SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1900
An Image Cryptography using Henon Map and Arnold Cat Map.
Pranjali Sankhe1, Shruti Pimple2, Surabhi Singh3, Anita Lahane4
1,2,3 UG Student VIII SEM, B.E., Computer Engg., RGIT, Mumbai, India
4Assistant Professor, Department of Computer Engg., RGIT, Mumbai, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In this digital world i.e. the transmission of non-
physical data that has been encoded digitally for the purpose
of storage Security is a continuous process via which data can
be secured from several active and passive attacks.Encryption
technique protects the confidentiality of a message or
information which is in the form of multimedia (text, image,
and video).In this paper, a new symmetric image encryption
algorithm is proposed based on Henon’s chaotic system with
byte sequences applied with a novel approachofpixelshuffling
of an image which results in an effective and efficient
encryption of images. The Arnold Cat Map is a discrete system
that stretches and folds its trajectories in phase space.
Cryptography is the process of encryption and decryption of
the data and used for making data, images secure and
confidential . There is also a other side where the attackers,
unauthorized user gets an opportunity to reuse, retrieve,
disturb the images. In this paper we will apply the chaotic
encryption and chaotic decryption on an image. Chaotic
Algorithm is a well-used method in real time secure image
transmission system.
Key Words: Encryption and Decryption, Chaotic maps,
Arnold cat map, Henon map, Pseudo-Random values,
Pixel shuffling, Cryptography, Chaotic System.
1.INTRODUCTION
Multimedia is defined as the field that deals with different
forms of information such as text, images, audio and videos
in an integrated fashion. Now-a-daysdigital imagesareused
frequently for communication. Any information sharedover
Internet needs high level of protection from intruders
Cryptography is the art of protecting information by
transforming readable information (plain data) into
unreadable format (cipher) with the help of well-structured
encryption algorithms and secret keys. Cryptography
scheme is of two types. One is known as symmetric key
cryptography in which a single secret key is used for both,
encryption at sender’send and decryption at receiver’s end.
Chaotic systems are sensitive, non-liner, deterministic and
easy to reconstruct after filling in the image. Henon map is
one of the chaotic map used for generating Pseudo-random
sequence required for encryption. Aseverything hasitspros
and cones, the risk of data corruption, forging,data
extraction, etc. has been a boon to the hackers. Hence to
protect from the above the technology called cryptography
was introduced. Cryptography means the method of storing
and transmitting required data in a particular form so that
legal users can only read and process it.
2. METHODOLOGY
2.1 HENON MAP
1. The Henon map is a discrete time dynamic system
introduces by michel henon.
2. The map depends on two parameters, a and b, which
for the classical Henon map have valuesof a=1.4and
b = 0.3. For the classical values the Henon map is
chaotic. For other values of a and b the map may be
chaotic, intermittent, or converge to a periodic orbit.
3. These slopes arise from the linearizations of the
stable manifold and unstable manifold of the fixed
point. The unstable manifold of the fixed point in the
attractor is contained in the strange attractor of the
Henon map.
4. It is a simplified model of coincare section of the
lorenz model it is one of the most studied example of
dynamically systems that exhibits chaotic behaviour
it takes (x0,y0) in the plane and map it to a new point.
5. FORMULA: Xn+1=Yn+1-a*xn*xn Yn+1=b*xn
Here, the parameters, a and b are prime importance as the
dynamic behaviour of system depends on these values.The
system cannot be chaotic unless the value of a and b are 1.4
and 0.3 respectively. For other values of a and b, the map
behaves as chaotic, intermittent, or obtain a periodic orbit.
Initial points X1 and Y1 [11] work as a symmetric key for
chaotic cryptographic system used forencryptionatsender’s
