SlideShare a Scribd company logo
1 of 4
Download to read offline
Ankita Gaur et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.904-907
www.ijera.com 904 | P a g e
Review: Image Encryption Using Chaos Based algorithms
Er. Ankita Gaur*, Er. Maneesha Gupta**
*(M.tech scholar, Electronics and communication Engineering department, SKIET, kurukshetra)
** (Lecturer, Electronics and communication Engineering Department, SKIET, Kurukshetra)
ABSTRACT
Due to the development in the field of network technology and multimedia applications, every minute thousands
of messages which can be text, images, audios, videos are created and transmitted over wireless network.
Improper delivery of the message may leads to the leakage of important information. So encryption is used to
provide security. In last few years, variety of image encryption algorithms based on chaotic system has been
proposed to protect image from unauthorized access. 1-D chaotic system using logistic maps has weak security,
small key space and due to the floating of pixel values, some data lose occurs and proper decryption of image
becomes impossible. In this paper different chaotic maps such as Arnold cat map, sine map, logistic map, tent
map have been studied.
Keywords – Arnold cat map, Encryption, logistic map, sine map, tent map, 1-D chaotic system.
I. Introduction
Protection of multimedia contents from
unauthorized access is necessary nowadays. With the
help of cryptography readable form of message is
converted to the non readable form. And reverse of
cryptography in which non readable form of message
is converted back to readable form, is called
cryptanalysis. The combination of these two
techniques is referred as Cryptology.
Communication in human language referred as
Plain Text which can be easily understandable by
anyone else. In order to provide security plain text is
coded with suitable encryption shames and the
codified message is referred as cipher text. Fig.1
represents the block diagram of encryption, where Ke
is the encryption key.
Ke
figure 1:block diagram of encryption
Encryption key Ke is implemented on plain text to
convert it to cipher text.
Fig. 2 represents the basic decryption technique,
where Kd is the decryption key. Similarly Kd is
implemented on cipher text to convert back it to the
plain text.
Kd
figure 2: block diagram of decryption
Encryption techniques can be classified on the basis
of key, structure of algorithms and percentage of
encrypted data.
On the basis of key encryption can be symmetric
encryption and asymmetric encryption, on the basis
of structure encryption can be block cipher and
stream cipher. And on the basis of basis of
percentage of encrypted data encryption can be full
encryption and partial encryption.
II. Literature Review
Varsha S.Nemade et.al discussed that text
encryption algorithms which have been already
developed are not suitable for the image encryption,
Encryption
Decryption
Cipher Text
Cipher Text
Plain Text
Plain Text
RESEARCH ARTICLE OPEN ACCESS
Ankita Gaur et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.904-907
www.ijera.com 905 | P a g e
because image containing large amount of data
means it contains number of pixels. Image encryption
techniques scrambled the pixels of the image and
decrease the correlation among the pixels, so that we
will get lower correlation among the pixel and get the
encrypted image. In this paper survey of different
image encryption techniques has been discussed
Jolly Shah et.al stated that image applications
have been increasing in recent years. Encryption is
used to provide the security needed for image
applications. In this paper, we classify various image
encryption schemes and analyze them with respect to
various parameters like tunability, visual degradation,
compression friendliness, format compliance,
encryption ratio, speed, and cryptographic security.
Haojiang Gao et.al discussed that recent
researches of image encryption algorithms based on
chaotic systems, but the drawbacks of small key
space and weak security in one-dimensional chaotic
cryptosystems are obvious. This paper presents a new
nonlinear chaotic algorithm (NCA) which uses power
function and tangent function instead of linear
function. Its structural parameters are obtained by
experimental analysis. And an image encryption
