Submit Search
Upload
Image Encryption Using Henon Map and Arnold Cat Map
•
0 likes
•
45 views
AI-enhanced title
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i4/IRJET-V5I4424.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
Structure from motion
Structure from motion
Fatima Radi
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLI
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLI
ijcsit
Object Detection Beyond Mask R-CNN and RetinaNet III
Object Detection Beyond Mask R-CNN and RetinaNet III
Wanjin Yu
Image confusion and diffusion based on multi-chaotic system and mix-column
Image confusion and diffusion based on multi-chaotic system and mix-column
journalBEEI
Image Texture Analysis
Image Texture Analysis
lalitxp
An automatic algorithm for object recognition and detection based on asift ke...
An automatic algorithm for object recognition and detection based on asift ke...
Kunal Kishor Nirala
Local binary pattern
Local binary pattern
International Islamic University
Human Head Counting and Detection using Convnets
Human Head Counting and Detection using Convnets
rahulmonikasharma
Recommended
Structure from motion
Structure from motion
Fatima Radi
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLI
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLI
ijcsit
Object Detection Beyond Mask R-CNN and RetinaNet III
Object Detection Beyond Mask R-CNN and RetinaNet III
Wanjin Yu
Image confusion and diffusion based on multi-chaotic system and mix-column
Image confusion and diffusion based on multi-chaotic system and mix-column
journalBEEI
Image Texture Analysis
Image Texture Analysis
lalitxp
An automatic algorithm for object recognition and detection based on asift ke...
An automatic algorithm for object recognition and detection based on asift ke...
Kunal Kishor Nirala
Local binary pattern
Local binary pattern
International Islamic University
Human Head Counting and Detection using Convnets
Human Head Counting and Detection using Convnets
rahulmonikasharma
I0343065072
I0343065072
ijceronline
5 1-10
5 1-10
idescitation
3D Reconstruction from Multiple uncalibrated 2D Images of an Object
3D Reconstruction from Multiple uncalibrated 2D Images of an Object
Ankur Tyagi
Histogram Processing
Histogram Processing
Amnaakhaan
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
CSCJournals
Implementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection Technique
IRJET Journal
Practical Digital Image Processing 2
Practical Digital Image Processing 2
Aly Abdelkareem
Kk3517971799
Kk3517971799
IJERA Editor
Histogram Operation in Image Processing
Histogram Operation in Image Processing
VARUN KUMAR
PPT s04-machine vision-s2
PPT s04-machine vision-s2
Binus Online Learning
Intensity Transformation
Intensity Transformation
Amnaakhaan
Dital Image Processing (Lab 2+3+4)
Dital Image Processing (Lab 2+3+4)
Moe Moe Myint
Medial axis transformation based skeletonzation of image patterns using image...
Medial axis transformation based skeletonzation of image patterns using image...
International Journal of Science and Research (IJSR)
Orb feature by nitin
Orb feature by nitin
NitinMauryaKashipur
Image recogonization
Image recogonization
SANTOSH RATH
Practical Digital Image Processing 3
Practical Digital Image Processing 3
Aly Abdelkareem
Practical Digital Image Processing 5
Practical Digital Image Processing 5
Aly Abdelkareem
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance system
iaemedu
T01022103108
T01022103108
IOSR Journals
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
More Related Content
What's hot
I0343065072
I0343065072
ijceronline
5 1-10
5 1-10
idescitation
3D Reconstruction from Multiple uncalibrated 2D Images of an Object
3D Reconstruction from Multiple uncalibrated 2D Images of an Object
Ankur Tyagi
Histogram Processing
Histogram Processing
Amnaakhaan
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
CSCJournals
Implementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection Technique
IRJET Journal
Practical Digital Image Processing 2
Practical Digital Image Processing 2
Aly Abdelkareem
Kk3517971799
Kk3517971799
IJERA Editor
Histogram Operation in Image Processing
Histogram Operation in Image Processing
VARUN KUMAR
PPT s04-machine vision-s2
PPT s04-machine vision-s2
Binus Online Learning
Intensity Transformation
Intensity Transformation
Amnaakhaan
Dital Image Processing (Lab 2+3+4)
Dital Image Processing (Lab 2+3+4)
Moe Moe Myint
Medial axis transformation based skeletonzation of image patterns using image...