end and decryption at receiver’s end. Since Henon map is
deterministic so decryption of the cipher image will
reconstruct the original image at receiver’s end with the
same initial points X1 and Y1. Thus, sensitivity of key and
encryption algorithm together contributes to avoid all kind
of cryptanalysis attacks.
Fig 2.1: Henon key
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1901
2.2 ARNOLD’S CAT MAP
1. Arnold cat map was discovered by Valdimir Arnold
in 1960. it takes the logics from linear algebra and
uses them to change the pixel positionswithrespect
to the original image. The Arnold Cat Map is a
discrete system that stretches and folds its
trajectories in phase space.
2. Arnold cat map has a unique hyperbolic fixed point
(the vertices of the square). The linear
transformation which definesthemapishyperbolic:
its eigen values are irrational numbers, one greater
and the other smaller than 1 (in absolute value), so
they are associated respectively to an expanding
and a contracting eigenspace which are also the
stable and unstable manifolds. The eigenspace are
orthogonal because the matrix is symmetric.
3. Defining the momentum variable pt = qt - qt-1, the
above second order dynamics can be re-writtenasa
mapping of the square 0 q, p ¡ N
4. Arnold cat Map is a transformation that can be
applied to an image. The pixels of the image appear
to be randomly rearranged, but when the
transformation is repeated enough times, the
original image will reappear.
If we let X a= x
Y be a n x n matrix of some image, Arnold’s
cat map is the transformation
R x x +y
Y x+2y mod n
For example, 3.142 mod1 142 or 150 mod100=50 or
123 23
154 mod 100= 54
Since the signs of both arguments are the same sign in the
Exercise,the modulo will simply be the reminder of long
division of x+y
X+2y and n
To better understand the mechanism of the transformation
let us decompose it into its elemental pieces.
Fig 2.2.1 : Arnold map
Included below is a visual aide illustrating these steps. The
first step shows the shearing in the x and y-directions,
followed by evaluation of the modulo and reassembly
of the image.
Fig 2.2.2: original image stretch by Arnold cat and pixel
shuffel
3. ALGORITHMS.
3.1. ENCRYPTION ALGORITHM
3.1.1. The original image of .jpg or .jpeg format is
chosen for the process of encryption.
3.1.2. Pixel extraction is done of the input image by
taking the image dimension i.e. Height andWidth
of the image.
3.1.3. Pixel shuffling of pixelsof the input imageisdone
by using the Arnolds Cat map which is chaotic in
nature.
3.1.4. Generation of Key values or the pseudo-random
numbersusing the Henon map whichischaoticin
nature.
3.1.5. XOR operation is done between the pixel values
generated from the input image and the key
values generated by Henon map.
3.1.6. Cipher image or Encrypted image is done
successfully and encryption process is over.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1902
3.2 DECRYPTION ALGORITHM
3.2.1. The cipher image which got from the process of
encryption is chosen for the process of
decryption.
3.2.2. Pixel extraction is done of the cipher image by
taking the image dimension i.e. Height andWidth
of the cipher image.
3.2.3. Pixel shuffling of pixels of the cipher image is
done by using the Arnolds Cat map which is
chaotic in nature.
3.2.4. Generation of Key values using the Henon map
which behaves chaotically.
3.2.5. XOR operation is done between the pixel values
and the key values generated by Henon map.
3.2.6. Original image is brought back from the cipher
image successfully and decryption process is
over.
4. SYSTEM DESIGN ARCHITECTURE.
Fig 4:Architecture of image encryption and decryption
5. RESULTS.
In this section, results of the proposed image encryption
algorithm are illustrated to appreciate the efficiency of
proposed algorithm. Here, test image of size 256×256 is
shown in Figure 5(a). The initial parameters for Henon map
are chosen as a=1.4 and b=0.3 to make the system chaotic.
Secret symmetric key for encryption is a combination of
X1=0.01 and Y1=0.02. Figure 5(b) and Figure 5(c) illustrates
shuffled image after two iterations and encrypted image
respectively.
Figure 5.1: Encryption by Chaotic System