algorithm in a one-time-one password system is
designed. The experimental results demonstrate that
the image encryption algorithm based on NCA shows
advantages of large key space and high-level
security, while maintaining acceptable efficiency.
Compared with some general encryption algorithms
such as DES, the encryption algorithm is more
secure.
Yicong Zhou et.al introduced a new parametric
switching chaotic system (PSCS) and its
corresponding transforms for image encryption. The
proposed PSCS has a simple structure and integrates
the Logistic, Sine and Tent maps into one single
system. The PSCS shows more general properties,
including the Sine and Tent maps as special
instances. It has complex chaotic behaviors. A novel
image encryption algorithm is introduced using the
proposed PSCS and its transforms. Simulation results
and security analysis are given to demonstrate that
the proposed algorithm can encrypt different types of
images with a high level of security.
III. Methodology
Text encryption algorithms such as
Advanced Encryption Standard (AES) or Data
Encryption Standard (DES) cannot be used for image
encryption because image is made up of pixels or in
other words image has large data as compared to text.
Image encryption can be done by chaos theory. Fig.3
shows the image before and after the encryption.
Original image Encrypted image
figure 3: image encryption
3.1 Chaotic system: Chaotic system can be
considered as source of randomness and chaos is
randomness of a deterministic dynamical system.
Mathematically A chaotic map can be defined as
Xn+1= f (Xn) …………………………….. ……...(1)
Where 0<Xn<1 and n=0, 1, 2…
Chaotic sequence can be used as random number
sequence and spread spectrum sequence. The chaotic
systems are characterized by the non linear and
unpredictable. They appear to have irregular order
but infect there is a sense of order. Chaotic
systems are sensitive to initial conditions, small
change in starting point can cause different outcomes.
Chaos has many applications in modulation,
compression, and encryption. In image encryption, 1-
D chaotic system using logistic maps has simplicity
and high efficiency but it has weak security and small
key space. Different Chaotic maps can be used for
this purpose. Generally in chaos based algorithm,
pixels of image are scrambled and correlation among
pixels is decreased to get encrypted image. Figure 2
represent the basic image encryption flow chart of
chaos based algorithms. Where k and iv are the key
and initial vector generated by chaotic system.
3.1.1 Arnold cat map: it was demonstrated by
Vladimir Arnold in 1960s by using an image of a cat.
Arnold cat map uses the concept of linear algebra to
change the position of pixels of original image.
Original image is divided into blocks and then
Arnold transformation is done.
Let X is a vector, X= [ ], then Arnold cat map
transformation is, Γ: [ ] → [ ] 𝑚𝑜𝑑 𝑛
Some conditions such as p and q are positive integers
and
=1
This makes it area-preserving. Original image can be
shuffled by applying Arnold map operation
iteratively. But shuffled image can return to original
form after several iterations.
Encryption
Ankita Gaur et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.904-907
www.ijera.com 906 | P a g e
3.1.2 Logistic map: 1-D logistic map was proposed
by RM may. This map is simplest non linear chaotic
system which can be defined as
zn+1= λ zn(1-zn)…………………………………..(2)
Where z0 is initial condition, n is number of iterations
and λ is system parameter.
For 3.57 < λ < 4 map is considered as chaotic .And z
n+1 belong to (0, 1) for all n. equation 1 is used to
encrypt the shuffled pixels.
3.1.3 Sine map: sine map is defined as
X n+1=a xn
2
sin(π xn) …………………………..(3)
when x0 = 0.7 and a=2.3, equation 2 has the
simplified form . for the interval (0,1) it generates
chaotic sequence .
3.1.4 Tent map: tent map resembles the logistic
map. It generates chaotic sequences in (0,1) assuming
the following equation
Where µ is a positive number and depending on its
value tent map exhibit dynamic behavior ranging
from predictable to chaotic.
3.1.5 Circle map: it is defined as
Xn+1= Xn + d – (c/2π) sin( 2πXn) mod(1)………(4)
Where d = 0.2, c = 0.5, and x0 € [0,1] generates
Chaotic sequence in [0,1].
IV. Conclusion