Medial axis transformation based skeletonzation of image patterns using image...
International Journal of Science and Research (IJSR)
Orb feature by nitin
Orb feature by nitin
NitinMauryaKashipur
Image recogonization
Image recogonization
SANTOSH RATH
Practical Digital Image Processing 3
Practical Digital Image Processing 3
Aly Abdelkareem
Practical Digital Image Processing 5
Practical Digital Image Processing 5
Aly Abdelkareem
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance system
iaemedu
What's hot
(18)
I0343065072
I0343065072
5 1-10
5 1-10
3D Reconstruction from Multiple uncalibrated 2D Images of an Object
3D Reconstruction from Multiple uncalibrated 2D Images of an Object
Histogram Processing
Histogram Processing
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Implementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection Technique
Practical Digital Image Processing 2
Practical Digital Image Processing 2
Kk3517971799
Kk3517971799
Histogram Operation in Image Processing
Histogram Operation in Image Processing
PPT s04-machine vision-s2
PPT s04-machine vision-s2
Intensity Transformation
Intensity Transformation
Dital Image Processing (Lab 2+3+4)
Dital Image Processing (Lab 2+3+4)
Medial axis transformation based skeletonzation of image patterns using image...
Medial axis transformation based skeletonzation of image patterns using image...
Orb feature by nitin
Orb feature by nitin
Image recogonization
Image recogonization
Practical Digital Image Processing 3
Practical Digital Image Processing 3
Practical Digital Image Processing 5
Practical Digital Image Processing 5
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance system
Similar to Image Encryption Using Henon Map and Arnold Cat Map
T01022103108
T01022103108
IOSR Journals
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
A new approach of colour image encryption based on henon like chaotic map
A new approach of colour image encryption based on henon like chaotic map
Alexander Decker
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
IRJET Journal
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET Journal
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
cscpconf
New Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image Encryption
tayseer Karam alshekly
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
IJNSA Journal
Block Image Encryption using Wavelet
Block Image Encryption using Wavelet
IRJET Journal
New Technique for Image Encryption Based on Choas and Change of MSB
New Technique for Image Encryption Based on Choas and Change of MSB
Editor IJCATR
Journal_ICACT
Journal_ICACT
Sarun Maksuanpan
Enhancement and Analysis of Chaotic Image Encryption Algorithms
Enhancement and Analysis of Chaotic Image Encryption Algorithms
cscpconf
Super Resolution of Image
Super Resolution of Image
Satheesh K
B070306010
B070306010
IJERD Editor
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
International Journal of Engineering Inventions www.ijeijournal.com
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systems
TELKOMNIKA JOURNAL
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
tayseer Karam alshekly
Pg3426762678
Pg3426762678
IJERA Editor
Similar to Image Encryption Using Henon Map and Arnold Cat Map
(20)
T01022103108
T01022103108
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
A new approach of colour image encryption based on henon like chaotic map
A new approach of colour image encryption based on henon like chaotic map
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
New Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image Encryption
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
Block Image Encryption using Wavelet
Block Image Encryption using Wavelet
New Technique for Image Encryption Based on Choas and Change of MSB
New Technique for Image Encryption Based on Choas and Change of MSB
Journal_ICACT
Journal_ICACT
Enhancement and Analysis of Chaotic Image Encryption Algorithms
Enhancement and Analysis of Chaotic Image Encryption Algorithms
Super Resolution of Image
Super Resolution of Image
B070306010
B070306010
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systems
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
Pg3426762678
Pg3426762678
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
k795866
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
pipeline in computer architecture design
pipeline in computer architecture design
