio and have random like behaviour. Mathematically one dimensional chaos map can be represented as:
Xp+1 = f (Xp), f: I → I, Xo ε I,
Where f is a continuous map on the interval I = [0, 1].
With the following propriety:
1. Sensitive to initial condition this sensitivity property is utilized for the keys of cryptosystems..
Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications
15
2. Topological transitivity which linked to the diffusion feature of cryptosystem.
3. Density of periodic points in I.
Above two properties often used to construct stream cipher and block cipher in chaotic cryptography. Because
the property of sensitivity of initial condition make the encryption very complicated. Sequence is also
sensitive to control parameter. For image encryption chaotic system can be represented by Fig 1. The initial
value of chaotic map takes the original image as input, sequence of bit provided by user mapped as control
parameter. Output chaotic sequence produces the cipher image.
Fig. 1. Basic architecture of chaotic map
Small change in input bit stream produce a huge change in output bit stream after multiple round. Slight change
of user key also produces totally different output sequence of bit stream.
III. HENON CHAOTIC MAP
The map was introduced by Michel Henon as a simplified model of the Poincare section of the Lorenz model.
For the canonical map, an initial point of the plane will either approach a set of points known as the Henon
strange attractor, or diverge to infinity. Two dimensional Henon map takes a point (Xn, Yn) in the plane and
maps it to a new point:
Xn+1 = Yn + 1 – aX
2
n
Yn+1 = bXn where a > 0 and |b| < 1, n = 0, 1, 2…
Henon Map depends on two parameter a and b. these parameter values determine the chaotic behaviour of map.
The
Most representative form of Henon map for canonical constant values a = 1.4 and b = 0.3 as we can see in Fig. 2.
In which The Henon map reflects as chaotic attractor. The propose colour image encryption is based on Henon
chaotic map, Henon like mapping used sin function which include a frequency control parameter w for
maintaining their chaotic behaviour . The Henon like mapping equation which used in our present image
encryption technique is a mathematical concept, where time dependency of any point determines by the fixed
prescribed rule in geometrical space. In our proposed encryption technique we used Henon like chaotic map
mathematically defined as
Xn+2 = 1 – aX
2
n+1 + bsin (wxn)
Which contain frequency control parameter w to control the Henon like chaotic signal. Encrypted Henon chaotic
signal looks like distortion to unauthorized users ignoring to decrypt it, due to some specific characteristic such
as nonperiodicity, ergodicity, randomicity.
Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications
16
Fig. 2. Chaotic nature of the Henon map
IV.ENCRYPTION AND DECRYPTION ALGORITHM
The proposed encryption algorithm is based on Henon like mapping. Our algorithm is based on fully layered
encryption technique to provide higher level of confidentiality. We used colour image for the encryption
process in our proposed technique we can also used same technique for Gray scale image. We perform the colour
transformation to separate the RGB colour in its component matrix. For Gray scale image there is no need of
colour transformation. Then we select any one of the component (RGB) matrix for encryption to reduce the
computational overhead. The encryption process perform in the study can be seen in Fig. 3.
(1) Encryption process:
Step 1. The Henon like chaotic system is converted in to one-dimensional chaotic map. One dimensional Henon
chaotic map mathematically is defined as:
Xn+2 = 1 - aX
2
n+1 + bsin (wxn)…………….(1)
Step 2. Transform the colour image in to its (RGB) 3 pieces of component matrix.
Step 3. One dimensional Henon chaotic map obtain in (1) takes R component of colour image to generate the
random bit stream.
Step 4. The bit vales obtained in previous step is bit XOR with the original pixel values of R component of
original transform matrix.
Step 5. The vector result of G and B component of transform colour image with the matrix after bit XOR
obtained from the previous stage produce the cipher image.
Deterministic behaviour of chaotic map able us to reproduce the original image by providing the secret key
component such as initial condition, system parameter, and number of iteration.
(2) Decryption process:
Step 1. The Henon like chaotic system is converted into one-dimensional chaotic map. One dimensional Henon
chaotic map mathematically defined as
Xn+2 = 1 – X
2
n+1 + b sin(wXn) which is same as during encryption process.
Step 2. Perform colour transformation so that the colour image component RGB has been separated as in
encryption process.
Step 3. Select the secret key and parameter as used in encryption with the Henon chaotic map function same as
(1). This process generates the transform matrix of pixel values of R component of image.
Step 4. The XOR operation is computed bit- by- bit between the transform matrix of pixel values of R
component of image and the bit values of the R component of cipher image as (2).
Step 5. Vector of the decryption result is returned as the value of RGB using the image transformation to
produce the original image.
Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications
17
Fig. 3. Encryption process
V. EXPERIMENTAL RESULT
The experimental analysis of proposed technique is based on Histogram analysis through Mat Lab. Histogram
analysis show the distribution of pixel values between plane image and cipher image, if Histogram of plane
image and cipher image has significant diversity then we can say cipher image does not give any clue to perform
brute force or cryptanalysis attack on the encryption algorithm. We take Lena plane image with the size 256*256