In order to provide security to the image,
cryptography is used which converts an image into
another form (non readable form). Chaotic systems
have many applications in image processing such as
image compression and image encryption.
Combination of chaos theory with cryptography may
provide security of high level. Chaotic maps like
Arnold cat map, tent map, sine map, logistic map are
used in image encryption. Two or more maps can
also be used in combination. Arnold cat map cannot
be efficient alone for image encryption so it can be
used with other maps for efficient encryption.
REFERENCES
[1] Ljupcˇo Kocarev, Chaos-Based
Cryptography:A Brief Overview, IEEE,
1531-636X/10/$10.00©2001,
[2] Shiguo Lian, Jinsheng Sun, Zhiquan Wang,
Security Analysis of A Chaos-based Image
Encryption Algorithm, The paper was
accepted by Phisica A, Elsevier Science,
2005.
[3] Haojiang Gao , Yisheng Zhang, Shuyun
Liang, Dequn Li, A new chaotic algorithm
for image encryption, ©2005 Published by
Elsevier Ltd.
[4] Mohammad Ali Bani Younes and Aman
Jantan, Image Encryption Using Block-Based
Transformation Algorithm, International
Journal of Computer Science, 35:1,
IJCS_35_1_03, Issue 19, February 2008
[5] Alireza Jolfaei and Abdolrasoul Mirghadri,
Survey: Image Encryption Using Salsa20,
International Journal of Computer Science,
Vol. 7, Issue 5, September 2010 ,ISSN
(Online): 1694-0814
[6] Mao-Yu Huang et .al, Image Encryption
Algorithm Based on Chaotic Maps, 978-1-
4244-7640-4/10/$26.00 ©2010 IEEE .
[7] Jolly Shah and Dr. Vikas Saxena,
Performance Study on Image Encryption
Schemes, International Journal of Computer
Science, Vol. 8, Issue 4, No 1, July 2011
[8] Yicong Zhou, Long Bao, C. L. Philip Chen,
Image Encryption Using a New Parametric
Switching Chaotic System, ©2011 Published
by Elsevier Ltd.
[9] Mintu Philip et.al, Survey: Image Encryption
using Chaotic Cryptography Schemes,
International Journal of Computer
Applications, Special Issue on Computational
Science - New Dimensions & Perspectives,
NCCSE, 2011
[10] Varsha S.Nemade and R.B.Wagh, Review of
different image encryption techniques, Proc.
of National Conference on Emerging Trends
in Computer Technology (NCETCT-2012)
Held at R.C.Patel Institute of Technology,
Shirpur, Dist. Dhule,Maharashtra,India. April
21, 2012
[11] Ruisong Ye and Wenping Yu, An Image
Hiding Scheme Using 3D Sawtooth Map and
Discrete Wavelet Transform, I.J. Image,
Graphics and Signal Processing, 2012, 6, 52-
60
[12] Pankesh et al., Image Encryption Using Pixel
Shuffling, International Journal of Advanced
Research in Computer Science and Software
Engineering 2 (12), December - 2012, pp.
279-282 © 2012, All Rights Reserved Page |
279 Volume 2, Issue 12, December 2012
ISSN: 2277 128X
[13] Shubhangini P.Nichat, Prof.Mrs.S.S.Sikchi,
Image Encryption using Hybrid Genetic
Algorithm, International Journal of
Ankita Gaur et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.904-907
www.ijera.com 907 | P a g e
Advanced Research in Computer Science and
Software Engineering, Volume 3, Issue 1,
January 2013 ISSN: 2277 128X.
[14] Rajinder Kaur1, Er.Kanwalprit Singh, Image
Encryption Techniques: A Selected Review,
IOSR Journal of Computer Engineering
(IOSR-JCE) e-ISSN: 2278-0661, p- ISSN:
2278-8727,Volume 9, Issue 6 (Mar. - Apr.
2013), PP 80-83
[15] Mohammed A. Shreef and Haider K.
Hoomod, Image Encryption Using Lagrange-
Least Squares Interpolation, International
Journal of Advanced Computer Science
andInformation Technology ,Vol. 2, No. 4,
2013, Page: 35-55, ISSN: 2296-1739
[16] Pia Singh, Prof. Karamjeet Singh, Image
Encryption And Decryption Using Blowfish
Algorithm In Matlab, International Journal
of Scientific & Engineering Research,
Volume 4, Issue 7, July-2013.
[17] Vani et al., International Journal of
Advanced Research in Computer Science and
Software Engineering 3(9), September -
2013, pp. 1210-1215
[18] Prachi Junwale , R. Manasa Annapurna,
G.Sobha,A Review on Image Encryption
Technique based on Hyper Image Encryption
Algorithm, International Journal of
Advanced Research in Computer Science and
Software Engineering 3(11), November -
2013, pp. 614-618.
[19] Sukhjeevan Kaur et al , A Review of
ImageEncryption Schemes Based on the
Chaotic Map , International Journal of
Computer Technology & Applications,Vol 5
(1),PP144-149, 2014, ISSN:2229-6093