Figure 5.2: Decryption by Chaotic System
Example of Arnold cat map.
For example, a 101 x 101 image has a period of twenty-five;
whereas, a 124 x 124 image, as we just learned, has a period
of fifteen. Other luminarieshave found a relationship where
this experimenter failed – but it certainly cannot be claimed
to be elegant nor robust .
After fifteen iterations, the pixel – aswould anyotherpixelin
the image – has returned to its initial position, and it would
continue eternally along this circle if iterated accordingly.
This agrees with the earlier observation that the 124 x 124
image has a period of fifteen.
5.1.a)Origin
al image
5.1.b)Shuffle
image
5.1.c)Cipher
image
5.2.a) cipher
image
5.2.b)shuffled
image after
decryption
5.2.c) original
image
Input
image
of n*n
matrix
Pixel
shuffling(
Arnold cat
map)
Pixel value
transformati
on(henon
map XOR
pixel values)
Encryp
ted
image
Encryp
ted
image
Pixel value
transformatio
n (pixel value
XOR henon
map)
Pixel
reshuffling
using
Arnold
map
Decryp
ted
image
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1903
6. IMPLEMENTATION OUTPUT
Fig 6.1 : GUI of henon and Arnold cat map.
Fig 6.2: output of Arnold cat map
Fig 6.3: henon map output
7. CONCLUSION
In this paper, the chaotic system is highly sensitive to initial
values and parameters of the system the security relies on a
secret key along with the image encryption technique.Chaos
is known for randomness, so it is highly secured. We used
the randomness property of chaotic scheme i.e Arnold cat
map and Henon map. The key value isgeneratedusinghenon
map and pixel shuffling is done using Arnold cat map. The
process of decryption is same as encryption the same key is
used for both the processes. This process will help to secure
the data and unauthorized people cannot access the data.
REFERENCES
[1] Anita A. Lahane, Pranjali Sankhe, Surabhi Singh,
Shruti Pimple,” An Image Encryption and
Decryption Using Chaotic Technique” Multicon-W:-
CRTCE-2018 ISBN : 978-0-9994483-0-4 paper id-
111
[2] Mintu “An Image Encryption & Decryption
Approach Based on Pixel Shuffling Using ArnoldCat
Map & Henon Map” by Agyan Kumar Prusty,
AsutoshPattanaik, Swastik Mishra published in
2013 International Conference on Advanced
Computing and Communication Systems(ICACCS-
2013),Dec.19-21,2013,coimbatore,India
[3] G.Chaitanya,B.Keerthi,A.Saleem,”Animage
Encryption and decryption using chaos algorithm”
IOSR Journal of Electronics and Communication
Engineering (IOSR-JECE) eISSN:2278-2834,P-ISSN:
2278- 8735. Volume 10,IssUe ,Ver.11
(MarApr2015),pp103-108
http://www.osrjournal.org
[4] Yung Dong jiasheng Liu;canyan zhu; yiming
wang;”Image encryption algorithmbasedonchaotic
mapping” computer science and information
technology(ICCSIT),2010
[5] Komal D Patel, SonalBelani“ImageEncryptionUsing
Different Techniques: A Review” International
Journal of Emerging Technology and Advanced
Engineering www.ijetae.com (ISSN 2250-2459,
Volume 1, Issue 1, November 2011).
[6] Mayank mishra,prashant singh,chinmay garg “A
new algorithm of encryption and decryption of
image using chaotic mapping” international journal
of information computation technology ISSN 0974-
2239 Volume4 number7(2014)pp.741-746
international research publication house
http://www.irphouse.com
[7] International Conference on Volume: 1 ‘Publication
Year:, Page(s): 289 – 291.Long Min; Huang
Lu.“Design and Analysis of a novel Chaotic Image
Encryption.” International Conferenceoncomputer
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1904
Modelling and Simulation (ICCMS’10),vol1,pp517-
520, 2010.
[8] M. Suneel, “Cryptographic Pseudo-random
Sequences from the Chaotic Henon Map.” Sadhana,
vol. 34, no. 5, pp. 689–701, 2009.
[9] N.K.Pareek,V.Patidar,K.K.Sud “image encryption
using chaotic logistic map” image and vision
computingvol24,no.9,2006,pp.926934
http://www.irjet.org
[10] H.S. Kwok, W. K. S.Tang, “A fast image encryption
system based on chaotic maps with finite precision
representation.” Chaos, Solitons and Fractals, vol.
32,pp. 1518–1529, 2007.
[11] Li S, Mou X, Cai Y. “Pseudo-random bit generator
based on couple chaotic systems and in application
of its stream- cipher cryptography.” LNCS, 2247.
Berlin,pp. 316–29, 2001