as shown in Fig 4. The histogram of this plane image is shown in Fig. 5. We use frequency parameter w and X0,
X1 as the keys. Using X0 = 0.011, X1 = 0.021 and w = 08071982, the encrypted image is shown in Fig. 6 and
corresponding histogram of encrypted image is shown Fig. 7. Chaos system is reversible in nature after
Decryption we get back the original Lena image as shown in Fig. 7. Proposed technique is based on single
channel encryption. We encrypt only R component of the plane image and leave other G and B component as
such after combining these component we get the cipher image. Fig. 7 shows the Histogram of ‘Original R
component and Fig. 8 shown the Histogram of corresponding encrypted R component.
Fig. 4. Original Plane Lena image
Plane
image
Transformasi
image
G
R
B
Chaosbased
encryption-n
G
R
B
BitXOR
G
R
B
Cipher
image
Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications
18
Fig. 5. Histogram of Plane Lena image
Fig. 6. Encrypted Lena Image
VI.SIMULATION ANALYSIS OF SECURITY
To determine the proposed technique is robust, we use to perform analysis and testing of the encryption
algorithm sues different parameter, like Histogram analysis is used to decide the colour distribution between the
plane image and cipher image. Both the Histogram gives the significant difference to decide the robustness of
encrypted algorithm.
Fig. 4. Represent the Histogram of original lena image and Fig. 5. Represent the histogram of corresponding
encrypted image. Both Histograms has significant difference which shows there is no possibility of brute-force
attack. Similarly from the Fig. and Fig. shows the Histogram of original R channel and encrypted R channel,
both the Histogram shows the significant amount of difference due to their pixel distribution. In our proposed
algorithm we used w and the initial value X0,X1 as a secret key. Henon like chaotic system is very sensitive to
initial condition and parameter. The experimental result demonstrates the encryption algorithm is very sensitive
to the secret key. In our experiment if we change the secret
Fig. 7. Decrypted Lena Image
Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications
19
Fig. 8. Histogram of original R component
Fig. 9. Histogram of Encrypted R component
Key X0 from X0= 0.001 to X0= 0.0000000001 the resultant encrypted image become entirely changed form
original image. We take the different value of secret key for calculating the correlation coefficient between plane
image and cipher image and also find the Entropy of encrypted image for different key value, and then we find
the average correlation coefficient 0.000014 and average entropy 7.85200. The average Calculation of
correlation and entropy determine the quality of encrypted image. The higher value of entropy and lower
correlation between pixel values of encrypted image determine the safe encryption algorithm. The average result
of correlation coefficient and Entropy shows the guarantees of security of proposed scheme under any
cryptanalysis.
VII. CONCLUSION
this paper proposed a new colour image encryption algorithm based on Henon like chaotic map. The encryption
process applied on any RGB channel. The selected channel goes through the one dimensional Henon like chaotic
map to produce the random bit stream. This random bit stream bit XOR with the original pixel value of selected
channel to produce the encrypted image. The proposed scheme has multi-dimensional large key space to resist
the all possible type of brut-force attack. Several Experiments were carried out with numerical analysis, to shows
the robustness of proposed scheme. In the future work we intend to make our system to achieve more flexible,
reliable and higher level of quality performance in real time system.
ACKNOWLEDGEMENT
The study taken up during perusing M.Tech (computer science & Engineering) in partially supported by IT
infrastructure development project, Department of Information Technology, Govt of India.
REFERENCES
1. Chen Wei-bin, Zhang Xin, Image Encryption Algorithm Based on Henon chaotic System, International
Conference on image Analysis and Signal Processing, 2009, pp. 94-97.
2. Li Chuanmu, Hong Lianxi, A New Image encryption scheme based on Hyper chaotic Sequence, IEEE
International Workshop on Ant counterfeiting, Security, Identification, IEEE 2007, pp. 237-240.
3. Long Min, Huang Lu, Design and Analysis of a novel Chaotic Image Encryption. International conference
on Computer Modeling and Simulation(ICCMS’ 10), Vol 1,2010.pp. 517-520.
4. S. Behnia, A. Akhshani, H. Mahmodi and A. Akhavan, A novel Algorithm for image Encryption based on
Mixture of Chaotic Maps, Chaos, Solutions and Fractals, Vol. 35, 2008, pp. 408-419.
Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications
20
5. Kocarev L, Chaos-based Cryptography, a brief overview. IEEE Circ Syst2001,1.6-21.
6. D. Xiao, X. Liao and P. Wei, Analysis and Improvement of a Chaos-Based Image Encryption Algorithm,
“Chaos Solution & Fractials, Vol.pp.40,2007.
7. Y. Wanga, K.W. Wanga, X. F. Liao and G. R. Chen, A New Chaos-Based Fast Image Encryption
Algorithm, Applied Soft Computing, Vol. 11, No. 1, 2011, pp. 514-522.
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
CALL FOR PAPERS
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/Journals/
The IISTE editorial team promises to the review and publish all the qualified
submissions in a fast manner. All the journals articles are available online to the
readers all over the world without financial, legal, or technical barriers other than
those inseparable from gaining access to the internet itself. Printed version of the
journals is also available upon request of readers and authors.
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