ssuser87fa0c1
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
me23b1001
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
KartikeyaDwivedi3
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Chandu841456
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
C Sai Kiran
Recently uploaded
(20)
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
pipeline in computer architecture design
pipeline in computer architecture design
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Internship report on mechanical engineering
Internship report on mechanical engineering
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
Image Encryption Using Henon Map and Arnold Cat Map
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1900 An Image Cryptography using Henon Map and Arnold Cat Map. Pranjali Sankhe1, Shruti Pimple2, Surabhi Singh3, Anita Lahane4 1,2,3 UG Student VIII SEM, B.E., Computer Engg., RGIT, Mumbai, India 4Assistant Professor, Department of Computer Engg., RGIT, Mumbai, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In this digital world i.e. the transmission of non- physical data that has been encoded digitally for the purpose of storage Security is a continuous process via which data can be secured from several active and passive attacks.Encryption technique protects the confidentiality of a message or information which is in the form of multimedia (text, image, and video).In this paper, a new symmetric image encryption algorithm is proposed based on Henon’s chaotic system with byte sequences applied with a novel approachofpixelshuffling of an image which results in an effective and efficient encryption of images. The Arnold Cat Map is a discrete system that stretches and folds its trajectories in phase space. Cryptography is the process of encryption and decryption of the data and used for making data, images secure and confidential . There is also a other side where the attackers, unauthorized user gets an opportunity to reuse, retrieve, disturb the images. In this paper we will apply the chaotic encryption and chaotic decryption on an image. Chaotic Algorithm is a well-used method in real time secure image transmission system. Key Words: Encryption and Decryption, Chaotic maps, Arnold cat map, Henon map, Pseudo-Random values, Pixel shuffling, Cryptography, Chaotic System. 1.INTRODUCTION Multimedia is defined as the field that deals with different forms of information such as text, images, audio and videos in an integrated fashion. Now-a-daysdigital imagesareused frequently for communication. Any information sharedover Internet needs high level of protection from intruders Cryptography is the art of protecting information by transforming readable information (plain data) into unreadable format (cipher) with the help of well-structured encryption algorithms and secret keys. Cryptography scheme is of two types. One is known as symmetric key cryptography in which a single secret key is used for both, encryption at sender’send and decryption at receiver’s end. Chaotic systems are sensitive, non-liner, deterministic and easy to reconstruct after filling in the image. Henon map is one of the chaotic map used for generating Pseudo-random sequence required for encryption. Aseverything hasitspros and cones, the risk of data corruption, forging,data extraction, etc. has been a boon to the hackers. Hence to protect from the above the technology called cryptography was introduced. Cryptography means the method of storing and transmitting required data in a particular form so that legal users can only read and process it. 2. METHODOLOGY 2.1 HENON MAP 1. The Henon map is a discrete time dynamic system introduces by michel henon. 2. The map depends on two parameters, a and b, which for the classical Henon map have valuesof a=1.4and b = 0.3. For the classical values the Henon map is chaotic. For other values of a and b the map may be chaotic, intermittent, or converge to a periodic orbit. 3. These slopes arise from the linearizations of the stable manifold and unstable manifold of the fixed point. The unstable manifold of the fixed point in the attractor is contained in the strange attractor of the Henon map. 4. It is a simplified model of coincare section of the lorenz model it is one of the most studied example of dynamically systems that exhibits chaotic behaviour it takes (x0,y0) in the plane and map it to a new point. 