More Related Content

What's hot

3D Reconstruction from Multiple uncalibrated 2D Images of an Object
3D Reconstruction from Multiple uncalibrated 2D Images of an Object3D Reconstruction from Multiple uncalibrated 2D Images of an Object
3D Reconstruction from Multiple uncalibrated 2D Images of an ObjectAnkur Tyagi
 
Histogram Processing
Histogram ProcessingHistogram Processing
Histogram ProcessingAmnaakhaan
 
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...CSCJournals
 
Implementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection TechniqueImplementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection TechniqueIRJET Journal
 
Practical Digital Image Processing 2
Practical Digital Image Processing 2Practical Digital Image Processing 2
Practical Digital Image Processing 2Aly Abdelkareem
 
Histogram Operation in Image Processing
Histogram Operation in Image ProcessingHistogram Operation in Image Processing
Histogram Operation in Image ProcessingVARUN KUMAR
 
Intensity Transformation
Intensity TransformationIntensity Transformation
Intensity TransformationAmnaakhaan
 
Dital Image Processing (Lab 2+3+4)
Dital Image Processing (Lab 2+3+4)Dital Image Processing (Lab 2+3+4)
Dital Image Processing (Lab 2+3+4)Moe Moe Myint
 
Image recogonization
Image recogonizationImage recogonization
Image recogonizationSANTOSH RATH
 
Practical Digital Image Processing 3
 Practical Digital Image Processing 3 Practical Digital Image Processing 3
Practical Digital Image Processing 3Aly Abdelkareem
 
Practical Digital Image Processing 5
Practical Digital Image Processing 5Practical Digital Image Processing 5
Practical Digital Image Processing 5Aly Abdelkareem
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemiaemedu
 

What's hot (18)

I0343065072
I0343065072I0343065072
I0343065072
 
5 1-10
5 1-105 1-10
5 1-10
 
3D Reconstruction from Multiple uncalibrated 2D Images of an Object
3D Reconstruction from Multiple uncalibrated 2D Images of an Object3D Reconstruction from Multiple uncalibrated 2D Images of an Object
3D Reconstruction from Multiple uncalibrated 2D Images of an Object
 
Histogram Processing
Histogram ProcessingHistogram Processing
Histogram Processing
 
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
 
Implementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection TechniqueImplementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection Technique
 
Practical Digital Image Processing 2
Practical Digital Image Processing 2Practical Digital Image Processing 2
Practical Digital Image Processing 2
 
Kk3517971799
Kk3517971799Kk3517971799
Kk3517971799
 
Histogram Operation in Image Processing
Histogram Operation in Image ProcessingHistogram Operation in Image Processing
Histogram Operation in Image Processing
 
PPT s04-machine vision-s2
PPT s04-machine vision-s2PPT s04-machine vision-s2
PPT s04-machine vision-s2
 
Intensity Transformation
Intensity TransformationIntensity Transformation
Intensity Transformation
 
Dital Image Processing (Lab 2+3+4)
Dital Image Processing (Lab 2+3+4)Dital Image Processing (Lab 2+3+4)
Dital Image Processing (Lab 2+3+4)
 
Medial axis transformation based skeletonzation of image patterns using image...
Medial axis transformation based skeletonzation of image patterns using image...Medial axis transformation based skeletonzation of image patterns using image...
Medial axis transformation based skeletonzation of image patterns using image...
 