More Related Content

What's hot

Visual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesVisual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesDebarko De
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
 
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...IJORCS
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageijctet
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature mapsAlexander Decker
 
A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...IJECEIAES
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual CryptographyAneeshGKumar
 
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYTEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYIJCSEA Journal
 
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region IJECEIAES
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain ijcisjournal
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color imagesiaemedu
 

What's hot (18)

T01022103108
T01022103108T01022103108
T01022103108
 
Visual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesVisual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful Shares
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
 
3 e.balamurugan 14-17
3 e.balamurugan 14-173 e.balamurugan 14-17
3 e.balamurugan 14-17
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYTEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
 
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain
 
Kk3517971799
Kk3517971799Kk3517971799
Kk3517971799
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color images
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
 

Viewers also liked

Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...
Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...
Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...eSAT Journals
 
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...Sajid Iqbal
 
An encryption scheme using chaotic map and
An encryption scheme using chaotic map andAn encryption scheme using chaotic map and
An encryption scheme using chaotic map andjpstudcorner
 
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаосМ.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаосProject KRIT
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniqueAncy Mariam Babu
 
Chaos Theory: An Introduction
Chaos Theory: An IntroductionChaos Theory: An Introduction
Chaos Theory: An IntroductionAntha Ceorote
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 

Viewers also liked (11)

Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...
Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...
Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...
 
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
 
Jammer
JammerJammer
Jammer
 
An encryption scheme using chaotic map and
An encryption scheme using chaotic map andAn encryption scheme using chaotic map and
An encryption scheme using chaotic map and
 
P1151351311
P1151351311P1151351311
P1151351311
 
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаосМ.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
 
Chaos Analysis
Chaos AnalysisChaos Analysis
Chaos Analysis
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Chaos Theory: An Introduction
Chaos Theory: An IntroductionChaos Theory: An Introduction
Chaos Theory: An Introduction
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 

Similar to A new approach of colour image encryption based on henon like chaotic map

COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
IRJET- An Image Cryptography using Henon Map and Arnold Cat Map
IRJET-  	  An Image Cryptography using Henon Map and Arnold Cat MapIRJET-  	  An Image Cryptography using Henon Map and Arnold Cat Map
IRJET- An Image Cryptography using Henon Map and Arnold Cat MapIRJET Journal
 
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...IJECEIAES
 
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPSIMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPSIJNSA Journal
 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsTELKOMNIKA JOURNAL
 
Enhancement and Analysis of Chaotic Image Encryption Algorithms
Enhancement and Analysis of Chaotic Image Encryption Algorithms Enhancement and Analysis of Chaotic Image Encryption Algorithms
Enhancement and Analysis of Chaotic Image Encryption Algorithms cscpconf
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionIRJET Journal
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET Journal
 
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET-  	  A Review Paper on Chaotic Map Image Encryption TechniquesIRJET-  	  A Review Paper on Chaotic Map Image Encryption Techniques
IRJET- A Review Paper on Chaotic Map Image Encryption TechniquesIRJET Journal
 
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...sipij
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
 
Secure image hiding in speech signal by steganography-mining and encryption
Secure image hiding in speech signal by steganography-mining  and encryptionSecure image hiding in speech signal by steganography-mining  and encryption
Secure image hiding in speech signal by steganography-mining and encryptionnooriasukmaningtyas
 
Chaotic systems with pseudorandom number generate to protect the transmitted...
Chaotic systems with pseudorandom number generate to  protect the transmitted...Chaotic systems with pseudorandom number generate to  protect the transmitted...
Chaotic systems with pseudorandom number generate to protect the transmitted...nooriasukmaningtyas
 

Similar to A new approach of colour image encryption based on henon like chaotic map (20)

COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
IRJET- An Image Cryptography using Henon Map and Arnold Cat Map
IRJET-  	  An Image Cryptography using Henon Map and Arnold Cat MapIRJET-  	  An Image Cryptography using Henon Map and Arnold Cat Map
IRJET- An Image Cryptography using Henon Map and Arnold Cat Map
 
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
 
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPSIMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systems
 
Ijcatr04021016
Ijcatr04021016Ijcatr04021016
Ijcatr04021016
 
Enhancement and Analysis of Chaotic Image Encryption Algorithms
Enhancement and Analysis of Chaotic Image Encryption Algorithms Enhancement and Analysis of Chaotic Image Encryption Algorithms
Enhancement and Analysis of Chaotic Image Encryption Algorithms
 
Pg3426762678
Pg3426762678Pg3426762678
Pg3426762678
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
 
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET-  	  A Review Paper on Chaotic Map Image Encryption TechniquesIRJET-  	  A Review Paper on Chaotic Map Image Encryption Techniques
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
 
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
 
B070306010
B070306010B070306010
B070306010
 
Secure image hiding in speech signal by steganography-mining and encryption
Secure image hiding in speech signal by steganography-mining  and encryptionSecure image hiding in speech signal by steganography-mining  and encryption
Secure image hiding in speech signal by steganography-mining and encryption
 
mini prjt
mini prjtmini prjt
mini prjt
 
Chaotic systems with pseudorandom number generate to protect the transmitted...
Chaotic systems with pseudorandom number generate to  protect the transmitted...Chaotic systems with pseudorandom number generate to  protect the transmitted...
Chaotic systems with pseudorandom number generate to protect the transmitted...
 