5. FORMULA: Xn+1=Yn+1-a*xn*xn Yn+1=b*xn Here, the parameters, a and b are prime importance as the dynamic behaviour of system depends on these values.The system cannot be chaotic unless the value of a and b are 1.4 and 0.3 respectively. For other values of a and b, the map behaves as chaotic, intermittent, or obtain a periodic orbit. Initial points X1 and Y1 [11] work as a symmetric key for chaotic cryptographic system used forencryptionatsender’s end and decryption at receiver’s end. Since Henon map is deterministic so decryption of the cipher image will reconstruct the original image at receiver’s end with the same initial points X1 and Y1. Thus, sensitivity of key and encryption algorithm together contributes to avoid all kind of cryptanalysis attacks. Fig 2.1: Henon key
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1901 2.2 ARNOLD’S CAT MAP 1. Arnold cat map was discovered by Valdimir Arnold in 1960. it takes the logics from linear algebra and uses them to change the pixel positionswithrespect to the original image. The Arnold Cat Map is a discrete system that stretches and folds its trajectories in phase space. 2. Arnold cat map has a unique hyperbolic fixed point (the vertices of the square). The linear transformation which definesthemapishyperbolic: its eigen values are irrational numbers, one greater and the other smaller than 1 (in absolute value), so they are associated respectively to an expanding and a contracting eigenspace which are also the stable and unstable manifolds. The eigenspace are orthogonal because the matrix is symmetric. 3. Defining the momentum variable pt = qt - qt-1, the above second order dynamics can be re-writtenasa mapping of the square 0 q, p ¡ N 4. Arnold cat Map is a transformation that can be applied to an image. The pixels of the image appear to be randomly rearranged, but when the transformation is repeated enough times, the original image will reappear. If we let X a= x Y be a n x n matrix of some image, Arnold’s cat map is the transformation R x x +y Y x+2y mod n For example, 3.142 mod1 142 or 150 mod100=50 or 123 23 154 mod 100= 54 Since the signs of both arguments are the same sign in the Exercise,the modulo will simply be the reminder of long division of x+y X+2y and n To better understand the mechanism of the transformation let us decompose it into its elemental pieces. Fig 2.2.1 : Arnold map Included below is a visual aide illustrating these steps. The first step shows the shearing in the x and y-directions, followed by evaluation of the modulo and reassembly of the image. Fig 2.2.2: original image stretch by Arnold cat and pixel shuffel 3. ALGORITHMS. 3.1. ENCRYPTION ALGORITHM 3.1.1. The original image of .jpg or .jpeg format is chosen for the process of encryption. 3.1.2. Pixel extraction is done of the input image by taking the image dimension i.e. Height andWidth of the image. 3.1.3. Pixel shuffling of pixelsof the input imageisdone by using the Arnolds Cat map which is chaotic in nature. 3.1.4. Generation of Key values or the pseudo-random numbersusing the Henon map whichischaoticin nature. 3.1.5. XOR operation is done between the pixel values generated from the input image and the key values generated by Henon map. 3.1.6. Cipher image or Encrypted image is done successfully and encryption process is over.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1902 3.2 DECRYPTION ALGORITHM 3.2.1. The cipher image which got from the process of encryption is chosen for the process of decryption. 3.2.2. Pixel extraction is done of the cipher image by taking the image dimension i.e. Height andWidth of the cipher image. 3.2.3. Pixel shuffling of pixels of the cipher image is done by using the Arnolds Cat map which is chaotic in nature. 3.2.4. Generation of Key values using the Henon map which behaves chaotically. 