Orb feature by nitin
Orb feature by nitinOrb feature by nitin
Orb feature by nitin
 
Image recogonization
Image recogonizationImage recogonization
Image recogonization
 
Practical Digital Image Processing 3
 Practical Digital Image Processing 3 Practical Digital Image Processing 3
Practical Digital Image Processing 3
 
Practical Digital Image Processing 5
Practical Digital Image Processing 5Practical Digital Image Processing 5
Practical Digital Image Processing 5
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance system
 

Similar to Image Encryption Using Henon Map and Arnold Cat Map

COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
A new approach of colour image encryption based on henon like chaotic map
A new approach of colour image encryption based on henon like chaotic mapA new approach of colour image encryption based on henon like chaotic map
A new approach of colour image encryption based on henon like chaotic mapAlexander Decker
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionIRJET Journal
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET Journal
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling cscpconf
 
New Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image EncryptionNew Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image Encryptiontayseer Karam alshekly
 
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPSIMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPSIJNSA Journal
 
Block Image Encryption using Wavelet
Block Image Encryption using WaveletBlock Image Encryption using Wavelet
Block Image Encryption using WaveletIRJET Journal
 
New Technique for Image Encryption Based on Choas and Change of MSB
New Technique for Image Encryption Based on Choas and Change of MSBNew Technique for Image Encryption Based on Choas and Change of MSB
New Technique for Image Encryption Based on Choas and Change of MSBEditor IJCATR
 
Enhancement and Analysis of Chaotic Image Encryption Algorithms
Enhancement and Analysis of Chaotic Image Encryption Algorithms Enhancement and Analysis of Chaotic Image Encryption Algorithms
Enhancement and Analysis of Chaotic Image Encryption Algorithms cscpconf
 
Super Resolution of Image
Super Resolution of ImageSuper Resolution of Image
Super Resolution of ImageSatheesh K
 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsTELKOMNIKA JOURNAL
 
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat mapA New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat maptayseer Karam alshekly
 

Similar to Image Encryption Using Henon Map and Arnold Cat Map (20)

T01022103108
T01022103108T01022103108
T01022103108
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
A new approach of colour image encryption based on henon like chaotic map
A new approach of colour image encryption based on henon like chaotic mapA new approach of colour image encryption based on henon like chaotic map
A new approach of colour image encryption based on henon like chaotic map
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
 
New Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image EncryptionNew Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image Encryption
 
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPSIMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
 
Block Image Encryption using Wavelet
Block Image Encryption using WaveletBlock Image Encryption using Wavelet
Block Image Encryption using Wavelet
 
New Technique for Image Encryption Based on Choas and Change of MSB
New Technique for Image Encryption Based on Choas and Change of MSBNew Technique for Image Encryption Based on Choas and Change of MSB
New Technique for Image Encryption Based on Choas and Change of MSB
 
Journal_ICACT
Journal_ICACTJournal_ICACT
Journal_ICACT
 
Enhancement and Analysis of Chaotic Image Encryption Algorithms
Enhancement and Analysis of Chaotic Image Encryption Algorithms Enhancement and Analysis of Chaotic Image Encryption Algorithms
Enhancement and Analysis of Chaotic Image Encryption Algorithms
 
Super Resolution of Image
Super Resolution of ImageSuper Resolution of Image
Super Resolution of Image
 
B070306010
B070306010B070306010
B070306010
 
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
Security Enhancement of Image Encryption Based on Matrix Approach using Ellip...
 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systems
 
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat mapA New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
 
Pg3426762678
Pg3426762678Pg3426762678
Pg3426762678
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 

Recently uploaded (20)

Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 

Image Encryption Using Henon Map and Arnold Cat Map

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1900 An Image Cryptography using Henon Map and Arnold Cat Map. Pranjali Sankhe1, Shruti Pimple2, Surabhi Singh3, Anita Lahane4 1,2,3 UG Student VIII SEM, B.E., Computer Engg., RGIT, Mumbai, India 4Assistant Professor, Department of Computer Engg., RGIT, Mumbai, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In this digital world i.e. the transmission of non- physical data that has been encoded digitally for the purpose of storage Security is a continuous process via which data can be secured from several active and passive attacks.Encryption technique protects the confidentiality of a message or information which is in the form of multimedia (text, image, and video).In this paper, a new symmetric image encryption algorithm is proposed based on Henon’s chaotic system with byte sequences applied with a novel approachofpixelshuffling of an image which results in an effective and efficient encryption of images. The Arnold Cat Map is a discrete system that stretches and folds its trajectories in phase space. Cryptography is the process of encryption and decryption of the data and used for making data, images secure and confidential . There is also a other side where the attackers, unauthorized user gets an opportunity to reuse, retrieve, disturb the images. In this paper we will apply the chaotic encryption and chaotic decryption on an image. Chaotic Algorithm is a well-used method in real time secure image transmission system. Key Words: Encryption and Decryption, Chaotic maps, Arnold cat map, Henon map, Pseudo-Random values, Pixel shuffling, Cryptography, Chaotic System. 1.INTRODUCTION Multimedia is defined as the field that deals with different forms of information such as text, images, audio and videos in an integrated fashion. Now-a-daysdigital imagesareused frequently for communication. Any information sharedover Internet needs high level of protection from intruders Cryptography is the art of protecting information by transforming readable information (plain data) into unreadable format (cipher) with the help of well-structured encryption algorithms and secret keys. Cryptography scheme is of two types. One is known as symmetric key cryptography in which a single secret key is used for both, encryption at sender’send and decryption at receiver’s end. Chaotic systems are sensitive, non-liner, deterministic and easy to reconstruct after filling in the image. Henon map is one of the chaotic map used for generating Pseudo-random sequence required for encryption. Aseverything hasitspros and cones, the risk of data corruption, forging,data extraction, etc. has been a boon to the hackers. Hence to protect from the above the technology called cryptography was introduced. Cryptography means the method of storing and transmitting required data in a particular form so that legal users can only read and process it. 2. METHODOLOGY 2.1 HENON MAP 1. The Henon map is a discrete time dynamic system introduces by michel henon. 2. The map depends on two parameters, a and b, which for the classical Henon map have valuesof a=1.4and b = 0.3. For the classical values the Henon map is chaotic. For other values of a and b the map may be chaotic, intermittent, or converge to a periodic orbit. 3. These slopes arise from the linearizations of the stable manifold and unstable manifold of the fixed point. The unstable manifold of the fixed point in the attractor is contained in the strange attractor of the Henon map. 4. It is a simplified model of coincare section of the lorenz model it is one of the most studied example of dynamically systems that exhibits chaotic behaviour it takes (x0,y0) in the plane and map it to a new point. 5. FORMULA: Xn+1=Yn+1-a*xn*xn Yn+1=b*xn Here, the parameters, a and b are prime importance as the dynamic behaviour of system depends on these values.The system cannot be chaotic unless the value of a and b are 1.4 and 0.3 respectively. For other values of a and b, the map behaves as chaotic, intermittent, or obtain a periodic orbit. Initial points X1 and Y1 [11] work as a symmetric key for chaotic cryptographic system used forencryptionatsender’s end and decryption at receiver’s end. Since Henon map is deterministic so decryption of the cipher image will reconstruct the original image at receiver’s end with the same initial points X1 and Y1. Thus, sensitivity of key and encryption algorithm together contributes to avoid all kind of cryptanalysis attacks. Fig 2.1: Henon key