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
 
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
 

More from Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

More from Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Recently uploaded

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

A new approach of colour image encryption based on henon like chaotic map

  • 1. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications 14 A New Approach of Colour Image Encryption Based on Henon like Chaotic Map Ramesh Kumar yadava# , Dr. B. K.singh*, S.K.sinha*, K. K.pandey* , # # Department of computer science and engineering, AISECT University BHOPAL 1 mailramesh28@gmail.com 3 third.author@first-third.edu * AISECT UNIVERSITY Mendua, Bhojpur Raisen Bhopal INDIA 2 skrishna24it@gmail.com Abstract In modern era of digital world, exchange of information in form of image often very frequently over communication channel, the secrecy of multimedia data like images becomes very important, The issue of secrecy for image resolved In many digital applications such as sensitive visual aids, broadcasting, military services, rare satellites images and confidential medical images etc. To reduce the processing overhead with the concern of Real-time data transmission application, to reduce such a huge file processing cost, we needs to enhance our encryption/decryption techniques. This paper proposed a novel image encryption technique based on Hannon like chaotic map. Chaos-based image encryption technique is one of the more promising encryption algorithms that provide very efficient and fast way of image encryption due to its ubiquitous phenomenon in deterministic nonlinear systems that exhibit extreme sensitivity to initial condition and random like behaviours. Keywords— Image RGB colour component, image encryption, Henon map, chaotic system. I. INTRODUCTION Encryption is a common technique to uphold multimedia image security in storage and transmission over the network due to some inherent features of image like high data redundancy and bulk data capacity. The encryption of image differs from that of text. With the development of multimedia technology the transmission of information as image and video is extensively used in real time data transmission. The digital image is widely used in our lives to resolve in many applications such as Geoinformation system, military image database, medical imaging system etc. for secure transmission of data, there is prime concern to provide security to these multimedia data, resulting in encryption of data. Most of conventional algorithm does not have the efficient capability for securing multimedia data containing image due to the complexity of algorithm and perfect correlation between pixel values of image. Several reviews has been proposed on multimedia data protection such as information hiding which include steganography, anonymity, watermarking. The other is encryption which includes conventional encryption technique. Last some decade relatively new approach has been extensively used, namely chaos based selective image encryption which provides relatively sufficient security and confidentiality. A symmetric block encryption algorithm creates a chaotic map used for permuting and diffusing multimedia image data. In permutation the pixel of image are replaced by another value and in the process of diffusion the pixel values are shuffled within the image. This paper proposed a colour image encryption technique which is very simple in implementation with high level of efficiency, which is based on Henon chaotic system. Henon map is a discrete time dynamic system which exhibit chaotic behaviour which we used to produce a uniform distribution of pixels of image. In proposed method we take a bit stream of RGB component of colour image which is the input for the Encryption algorithm. The rest or this paper is organized as follows. Section 2 describes the feature of chaos. Section 3 explains Henon map and its implementation. Section 4 present Encryption and decryption algorithm. Section 5 describes the experimental result to show the proof of robust algorithm. Section 6 shows the simulation analysis of security through Mat Lab. Section 7 concludes the paper. II. FEATURE OF CHAOS Chaos is a ubiquitous phenomenon existing in deterministic nonlinear systems that exhibit sensitivity to initial conditio and have random like behaviour. Mathematically one dimensional chaos map can be represented as: Xp+1 = f (Xp), f: I → I, Xo ε I, Where f is a continuous map on the interval I = [0, 1]. With the following propriety: 1. Sensitive to initial condition this sensitivity property is utilized for the keys of cryptosystems..