3.2.5. XOR operation is done between the pixel values and the key values generated by Henon map. 3.2.6. Original image is brought back from the cipher image successfully and decryption process is over. 4. SYSTEM DESIGN ARCHITECTURE. Fig 4:Architecture of image encryption and decryption 5. RESULTS. In this section, results of the proposed image encryption algorithm are illustrated to appreciate the efficiency of proposed algorithm. Here, test image of size 256×256 is shown in Figure 5(a). The initial parameters for Henon map are chosen as a=1.4 and b=0.3 to make the system chaotic. Secret symmetric key for encryption is a combination of X1=0.01 and Y1=0.02. Figure 5(b) and Figure 5(c) illustrates shuffled image after two iterations and encrypted image respectively. Figure 5.1: Encryption by Chaotic System Figure 5.2: Decryption by Chaotic System Example of Arnold cat map. For example, a 101 x 101 image has a period of twenty-five; whereas, a 124 x 124 image, as we just learned, has a period of fifteen. Other luminarieshave found a relationship where this experimenter failed – but it certainly cannot be claimed to be elegant nor robust . After fifteen iterations, the pixel – aswould anyotherpixelin the image – has returned to its initial position, and it would continue eternally along this circle if iterated accordingly. This agrees with the earlier observation that the 124 x 124 image has a period of fifteen. 5.1.a)Origin al image 5.1.b)Shuffle image 5.1.c)Cipher image 5.2.a) cipher image 5.2.b)shuffled image after decryption 5.2.c) original image Input image of n*n matrix Pixel shuffling( Arnold cat map) Pixel value transformati on(henon map XOR pixel values) Encryp ted image Encryp ted image Pixel value transformatio n (pixel value XOR henon map) Pixel reshuffling using Arnold map Decryp ted image
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1903 6. IMPLEMENTATION OUTPUT Fig 6.1 : GUI of henon and Arnold cat map. Fig 6.2: output of Arnold cat map Fig 6.3: henon map output 7. CONCLUSION In this paper, the chaotic system is highly sensitive to initial values and parameters of the system the security relies on a secret key along with the image encryption technique.Chaos is known for randomness, so it is highly secured. We used the randomness property of chaotic scheme i.e Arnold cat map and Henon map. The key value isgeneratedusinghenon map and pixel shuffling is done using Arnold cat map. The process of decryption is same as encryption the same key is used for both the processes. This process will help to secure the data and unauthorized people cannot access the data. REFERENCES [1] Anita A. Lahane, Pranjali Sankhe, Surabhi Singh, Shruti Pimple,” An Image Encryption and Decryption Using Chaotic Technique” Multicon-W:- CRTCE-2018 ISBN : 978-0-9994483-0-4 paper id- 111 [2] Mintu “An Image Encryption & Decryption Approach Based on Pixel Shuffling Using ArnoldCat Map & Henon Map” by Agyan Kumar Prusty, AsutoshPattanaik, Swastik Mishra published in 2013 International Conference on Advanced Computing and Communication Systems(ICACCS- 2013),Dec.19-21,2013,coimbatore,India [3] G.Chaitanya,B.Keerthi,A.Saleem,”Animage Encryption and decryption using chaos algorithm” IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) eISSN:2278-2834,P-ISSN: 2278- 8735. Volume 10,IssUe ,Ver.11 (MarApr2015),pp103-108 http://www.osrjournal.org [4] Yung Dong jiasheng Liu;canyan zhu; yiming wang;”Image encryption algorithmbasedonchaotic mapping” computer science and information technology(ICCSIT),2010 [5] Komal D Patel, SonalBelani“ImageEncryptionUsing Different Techniques: A Review” International Journal of Emerging Technology and Advanced Engineering www.ijetae.com (ISSN 2250-2459, Volume 1, Issue 1, November 2011). [6] Mayank mishra,prashant singh,chinmay garg “A new algorithm of encryption and decryption of image using chaotic mapping” international journal of information computation technology ISSN 0974- 2239 Volume4 number7(2014)pp.741-746 international research publication house http://www.irphouse.com [7] International Conference on Volume: 1 ‘Publication Year:, Page(s): 289 – 291.Long Min; Huang Lu.“Design and Analysis of a novel Chaotic Image Encryption.” International Conferenceoncomputer
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1904 Modelling and Simulation (ICCMS’10),vol1,pp517- 520, 2010. [8] M. Suneel, “Cryptographic Pseudo-random Sequences from the Chaotic Henon Map.” Sadhana, vol. 34, no. 5, pp. 689–701, 2009. [9] N.K.Pareek,V.Patidar,K.K.Sud “image encryption using chaotic logistic map” image and vision computingvol24,no.9,2006,pp.926934 http://www.irjet.org [10] H.S. Kwok, W. K. S.Tang, “A fast image encryption system based on chaotic maps with finite precision representation.” Chaos, Solitons and Fractals, vol. 32,pp. 1518–1529, 2007. [11] Li S, Mou X, Cai Y. “Pseudo-random bit generator based on couple chaotic systems and in application of its stream- cipher cryptography.” LNCS, 2247. Berlin,pp. 316–29, 2001
Download now