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1901 2.2 ARNOLD’S CAT MAP 1. Arnold cat map was discovered by Valdimir Arnold in 1960. it takes the logics from linear algebra and uses them to change the pixel positionswithrespect to the original image. The Arnold Cat Map is a discrete system that stretches and folds its trajectories in phase space. 2. Arnold cat map has a unique hyperbolic fixed point (the vertices of the square). The linear transformation which definesthemapishyperbolic: its eigen values are irrational numbers, one greater and the other smaller than 1 (in absolute value), so they are associated respectively to an expanding and a contracting eigenspace which are also the stable and unstable manifolds. The eigenspace are orthogonal because the matrix is symmetric. 3. Defining the momentum variable pt = qt - qt-1, the above second order dynamics can be re-writtenasa mapping of the square 0 q, p ¡ N 4. Arnold cat Map is a transformation that can be applied to an image. The pixels of the image appear to be randomly rearranged, but when the transformation is repeated enough times, the original image will reappear. If we let X a= x Y be a n x n matrix of some image, Arnold’s cat map is the transformation R x x +y Y x+2y mod n For example, 3.142 mod1 142 or 150 mod100=50 or 123 23 154 mod 100= 54 Since the signs of both arguments are the same sign in the Exercise,the modulo will simply be the reminder of long division of x+y X+2y and n To better understand the mechanism of the transformation let us decompose it into its elemental pieces. Fig 2.2.1 : Arnold map Included below is a visual aide illustrating these steps. The first step shows the shearing in the x and y-directions, followed by evaluation of the modulo and reassembly of the image. Fig 2.2.2: original image stretch by Arnold cat and pixel shuffel 3. ALGORITHMS. 3.1. ENCRYPTION ALGORITHM 3.1.1. The original image of .jpg or .jpeg format is chosen for the process of encryption. 3.1.2. Pixel extraction is done of the input image by taking the image dimension i.e. Height andWidth of the image. 3.1.3. Pixel shuffling of pixelsof the input imageisdone by using the Arnolds Cat map which is chaotic in nature. 3.1.4. Generation of Key values or the pseudo-random numbersusing the Henon map whichischaoticin nature. 3.1.5. XOR operation is done between the pixel values generated from the input image and the key values generated by Henon map. 3.1.6. Cipher image or Encrypted image is done successfully and encryption process is over.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1902 3.2 DECRYPTION ALGORITHM 3.2.1. The cipher image which got from the process of encryption is chosen for the process of decryption. 3.2.2. Pixel extraction is done of the cipher image by taking the image dimension i.e. Height andWidth of the cipher image. 3.2.3. Pixel shuffling of pixels of the cipher image is done by using the Arnolds Cat map which is chaotic in nature. 3.2.4. Generation of Key values using the Henon map which behaves chaotically. 3.2.5. XOR operation is done between the pixel values and the key values generated by Henon map. 3.2.6. Original image is brought back from the cipher image successfully and decryption process is over. 4. SYSTEM DESIGN ARCHITECTURE. Fig 4:Architecture of image encryption and decryption 5. RESULTS. In this section, results of the proposed image encryption algorithm are illustrated to appreciate the efficiency of proposed algorithm. Here, test image of size 256×256 is shown in Figure 5(a). The initial parameters for Henon map are chosen as a=1.4 and b=0.3 to make the system chaotic. Secret symmetric key for encryption is a combination of X1=0.01 and Y1=0.02. Figure 5(b) and Figure 5(c) illustrates shuffled image after two iterations and encrypted image respectively. Figure 5.1: Encryption by Chaotic System Figure 5.2: Decryption by Chaotic System Example of Arnold cat map. For example, a 101 x 101 image has a period of twenty-five; whereas, a 124 x 124 image, as we just learned, has a period of fifteen. Other luminarieshave found a relationship where this experimenter failed – but it certainly cannot be claimed to be elegant nor robust . After fifteen iterations, the pixel – aswould anyotherpixelin the image – has returned to its initial position, and it would continue eternally along this circle if iterated accordingly. This agrees with the earlier observation that the 124 x 124 image has a period of fifteen. 5.1.a)Origin al image 5.1.b)Shuffle image 5.1.c)Cipher image 5.2.a) cipher image 5.2.b)shuffled image after decryption 5.2.c) original image Input image of n*n matrix Pixel shuffling( Arnold cat map) Pixel value transformati on(henon map XOR pixel values) Encryp ted image Encryp ted image Pixel value transformatio n (pixel value XOR henon map) Pixel reshuffling using Arnold map Decryp ted image
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1903 6. IMPLEMENTATION OUTPUT Fig 6.1 : GUI of henon and Arnold cat map. Fig 6.2: output of Arnold cat map Fig 6.3: henon map output 7. CONCLUSION In this paper, the chaotic system is highly sensitive to initial values and parameters of the system the security relies on a secret key along with the image encryption technique.Chaos is known for randomness, so it is highly secured. We used the randomness property of chaotic scheme i.e Arnold cat map and Henon map. The key value isgeneratedusinghenon map and pixel shuffling is done using Arnold cat map. The process of decryption is same as encryption the same key is used for both the processes. This process will help to secure the data and unauthorized people cannot access the data. REFERENCES [1] Anita A. Lahane, Pranjali Sankhe, Surabhi Singh, Shruti Pimple,” An Image Encryption and Decryption Using Chaotic Technique” Multicon-W:- CRTCE-2018 ISBN : 978-0-9994483-0-4 paper id- 111 [2] Mintu “An Image Encryption & Decryption Approach Based on Pixel Shuffling Using ArnoldCat Map & Henon Map” by Agyan Kumar Prusty, AsutoshPattanaik, Swastik Mishra published in 2013 International Conference on Advanced Computing and Communication Systems(ICACCS- 2013),Dec.19-21,2013,coimbatore,India [3] G.Chaitanya,B.Keerthi,A.Saleem,”Animage Encryption and decryption using chaos algorithm” IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) eISSN:2278-2834,P-ISSN: 2278- 8735. Volume 10,IssUe ,Ver.11 (MarApr2015),pp103-108 http://www.osrjournal.org [4] Yung Dong jiasheng Liu;canyan zhu; yiming wang;”Image encryption algorithmbasedonchaotic mapping” computer science and information technology(ICCSIT),2010 [5] Komal D Patel, SonalBelani“ImageEncryptionUsing Different Techniques: A Review” International Journal of Emerging Technology and Advanced Engineering www.ijetae.com (ISSN 2250-2459, Volume 1, Issue 1, November 2011). [6] Mayank mishra,prashant singh,chinmay garg “A new algorithm of encryption and decryption of image using chaotic mapping” international journal of information computation technology ISSN 0974- 2239 Volume4 number7(2014)pp.741-746 international research publication house http://www.irphouse.com [7] International Conference on Volume: 1 ‘Publication Year:, Page(s): 289 – 291.Long Min; Huang Lu.“Design and Analysis of a novel Chaotic Image Encryption.” International Conferenceoncomputer
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1904 Modelling and Simulation (ICCMS’10),vol1,pp517- 520, 2010. [8] M. Suneel, “Cryptographic Pseudo-random Sequences from the Chaotic Henon Map.” Sadhana, vol. 34, no. 5, pp. 689–701, 2009. [9] N.K.Pareek,V.Patidar,K.K.Sud “image encryption using chaotic logistic map” image and vision computingvol24,no.9,2006,pp.926934 http://www.irjet.org [10] H.S. Kwok, W. K. S.Tang, “A fast image encryption system based on chaotic maps with finite precision representation.” Chaos, Solitons and Fractals, vol. 32,pp. 1518–1529, 2007. [11] Li S, Mou X, Cai Y. “Pseudo-random bit generator based on couple chaotic systems and in application of its stream- cipher cryptography.” LNCS, 2247. Berlin,pp. 316–29, 2001