  • 2. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications 15 2. Topological transitivity which linked to the diffusion feature of cryptosystem. 3. Density of periodic points in I. Above two properties often used to construct stream cipher and block cipher in chaotic cryptography. Because the property of sensitivity of initial condition make the encryption very complicated. Sequence is also sensitive to control parameter. For image encryption chaotic system can be represented by Fig 1. The initial value of chaotic map takes the original image as input, sequence of bit provided by user mapped as control parameter. Output chaotic sequence produces the cipher image. Fig. 1. Basic architecture of chaotic map Small change in input bit stream produce a huge change in output bit stream after multiple round. Slight change of user key also produces totally different output sequence of bit stream. III. HENON CHAOTIC MAP The map was introduced by Michel Henon as a simplified model of the Poincare section of the Lorenz model. For the canonical map, an initial point of the plane will either approach a set of points known as the Henon strange attractor, or diverge to infinity. Two dimensional Henon map takes a point (Xn, Yn) in the plane and maps it to a new point: Xn+1 = Yn + 1 – aX 2 n Yn+1 = bXn where a > 0 and |b| < 1, n = 0, 1, 2… Henon Map depends on two parameter a and b. these parameter values determine the chaotic behaviour of map. The Most representative form of Henon map for canonical constant values a = 1.4 and b = 0.3 as we can see in Fig. 2. In which The Henon map reflects as chaotic attractor. The propose colour image encryption is based on Henon chaotic map, Henon like mapping used sin function which include a frequency control parameter w for maintaining their chaotic behaviour . The Henon like mapping equation which used in our present image encryption technique is a mathematical concept, where time dependency of any point determines by the fixed prescribed rule in geometrical space. In our proposed encryption technique we used Henon like chaotic map mathematically defined as Xn+2 = 1 – aX 2 n+1 + bsin (wxn) Which contain frequency control parameter w to control the Henon like chaotic signal. Encrypted Henon chaotic signal looks like distortion to unauthorized users ignoring to decrypt it, due to some specific characteristic such as nonperiodicity, ergodicity, randomicity.
  • 3. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications 16 Fig. 2. Chaotic nature of the Henon map IV.ENCRYPTION AND DECRYPTION ALGORITHM The proposed encryption algorithm is based on Henon like mapping. Our algorithm is based on fully layered encryption technique to provide higher level of confidentiality. We used colour image for the encryption process in our proposed technique we can also used same technique for Gray scale image. We perform the colour transformation to separate the RGB colour in its component matrix. For Gray scale image there is no need of colour transformation. Then we select any one of the component (RGB) matrix for encryption to reduce the computational overhead. The encryption process perform in the study can be seen in Fig. 3. (1) Encryption process: Step 1. The Henon like chaotic system is converted in to one-dimensional chaotic map. One dimensional Henon chaotic map mathematically is defined as: Xn+2 = 1 - aX 2 n+1 + bsin (wxn)…………….(1) Step 2. Transform the colour image in to its (RGB) 3 pieces of component matrix. Step 3. One dimensional Henon chaotic map obtain in (1) takes R component of colour image to generate the random bit stream. Step 4. The bit vales obtained in previous step is bit XOR with the original pixel values of R component of original transform matrix. Step 5. The vector result of G and B component of transform colour image with the matrix after bit XOR obtained from the previous stage produce the cipher image. Deterministic behaviour of chaotic map able us to reproduce the original image by providing the secret key component such as initial condition, system parameter, and number of iteration. (2) Decryption process: Step 1. The Henon like chaotic system is converted into one-dimensional chaotic map. One dimensional Henon chaotic map mathematically defined as Xn+2 = 1 – X 2 n+1 + b sin(wXn) which is same as during encryption process. Step 2. Perform colour transformation so that the colour image component RGB has been separated as in encryption process. Step 3. Select the secret key and parameter as used in encryption with the Henon chaotic map function same as (1). This process generates the transform matrix of pixel values of R component of image. Step 4. The XOR operation is computed bit- by- bit between the transform matrix of pixel values of R component of image and the bit values of the R component of cipher image as (2). Step 5. Vector of the decryption result is returned as the value of RGB using the image transformation to produce the original image.
  • 4. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications 17 Fig. 3. Encryption process V. EXPERIMENTAL RESULT The experimental analysis of proposed technique is based on Histogram analysis through Mat Lab. Histogram analysis show the distribution of pixel values between plane image and cipher image, if Histogram of plane image and cipher image has significant diversity then we can say cipher image does not give any clue to perform brute force or cryptanalysis attack on the encryption algorithm. We take Lena plane image with the size 256*256 as shown in Fig 4. The histogram of this plane image is shown in Fig. 5. We use frequency parameter w and X0, X1 as the keys. Using X0 = 0.011, X1 = 0.021 and w = 08071982, the encrypted image is shown in Fig. 6 and corresponding histogram of encrypted image is shown Fig. 7. Chaos system is reversible in nature after Decryption we get back the original Lena image as shown in Fig. 7. Proposed technique is based on single channel encryption. We encrypt only R component of the plane image and leave other G and B component as such after combining these component we get the cipher image. Fig. 7 shows the Histogram of ‘Original R component and Fig. 8 shown the Histogram of corresponding encrypted R component. Fig. 4. Original Plane Lena image Plane image Transformasi image G R B Chaosbased encryption-n G R B BitXOR G R B Cipher image