More Related Content

What's hot

Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniqueAncy Mariam Babu
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryptionAnsabArshad
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSIJNSA Journal
 
An Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based CryptosystemAn Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based Cryptosystemxlyle
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
 
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...IJORCS
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression Sayantan Sur
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyZac Darcy
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...idescitation
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imageseSAT Journals
 

What's hot (19)

Image Security
Image SecurityImage Security
Image Security
 
Thesis Background
Thesis BackgroundThesis Background
Thesis Background
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 
An Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based CryptosystemAn Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based Cryptosystem
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptography
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted images
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 

Viewers also liked (20)

Ey4301913917
Ey4301913917Ey4301913917
Ey4301913917
 
D43042025
D43042025D43042025
D43042025
 
D43021519
D43021519D43021519
D43021519
 
Cj4301492497
Cj4301492497Cj4301492497
Cj4301492497
 
By4301435440
By4301435440By4301435440
By4301435440
 
Cf4301466469
Cf4301466469Cf4301466469
Cf4301466469
 
Fa4301925930
Fa4301925930Fa4301925930
Fa4301925930
 
F43053237
F43053237F43053237
F43053237
 
I43055257
I43055257I43055257
I43055257
 
Dg4301625635
Dg4301625635Dg4301625635
Dg4301625635
 
Eo4301852855
Eo4301852855Eo4301852855
Eo4301852855
 
F43022431
F43022431F43022431
F43022431
 
D43062127
D43062127D43062127
D43062127
 
Cm4301507513
Cm4301507513Cm4301507513
Cm4301507513
 
El4301832837
El4301832837El4301832837
El4301832837
 
Cc4301455457
Cc4301455457Cc4301455457
Cc4301455457
 
C43021014
C43021014C43021014
C43021014
 
J43025258
J43025258J43025258
J43025258
 
Lk3619561964
Lk3619561964Lk3619561964
Lk3619561964
 
Alans English homework
Alans English homeworkAlans English homework
Alans English homework
 

Similar to Image Encryption Using Chaotic Maps

Medical image encryption using multi chaotic maps
Medical image encryption using multi chaotic mapsMedical image encryption using multi chaotic maps
Medical image encryption using multi chaotic mapsTELKOMNIKA JOURNAL
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplicationijcsit
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling cscpconf
 
Image encryption algorithm based on the density and 6D logistic map
Image encryption algorithm based on the density and 6D logistic map Image encryption algorithm based on the density and 6D logistic map
Image encryption algorithm based on the density and 6D logistic map IJECEIAES
 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsTELKOMNIKA JOURNAL
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINijcisjournal
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINijcisjournal
 
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...sipij
 
Secure image hiding in speech signal by steganography-mining and encryption
Secure image hiding in speech signal by steganography-mining  and encryptionSecure image hiding in speech signal by steganography-mining  and encryption
Secure image hiding in speech signal by steganography-mining and encryptionnooriasukmaningtyas
 
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...IJERA Editor
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSIJNSA Journal
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
 
Chaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey StudyChaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey StudyjournalBEEI
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...CSCJournals
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueJeff Brooks
 

Similar to Image Encryption Using Chaotic Maps (20)

Medical image encryption using multi chaotic maps
Medical image encryption using multi chaotic mapsMedical image encryption using multi chaotic maps
Medical image encryption using multi chaotic maps
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
 
Image encryption algorithm based on the density and 6D logistic map
Image encryption algorithm based on the density and 6D logistic map Image encryption algorithm based on the density and 6D logistic map
Image encryption algorithm based on the density and 6D logistic map
 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systems
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
 
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
 
Secure image hiding in speech signal by steganography-mining and encryption
Secure image hiding in speech signal by steganography-mining  and encryptionSecure image hiding in speech signal by steganography-mining  and encryption
Secure image hiding in speech signal by steganography-mining and encryption
 
T01022103108
T01022103108T01022103108
T01022103108
 
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
Chaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey StudyChaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey Study
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 

Image Encryption Using Chaotic Maps

  • 1. Ankita Gaur et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.904-907 www.ijera.com 904 | P a g e Review: Image Encryption Using Chaos Based algorithms Er. Ankita Gaur*, Er. Maneesha Gupta** *(M.tech scholar, Electronics and communication Engineering department, SKIET, kurukshetra) ** (Lecturer, Electronics and communication Engineering Department, SKIET, Kurukshetra) ABSTRACT Due to the development in the field of network technology and multimedia applications, every minute thousands of messages which can be text, images, audios, videos are created and transmitted over wireless network. Improper delivery of the message may leads to the leakage of important information. So encryption is used to provide security. In last few years, variety of image encryption algorithms based on chaotic system has been proposed to protect image from unauthorized access. 1-D chaotic system using logistic maps has weak security, small key space and due to the floating of pixel values, some data lose occurs and proper decryption of image becomes impossible. In this paper different chaotic maps such as Arnold cat map, sine map, logistic map, tent map have been studied. Keywords – Arnold cat map, Encryption, logistic map, sine map, tent map, 1-D chaotic system. I. Introduction Protection of multimedia contents from unauthorized access is necessary nowadays. With the help of cryptography readable form of message is converted to the non readable form. And reverse of cryptography in which non readable form of message is converted back to readable form, is called cryptanalysis. The combination of these two techniques is referred as Cryptology. Communication in human language referred as Plain Text which can be easily understandable by anyone else. In order to provide security plain text is coded with suitable encryption shames and the codified message is referred as cipher text. Fig.1 represents the block diagram of encryption, where Ke is the encryption key. Ke figure 1:block diagram of encryption Encryption key Ke is implemented on plain text to convert it to cipher text. Fig. 2 represents the basic decryption technique, where Kd is the decryption key. Similarly Kd is implemented on cipher text to convert back it to the plain text. Kd figure 2: block diagram of decryption Encryption techniques can be classified on the basis of key, structure of algorithms and percentage of encrypted data. On the basis of key encryption can be symmetric encryption and asymmetric encryption, on the basis of structure encryption can be block cipher and stream cipher. And on the basis of basis of percentage of encrypted data encryption can be full encryption and partial encryption. II. Literature Review Varsha S.Nemade et.al discussed that text encryption algorithms which have been already developed are not suitable for the image encryption, Encryption Decryption Cipher Text Cipher Text Plain Text Plain Text RESEARCH ARTICLE OPEN ACCESS
  • 2. Ankita Gaur et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.904-907 www.ijera.com 905 | P a g e because image containing large amount of data means it contains number of pixels. Image encryption techniques scrambled the pixels of the image and decrease the correlation among the pixels, so that we will get lower correlation among the pixel and get the encrypted image. In this paper survey of different image encryption techniques has been discussed Jolly Shah et.al stated that image applications have been increasing in recent years. Encryption is used to provide the security needed for image applications. In this paper, we classify various image encryption schemes and analyze them with respect to various parameters like tunability, visual degradation, compression friendliness, format compliance, encryption ratio, speed, and cryptographic security. Haojiang Gao et.al discussed that recent researches of image encryption algorithms based on chaotic systems, but the drawbacks of small key space and weak security in one-dimensional chaotic cryptosystems are obvious. This paper presents a new nonlinear chaotic algorithm (NCA) which uses power function and tangent function instead of linear function. Its structural parameters are obtained by experimental analysis. And an image encryption algorithm in a one-time-one password system is designed. The experimental results demonstrate that the image encryption algorithm based on NCA shows advantages of large key space and high-level security, while maintaining acceptable efficiency. Compared with some general encryption algorithms such as DES, the encryption algorithm is more secure. Yicong Zhou et.al introduced a new parametric switching chaotic system (PSCS) and its corresponding transforms for image encryption. The proposed PSCS has a simple structure and integrates the Logistic, Sine and Tent maps into one single system. The PSCS shows more general properties, including the Sine and Tent maps as special instances. It has complex chaotic behaviors. A novel image encryption algorithm is introduced using the proposed PSCS and its transforms. Simulation results and security analysis are given to demonstrate that the proposed algorithm can encrypt different types of images with a high level of security. III. Methodology Text encryption algorithms such as Advanced Encryption Standard (AES) or Data Encryption Standard (DES) cannot be used for image encryption because image is made up of pixels or in other words image has large data as compared to text. Image encryption can be done by chaos theory. Fig.3 shows the image before and after the encryption. Original image Encrypted image figure 3: image encryption 3.1 Chaotic system: Chaotic system can be considered as source of randomness and chaos is randomness of a deterministic dynamical system. Mathematically A chaotic map can be defined as Xn+1= f (Xn) …………………………….. ……...(1) Where 0<Xn<1 and n=0, 1, 2… Chaotic sequence can be used as random number sequence and spread spectrum sequence. The chaotic systems are characterized by the non linear and unpredictable. They appear to have irregular order but infect there is a sense of order. Chaotic systems are sensitive to initial conditions, small change in starting point can cause different outcomes. Chaos has many applications in modulation, compression, and encryption. In image encryption, 1- D chaotic system using logistic maps has simplicity and high efficiency but it has weak security and small key space. Different Chaotic maps can be used for this purpose. Generally in chaos based algorithm, pixels of image are scrambled and correlation among pixels is decreased to get encrypted image. Figure 2 represent the basic image encryption flow chart of chaos based algorithms. Where k and iv are the key and initial vector generated by chaotic system. 3.1.1 Arnold cat map: it was demonstrated by Vladimir Arnold in 1960s by using an image of a cat. Arnold cat map uses the concept of linear algebra to change the position of pixels of original image. Original image is divided into blocks and then Arnold transformation is done. Let X is a vector, X= [ ], then Arnold cat map transformation is, Γ: [ ] → [ ] 𝑚𝑜𝑑 𝑛 Some conditions such as p and q are positive integers and =1 This makes it area-preserving. Original image can be shuffled by applying Arnold map operation iteratively. But shuffled image can return to original form after several iterations. Encryption
  • 3. Ankita Gaur et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.904-907 www.ijera.com 906 | P a g e 3.1.2 Logistic map: 1-D logistic map was proposed by RM may. This map is simplest non linear chaotic system which can be defined as zn+1= λ zn(1-zn)…………………………………..(2) Where z0 is initial condition, n is number of iterations and λ is system parameter. For 3.57 < λ < 4 map is considered as chaotic .And z n+1 belong to (0, 1) for all n. equation 1 is used to encrypt the shuffled pixels. 3.1.3 Sine map: sine map is defined as X n+1=a xn 2 sin(π xn) …………………………..(3) when x0 = 0.7 and a=2.3, equation 2 has the simplified form . for the interval (0,1) it generates chaotic sequence . 3.1.4 Tent map: tent map resembles the logistic map. It generates chaotic sequences in (0,1) assuming the following equation Where µ is a positive number and depending on its value tent map exhibit dynamic behavior ranging from predictable to chaotic. 3.1.5 Circle map: it is defined as Xn+1= Xn + d – (c/2π) sin( 2πXn) mod(1)………(4) Where d = 0.2, c = 0.5, and x0 € [0,1] generates Chaotic sequence in [0,1]. IV. Conclusion In order to provide security to the image, cryptography is used which converts an image into another form (non readable form). Chaotic systems have many applications in image processing such as image compression and image encryption. Combination of chaos theory with cryptography may provide security of high level. Chaotic maps like Arnold cat map, tent map, sine map, logistic map are used in image encryption. Two or more maps can also be used in combination. Arnold cat map cannot be efficient alone for image encryption so it can be used with other maps for efficient encryption. REFERENCES [1] Ljupcˇo Kocarev, Chaos-Based Cryptography:A Brief Overview, IEEE, 1531-636X/10/$10.00©2001, [2] Shiguo Lian, Jinsheng Sun, Zhiquan Wang, Security Analysis of A Chaos-based Image Encryption Algorithm, The paper was accepted by Phisica A, Elsevier Science, 2005. [3] Haojiang Gao , Yisheng Zhang, Shuyun Liang, Dequn Li, A new chaotic algorithm for image encryption, ©2005 Published by Elsevier Ltd. [4] Mohammad Ali Bani Younes and Aman Jantan, Image Encryption Using Block-Based Transformation Algorithm, International Journal of Computer Science, 35:1, IJCS_35_1_03, Issue 19, February 2008 [5] Alireza Jolfaei and Abdolrasoul Mirghadri, Survey: Image Encryption Using Salsa20, International Journal of Computer Science, Vol. 7, Issue 5, September 2010 ,ISSN (Online): 1694-0814 [6] Mao-Yu Huang et .al, Image Encryption Algorithm Based on Chaotic Maps, 978-1- 4244-7640-4/10/$26.00 ©2010 IEEE . [7] Jolly Shah and Dr. Vikas Saxena, Performance Study on Image Encryption Schemes, International Journal of Computer Science, Vol. 8, Issue 4, No 1, July 2011 [8] Yicong Zhou, Long Bao, C. L. Philip Chen, Image Encryption Using a New Parametric Switching Chaotic System, ©2011 Published by Elsevier Ltd. [9] Mintu Philip et.al, Survey: Image Encryption using Chaotic Cryptography Schemes, International Journal of Computer Applications, Special Issue on Computational Science - New Dimensions & Perspectives, NCCSE, 2011 [10] Varsha S.Nemade and R.B.Wagh, Review of different image encryption techniques, Proc. of National Conference on Emerging Trends in Computer Technology (NCETCT-2012) Held at R.C.Patel Institute of Technology, Shirpur, Dist. Dhule,Maharashtra,India. April 21, 2012 [11] Ruisong Ye and Wenping Yu, An Image Hiding Scheme Using 3D Sawtooth Map and Discrete Wavelet Transform, I.J. Image, Graphics and Signal Processing, 2012, 6, 52- 60 [12] Pankesh et al., Image Encryption Using Pixel Shuffling, International Journal of Advanced Research in Computer Science and Software Engineering 2 (12), December - 2012, pp. 279-282 © 2012, All Rights Reserved Page | 279 Volume 2, Issue 12, December 2012 ISSN: 2277 128X [13] Shubhangini P.Nichat, Prof.Mrs.S.S.Sikchi, Image Encryption using Hybrid Genetic Algorithm, International Journal of
  • 4. Ankita Gaur et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.904-907 www.ijera.com 907 | P a g e Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 1, January 2013 ISSN: 2277 128X. [14] Rajinder Kaur1, Er.Kanwalprit Singh, Image Encryption Techniques: A Selected Review, IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727,Volume 9, Issue 6 (Mar. - Apr. 2013), PP 80-83 [15] Mohammed A. Shreef and Haider K. Hoomod, Image Encryption Using Lagrange- Least Squares Interpolation, International Journal of Advanced Computer Science andInformation Technology ,Vol. 2, No. 4, 2013, Page: 35-55, ISSN: 2296-1739 [16] Pia Singh, Prof. Karamjeet Singh, Image Encryption And Decryption Using Blowfish Algorithm In Matlab, International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013. [17] Vani et al., International Journal of Advanced Research in Computer Science and Software Engineering 3(9), September - 2013, pp. 1210-1215 [18] Prachi Junwale , R. Manasa Annapurna, G.Sobha,A Review on Image Encryption Technique based on Hyper Image Encryption Algorithm, International Journal of Advanced Research in Computer Science and Software Engineering 3(11), November - 2013, pp. 614-618. [19] Sukhjeevan Kaur et al , A Review of ImageEncryption Schemes Based on the Chaotic Map , International Journal of Computer Technology & Applications,Vol 5 (1),PP144-149, 2014, ISSN:2229-6093