  • 5. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications 18 Fig. 5. Histogram of Plane Lena image Fig. 6. Encrypted Lena Image VI.SIMULATION ANALYSIS OF SECURITY To determine the proposed technique is robust, we use to perform analysis and testing of the encryption algorithm sues different parameter, like Histogram analysis is used to decide the colour distribution between the plane image and cipher image. Both the Histogram gives the significant difference to decide the robustness of encrypted algorithm. Fig. 4. Represent the Histogram of original lena image and Fig. 5. Represent the histogram of corresponding encrypted image. Both Histograms has significant difference which shows there is no possibility of brute-force attack. Similarly from the Fig. and Fig. shows the Histogram of original R channel and encrypted R channel, both the Histogram shows the significant amount of difference due to their pixel distribution. In our proposed algorithm we used w and the initial value X0,X1 as a secret key. Henon like chaotic system is very sensitive to initial condition and parameter. The experimental result demonstrates the encryption algorithm is very sensitive to the secret key. In our experiment if we change the secret Fig. 7. Decrypted Lena Image
  • 6. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications 19 Fig. 8. Histogram of original R component Fig. 9. Histogram of Encrypted R component Key X0 from X0= 0.001 to X0= 0.0000000001 the resultant encrypted image become entirely changed form original image. We take the different value of secret key for calculating the correlation coefficient between plane image and cipher image and also find the Entropy of encrypted image for different key value, and then we find the average correlation coefficient 0.000014 and average entropy 7.85200. The average Calculation of correlation and entropy determine the quality of encrypted image. The higher value of entropy and lower correlation between pixel values of encrypted image determine the safe encryption algorithm. The average result of correlation coefficient and Entropy shows the guarantees of security of proposed scheme under any cryptanalysis. VII. CONCLUSION this paper proposed a new colour image encryption algorithm based on Henon like chaotic map. The encryption process applied on any RGB channel. The selected channel goes through the one dimensional Henon like chaotic map to produce the random bit stream. This random bit stream bit XOR with the original pixel value of selected channel to produce the encrypted image. The proposed scheme has multi-dimensional large key space to resist the all possible type of brut-force attack. Several Experiments were carried out with numerical analysis, to shows the robustness of proposed scheme. In the future work we intend to make our system to achieve more flexible, reliable and higher level of quality performance in real time system. ACKNOWLEDGEMENT The study taken up during perusing M.Tech (computer science & Engineering) in partially supported by IT infrastructure development project, Department of Information Technology, Govt of India. REFERENCES 1. Chen Wei-bin, Zhang Xin, Image Encryption Algorithm Based on Henon chaotic System, International Conference on image Analysis and Signal Processing, 2009, pp. 94-97. 2. Li Chuanmu, Hong Lianxi, A New Image encryption scheme based on Hyper chaotic Sequence, IEEE International Workshop on Ant counterfeiting, Security, Identification, IEEE 2007, pp. 237-240. 3. Long Min, Huang Lu, Design and Analysis of a novel Chaotic Image Encryption. International conference on Computer Modeling and Simulation(ICCMS’ 10), Vol 1,2010.pp. 517-520. 4. S. Behnia, A. Akhshani, H. Mahmodi and A. Akhavan, A novel Algorithm for image Encryption based on Mixture of Chaotic Maps, Chaos, Solutions and Fractals, Vol. 35, 2008, pp. 408-419.
  • 7. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications 20 5. Kocarev L, Chaos-based Cryptography, a brief overview. IEEE Circ Syst2001,1.6-21. 6. D. Xiao, X. Liao and P. Wei, Analysis and Improvement of a Chaos-Based Image Encryption Algorithm, “Chaos Solution & Fractials, Vol.pp.40,2007. 7. Y. Wanga, K.W. Wanga, X. F. Liao and G. R. Chen, A New Chaos-Based Fast Image Encryption Algorithm, Applied Soft Computing, Vol. 11, No. 1, 2011, pp. 514-522.
  • 8. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org CALL FOR PAPERS The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. There’s no deadline for submission. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/Journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar