SlideShare a Scribd company logo
Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications
14
A New Approach of Colour Image Encryption Based on Henon
like Chaotic Map
Ramesh Kumar yadava#
, Dr. B. K.singh*, S.K.sinha*, K. K.pandey*
, #
#
Department of computer science and engineering, AISECT University BHOPAL
1
mailramesh28@gmail.com
3
third.author@first-third.edu
*
AISECT UNIVERSITY
Mendua, Bhojpur Raisen Bhopal INDIA
2
skrishna24it@gmail.com
Abstract
In modern era of digital world, exchange of information in form of image often very frequently over
communication channel, the secrecy of multimedia data like images becomes very important, The issue of
secrecy for image resolved In many digital applications such as sensitive visual aids, broadcasting, military
services, rare satellites images and confidential medical images etc. To reduce the processing overhead with the
concern of Real-time data transmission application, to reduce such a huge file processing cost, we needs to
enhance our encryption/decryption techniques. This paper proposed a novel image encryption technique based
on Hannon like chaotic map. Chaos-based image encryption technique is one of the more promising encryption
algorithms that provide very efficient and fast way of image encryption due to its ubiquitous phenomenon in
deterministic nonlinear systems that exhibit extreme sensitivity to initial condition and random like behaviours.
Keywords— Image RGB colour component, image encryption, Henon map, chaotic system.
I. INTRODUCTION
Encryption is a common technique to uphold multimedia image security in storage and transmission over the
network due to some inherent features of image like high data redundancy and bulk data capacity. The
encryption of image differs from that of text. With the development of multimedia technology the transmission
of information as image and video is extensively used in real time data transmission. The digital image is widely
used in our lives to resolve in many applications such as Geoinformation system, military image database,
medical imaging system etc. for secure transmission of data, there is prime concern to provide security to these
multimedia data, resulting in encryption of data. Most of conventional algorithm does not have the efficient
capability for securing multimedia data containing image due to the complexity of algorithm and perfect
correlation between pixel values of image. Several reviews has been proposed on multimedia data protection
such as information hiding which include steganography, anonymity, watermarking. The other is encryption
which includes conventional encryption technique. Last some decade relatively new approach has been
extensively used, namely chaos based selective image encryption which provides relatively sufficient security
and confidentiality. A symmetric block encryption algorithm creates a chaotic map used for permuting and
diffusing multimedia image data. In permutation the pixel of image are replaced by another value and in the
process of diffusion the pixel values are shuffled within the image. This paper proposed a colour image
encryption technique which is very simple in implementation with high level of efficiency, which is based on
Henon chaotic system. Henon map is a discrete time dynamic system which exhibit chaotic behaviour which we
used to produce a uniform distribution of pixels of image. In proposed method we take a bit stream of RGB
component of colour image which is the input for the Encryption algorithm. The rest or this paper is organized as
follows. Section 2 describes the feature of chaos. Section 3 explains Henon map and its implementation. Section
4 present Encryption and decryption algorithm. Section 5 describes the experimental result to show the proof of
robust algorithm. Section 6 shows the simulation analysis of security through Mat Lab. Section 7 concludes the
paper.
II. FEATURE OF CHAOS
Chaos is a ubiquitous phenomenon existing in deterministic nonlinear systems that exhibit sensitivity to initial
conditio and have random like behaviour. Mathematically one dimensional chaos map can be represented as:
Xp+1 = f (Xp), f: I → I, Xo ε I,
Where f is a continuous map on the interval I = [0, 1].
With the following propriety:
1. Sensitive to initial condition this sensitivity property is utilized for the keys of cryptosystems..
Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications
15
2. Topological transitivity which linked to the diffusion feature of cryptosystem.
3. Density of periodic points in I.
Above two properties often used to construct stream cipher and block cipher in chaotic cryptography. Because
the property of sensitivity of initial condition make the encryption very complicated. Sequence is also
sensitive to control parameter. For image encryption chaotic system can be represented by Fig 1. The initial
value of chaotic map takes the original image as input, sequence of bit provided by user mapped as control
parameter. Output chaotic sequence produces the cipher image.
Fig. 1. Basic architecture of chaotic map
Small change in input bit stream produce a huge change in output bit stream after multiple round. Slight change
of user key also produces totally different output sequence of bit stream.
III. HENON CHAOTIC MAP
The map was introduced by Michel Henon as a simplified model of the Poincare section of the Lorenz model.
For the canonical map, an initial point of the plane will either approach a set of points known as the Henon
strange attractor, or diverge to infinity. Two dimensional Henon map takes a point (Xn, Yn) in the plane and
maps it to a new point:
Xn+1 = Yn + 1 – aX
2
n
Yn+1 = bXn where a > 0 and |b| < 1, n = 0, 1, 2…
Henon Map depends on two parameter a and b. these parameter values determine the chaotic behaviour of map.
The
Most representative form of Henon map for canonical constant values a = 1.4 and b = 0.3 as we can see in Fig. 2.
In which The Henon map reflects as chaotic attractor. The propose colour image encryption is based on Henon
chaotic map, Henon like mapping used sin function which include a frequency control parameter w for
maintaining their chaotic behaviour . The Henon like mapping equation which used in our present image
encryption technique is a mathematical concept, where time dependency of any point determines by the fixed
prescribed rule in geometrical space. In our proposed encryption technique we used Henon like chaotic map
mathematically defined as
Xn+2 = 1 – aX
2
n+1 + bsin (wxn)
Which contain frequency control parameter w to control the Henon like chaotic signal. Encrypted Henon chaotic
signal looks like distortion to unauthorized users ignoring to decrypt it, due to some specific characteristic such
as nonperiodicity, ergodicity, randomicity.
Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications
16
Fig. 2. Chaotic nature of the Henon map
IV.ENCRYPTION AND DECRYPTION ALGORITHM
The proposed encryption algorithm is based on Henon like mapping. Our algorithm is based on fully layered
encryption technique to provide higher level of confidentiality. We used colour image for the encryption
process in our proposed technique we can also used same technique for Gray scale image. We perform the colour
transformation to separate the RGB colour in its component matrix. For Gray scale image there is no need of
colour transformation. Then we select any one of the component (RGB) matrix for encryption to reduce the
computational overhead. The encryption process perform in the study can be seen in Fig. 3.
(1) Encryption process:
Step 1. The Henon like chaotic system is converted in to one-dimensional chaotic map. One dimensional Henon
chaotic map mathematically is defined as:
Xn+2 = 1 - aX
2
n+1 + bsin (wxn)…………….(1)
Step 2. Transform the colour image in to its (RGB) 3 pieces of component matrix.
Step 3. One dimensional Henon chaotic map obtain in (1) takes R component of colour image to generate the
random bit stream.
Step 4. The bit vales obtained in previous step is bit XOR with the original pixel values of R component of
original transform matrix.
Step 5. The vector result of G and B component of transform colour image with the matrix after bit XOR
obtained from the previous stage produce the cipher image.
Deterministic behaviour of chaotic map able us to reproduce the original image by providing the secret key
component such as initial condition, system parameter, and number of iteration.
(2) Decryption process:
Step 1. The Henon like chaotic system is converted into one-dimensional chaotic map. One dimensional Henon
chaotic map mathematically defined as
Xn+2 = 1 – X
2
n+1 + b sin(wXn) which is same as during encryption process.
Step 2. Perform colour transformation so that the colour image component RGB has been separated as in
encryption process.
Step 3. Select the secret key and parameter as used in encryption with the Henon chaotic map function same as
(1). This process generates the transform matrix of pixel values of R component of image.
Step 4. The XOR operation is computed bit- by- bit between the transform matrix of pixel values of R
component of image and the bit values of the R component of cipher image as (2).
Step 5. Vector of the decryption result is returned as the value of RGB using the image transformation to
produce the original image.
Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications
17
Fig. 3. Encryption process
V. EXPERIMENTAL RESULT
The experimental analysis of proposed technique is based on Histogram analysis through Mat Lab. Histogram
analysis show the distribution of pixel values between plane image and cipher image, if Histogram of plane
image and cipher image has significant diversity then we can say cipher image does not give any clue to perform
brute force or cryptanalysis attack on the encryption algorithm. We take Lena plane image with the size 256*256
as shown in Fig 4. The histogram of this plane image is shown in Fig. 5. We use frequency parameter w and X0,
X1 as the keys. Using X0 = 0.011, X1 = 0.021 and w = 08071982, the encrypted image is shown in Fig. 6 and
corresponding histogram of encrypted image is shown Fig. 7. Chaos system is reversible in nature after
Decryption we get back the original Lena image as shown in Fig. 7. Proposed technique is based on single
channel encryption. We encrypt only R component of the plane image and leave other G and B component as
such after combining these component we get the cipher image. Fig. 7 shows the Histogram of ‘Original R
component and Fig. 8 shown the Histogram of corresponding encrypted R component.
Fig. 4. Original Plane Lena image
Plane
image
Transformasi
image
G
R
B
Chaosbased
encryption-n
G
R
B
BitXOR
G
R
B
Cipher
image
Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications
18
Fig. 5. Histogram of Plane Lena image
Fig. 6. Encrypted Lena Image
VI.SIMULATION ANALYSIS OF SECURITY
To determine the proposed technique is robust, we use to perform analysis and testing of the encryption
algorithm sues different parameter, like Histogram analysis is used to decide the colour distribution between the
plane image and cipher image. Both the Histogram gives the significant difference to decide the robustness of
encrypted algorithm.
Fig. 4. Represent the Histogram of original lena image and Fig. 5. Represent the histogram of corresponding
encrypted image. Both Histograms has significant difference which shows there is no possibility of brute-force
attack. Similarly from the Fig. and Fig. shows the Histogram of original R channel and encrypted R channel,
both the Histogram shows the significant amount of difference due to their pixel distribution. In our proposed
algorithm we used w and the initial value X0,X1 as a secret key. Henon like chaotic system is very sensitive to
initial condition and parameter. The experimental result demonstrates the encryption algorithm is very sensitive
to the secret key. In our experiment if we change the secret
Fig. 7. Decrypted Lena Image
Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications
19
Fig. 8. Histogram of original R component
Fig. 9. Histogram of Encrypted R component
Key X0 from X0= 0.001 to X0= 0.0000000001 the resultant encrypted image become entirely changed form
original image. We take the different value of secret key for calculating the correlation coefficient between plane
image and cipher image and also find the Entropy of encrypted image for different key value, and then we find
the average correlation coefficient 0.000014 and average entropy 7.85200. The average Calculation of
correlation and entropy determine the quality of encrypted image. The higher value of entropy and lower
correlation between pixel values of encrypted image determine the safe encryption algorithm. The average result
of correlation coefficient and Entropy shows the guarantees of security of proposed scheme under any
cryptanalysis.
VII. CONCLUSION
this paper proposed a new colour image encryption algorithm based on Henon like chaotic map. The encryption
process applied on any RGB channel. The selected channel goes through the one dimensional Henon like chaotic
map to produce the random bit stream. This random bit stream bit XOR with the original pixel value of selected
channel to produce the encrypted image. The proposed scheme has multi-dimensional large key space to resist
the all possible type of brut-force attack. Several Experiments were carried out with numerical analysis, to shows
the robustness of proposed scheme. In the future work we intend to make our system to achieve more flexible,
reliable and higher level of quality performance in real time system.
ACKNOWLEDGEMENT
The study taken up during perusing M.Tech (computer science & Engineering) in partially supported by IT
infrastructure development project, Department of Information Technology, Govt of India.
REFERENCES
1. Chen Wei-bin, Zhang Xin, Image Encryption Algorithm Based on Henon chaotic System, International
Conference on image Analysis and Signal Processing, 2009, pp. 94-97.
2. Li Chuanmu, Hong Lianxi, A New Image encryption scheme based on Hyper chaotic Sequence, IEEE
International Workshop on Ant counterfeiting, Security, Identification, IEEE 2007, pp. 237-240.
3. Long Min, Huang Lu, Design and Analysis of a novel Chaotic Image Encryption. International conference
on Computer Modeling and Simulation(ICCMS’ 10), Vol 1,2010.pp. 517-520.
4. S. Behnia, A. Akhshani, H. Mahmodi and A. Akhavan, A novel Algorithm for image Encryption based on
Mixture of Chaotic Maps, Chaos, Solutions and Fractals, Vol. 35, 2008, pp. 408-419.
Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications
20
5. Kocarev L, Chaos-based Cryptography, a brief overview. IEEE Circ Syst2001,1.6-21.
6. D. Xiao, X. Liao and P. Wei, Analysis and Improvement of a Chaos-Based Image Encryption Algorithm,
“Chaos Solution & Fractials, Vol.pp.40,2007.
7. Y. Wanga, K.W. Wanga, X. F. Liao and G. R. Chen, A New Chaos-Based Fast Image Encryption
Algorithm, Applied Soft Computing, Vol. 11, No. 1, 2011, pp. 514-522.
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
CALL FOR PAPERS
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/Journals/
The IISTE editorial team promises to the review and publish all the qualified
submissions in a fast manner. All the journals articles are available online to the
readers all over the world without financial, legal, or technical barriers other than
those inseparable from gaining access to the internet itself. Printed version of the
journals is also available upon request of readers and authors.
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

More Related Content

What's hot

T01022103108
T01022103108T01022103108
T01022103108
IOSR Journals
 
Visual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesVisual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful Shares
Debarko De
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
ijma
 
3 e.balamurugan 14-17
3 e.balamurugan 14-173 e.balamurugan 14-17
3 e.balamurugan 14-17
Alexander Decker
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
ijctet
 
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
IJORCS
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
ijctet
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
Alexander Decker
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
editor1knowledgecuddle
 
A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...
IJECEIAES
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
AneeshGKumar
 
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYTEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
IJCSEA Journal
 
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region
IJECEIAES
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
editor1knowledgecuddle
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain
ijcisjournal
 
Kk3517971799
Kk3517971799Kk3517971799
Kk3517971799
IJERA Editor
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color images
iaemedu
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
IJERA Editor
 

What's hot (18)

T01022103108
T01022103108T01022103108
T01022103108
 
Visual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesVisual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful Shares
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
 
3 e.balamurugan 14-17
3 e.balamurugan 14-173 e.balamurugan 14-17
3 e.balamurugan 14-17
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYTEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
 
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain
 
Kk3517971799
Kk3517971799Kk3517971799
Kk3517971799
 
Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color images
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
 

Viewers also liked

Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...
Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...
Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...
eSAT Journals
 
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
Sajid Iqbal
 
Jammer
JammerJammer
An encryption scheme using chaotic map and
An encryption scheme using chaotic map andAn encryption scheme using chaotic map and
An encryption scheme using chaotic map and
jpstudcorner
 
P1151351311
P1151351311P1151351311
P1151351311
Ashraf Aboshosha
 
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаосМ.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
Project KRIT
 
Chaos Analysis
Chaos AnalysisChaos Analysis
Chaos Analysis
Divya Lekha
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
Ancy Mariam Babu
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
Pradeep Vishwakarma
 
Chaos Theory: An Introduction
Chaos Theory: An IntroductionChaos Theory: An Introduction
Chaos Theory: An Introduction
Antha Ceorote
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
Aashish R
 

Viewers also liked (11)

Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...
Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...
Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...
 
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
 
Jammer
JammerJammer
Jammer
 
An encryption scheme using chaotic map and
An encryption scheme using chaotic map andAn encryption scheme using chaotic map and
An encryption scheme using chaotic map and
 
P1151351311
P1151351311P1151351311
P1151351311
 
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаосМ.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
 
Chaos Analysis
Chaos AnalysisChaos Analysis
Chaos Analysis
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Chaos Theory: An Introduction
Chaos Theory: An IntroductionChaos Theory: An Introduction
Chaos Theory: An Introduction
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 

Similar to A new approach of colour image encryption based on henon like chaotic map

COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
IRJET- An Image Cryptography using Henon Map and Arnold Cat Map
IRJET-  	  An Image Cryptography using Henon Map and Arnold Cat MapIRJET-  	  An Image Cryptography using Henon Map and Arnold Cat Map
IRJET- An Image Cryptography using Henon Map and Arnold Cat Map
IRJET Journal
 
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
IJECEIAES
 
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPSIMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
IJNSA Journal
 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systems
TELKOMNIKA JOURNAL
 
Ijcatr04021016
Ijcatr04021016Ijcatr04021016
Ijcatr04021016
Editor IJCATR
 
Enhancement and Analysis of Chaotic Image Encryption Algorithms
Enhancement and Analysis of Chaotic Image Encryption Algorithms Enhancement and Analysis of Chaotic Image Encryption Algorithms
Enhancement and Analysis of Chaotic Image Encryption Algorithms
cscpconf
 
Pg3426762678
Pg3426762678Pg3426762678
Pg3426762678
IJERA Editor
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
IRJET Journal
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET Journal
 
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET-  	  A Review Paper on Chaotic Map Image Encryption TechniquesIRJET-  	  A Review Paper on Chaotic Map Image Encryption Techniques
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET Journal
 
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
sipij
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
IJTET Journal
 
B070306010
B070306010B070306010
B070306010
IJERD Editor
 
Secure image hiding in speech signal by steganography-mining and encryption
Secure image hiding in speech signal by steganography-mining  and encryptionSecure image hiding in speech signal by steganography-mining  and encryption
Secure image hiding in speech signal by steganography-mining and encryption
nooriasukmaningtyas
 
mini prjt
mini prjtmini prjt
Chaotic systems with pseudorandom number generate to protect the transmitted...
Chaotic systems with pseudorandom number generate to  protect the transmitted...Chaotic systems with pseudorandom number generate to  protect the transmitted...
Chaotic systems with pseudorandom number generate to protect the transmitted...
nooriasukmaningtyas
 
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
IJET - International Journal of Engineering and Techniques
 
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
IJET - International Journal of Engineering and Techniques
 

Similar to A new approach of colour image encryption based on henon like chaotic map (20)

COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
IRJET- An Image Cryptography using Henon Map and Arnold Cat Map
IRJET-  	  An Image Cryptography using Henon Map and Arnold Cat MapIRJET-  	  An Image Cryptography using Henon Map and Arnold Cat Map
IRJET- An Image Cryptography using Henon Map and Arnold Cat Map
 
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
 
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPSIMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systems
 
Ijcatr04021016
Ijcatr04021016Ijcatr04021016
Ijcatr04021016
 
Enhancement and Analysis of Chaotic Image Encryption Algorithms
Enhancement and Analysis of Chaotic Image Encryption Algorithms Enhancement and Analysis of Chaotic Image Encryption Algorithms
Enhancement and Analysis of Chaotic Image Encryption Algorithms
 
Pg3426762678
Pg3426762678Pg3426762678
Pg3426762678
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
 
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET-  	  A Review Paper on Chaotic Map Image Encryption TechniquesIRJET-  	  A Review Paper on Chaotic Map Image Encryption Techniques
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
 
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
 
B070306010
B070306010B070306010
B070306010
 
Secure image hiding in speech signal by steganography-mining and encryption
Secure image hiding in speech signal by steganography-mining  and encryptionSecure image hiding in speech signal by steganography-mining  and encryption
Secure image hiding in speech signal by steganography-mining and encryption
 
mini prjt
mini prjtmini prjt
mini prjt
 
Chaotic systems with pseudorandom number generate to protect the transmitted...
Chaotic systems with pseudorandom number generate to  protect the transmitted...Chaotic systems with pseudorandom number generate to  protect the transmitted...
Chaotic systems with pseudorandom number generate to protect the transmitted...
 
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
 
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
[IJET-V2I4P10] Authors: Prof. Swetha.T.N, Dr. S.Bhargavi, Dr. Sreerama Reddy ...
 

More from Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
Alexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
Alexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
Alexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
Alexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
Alexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
Alexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
Alexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
Alexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
Alexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
Alexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
Alexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
Alexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
Alexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
Alexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
Alexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
Alexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
Alexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
Alexander Decker
 

More from Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Recently uploaded

Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 

Recently uploaded (20)

Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 

A new approach of colour image encryption based on henon like chaotic map

  • 1. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications 14 A New Approach of Colour Image Encryption Based on Henon like Chaotic Map Ramesh Kumar yadava# , Dr. B. K.singh*, S.K.sinha*, K. K.pandey* , # # Department of computer science and engineering, AISECT University BHOPAL 1 mailramesh28@gmail.com 3 third.author@first-third.edu * AISECT UNIVERSITY Mendua, Bhojpur Raisen Bhopal INDIA 2 skrishna24it@gmail.com Abstract In modern era of digital world, exchange of information in form of image often very frequently over communication channel, the secrecy of multimedia data like images becomes very important, The issue of secrecy for image resolved In many digital applications such as sensitive visual aids, broadcasting, military services, rare satellites images and confidential medical images etc. To reduce the processing overhead with the concern of Real-time data transmission application, to reduce such a huge file processing cost, we needs to enhance our encryption/decryption techniques. This paper proposed a novel image encryption technique based on Hannon like chaotic map. Chaos-based image encryption technique is one of the more promising encryption algorithms that provide very efficient and fast way of image encryption due to its ubiquitous phenomenon in deterministic nonlinear systems that exhibit extreme sensitivity to initial condition and random like behaviours. Keywords— Image RGB colour component, image encryption, Henon map, chaotic system. I. INTRODUCTION Encryption is a common technique to uphold multimedia image security in storage and transmission over the network due to some inherent features of image like high data redundancy and bulk data capacity. The encryption of image differs from that of text. With the development of multimedia technology the transmission of information as image and video is extensively used in real time data transmission. The digital image is widely used in our lives to resolve in many applications such as Geoinformation system, military image database, medical imaging system etc. for secure transmission of data, there is prime concern to provide security to these multimedia data, resulting in encryption of data. Most of conventional algorithm does not have the efficient capability for securing multimedia data containing image due to the complexity of algorithm and perfect correlation between pixel values of image. Several reviews has been proposed on multimedia data protection such as information hiding which include steganography, anonymity, watermarking. The other is encryption which includes conventional encryption technique. Last some decade relatively new approach has been extensively used, namely chaos based selective image encryption which provides relatively sufficient security and confidentiality. A symmetric block encryption algorithm creates a chaotic map used for permuting and diffusing multimedia image data. In permutation the pixel of image are replaced by another value and in the process of diffusion the pixel values are shuffled within the image. This paper proposed a colour image encryption technique which is very simple in implementation with high level of efficiency, which is based on Henon chaotic system. Henon map is a discrete time dynamic system which exhibit chaotic behaviour which we used to produce a uniform distribution of pixels of image. In proposed method we take a bit stream of RGB component of colour image which is the input for the Encryption algorithm. The rest or this paper is organized as follows. Section 2 describes the feature of chaos. Section 3 explains Henon map and its implementation. Section 4 present Encryption and decryption algorithm. Section 5 describes the experimental result to show the proof of robust algorithm. Section 6 shows the simulation analysis of security through Mat Lab. Section 7 concludes the paper. II. FEATURE OF CHAOS Chaos is a ubiquitous phenomenon existing in deterministic nonlinear systems that exhibit sensitivity to initial conditio and have random like behaviour. Mathematically one dimensional chaos map can be represented as: Xp+1 = f (Xp), f: I → I, Xo ε I, Where f is a continuous map on the interval I = [0, 1]. With the following propriety: 1. Sensitive to initial condition this sensitivity property is utilized for the keys of cryptosystems..
  • 2. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications 15 2. Topological transitivity which linked to the diffusion feature of cryptosystem. 3. Density of periodic points in I. Above two properties often used to construct stream cipher and block cipher in chaotic cryptography. Because the property of sensitivity of initial condition make the encryption very complicated. Sequence is also sensitive to control parameter. For image encryption chaotic system can be represented by Fig 1. The initial value of chaotic map takes the original image as input, sequence of bit provided by user mapped as control parameter. Output chaotic sequence produces the cipher image. Fig. 1. Basic architecture of chaotic map Small change in input bit stream produce a huge change in output bit stream after multiple round. Slight change of user key also produces totally different output sequence of bit stream. III. HENON CHAOTIC MAP The map was introduced by Michel Henon as a simplified model of the Poincare section of the Lorenz model. For the canonical map, an initial point of the plane will either approach a set of points known as the Henon strange attractor, or diverge to infinity. Two dimensional Henon map takes a point (Xn, Yn) in the plane and maps it to a new point: Xn+1 = Yn + 1 – aX 2 n Yn+1 = bXn where a > 0 and |b| < 1, n = 0, 1, 2… Henon Map depends on two parameter a and b. these parameter values determine the chaotic behaviour of map. The Most representative form of Henon map for canonical constant values a = 1.4 and b = 0.3 as we can see in Fig. 2. In which The Henon map reflects as chaotic attractor. The propose colour image encryption is based on Henon chaotic map, Henon like mapping used sin function which include a frequency control parameter w for maintaining their chaotic behaviour . The Henon like mapping equation which used in our present image encryption technique is a mathematical concept, where time dependency of any point determines by the fixed prescribed rule in geometrical space. In our proposed encryption technique we used Henon like chaotic map mathematically defined as Xn+2 = 1 – aX 2 n+1 + bsin (wxn) Which contain frequency control parameter w to control the Henon like chaotic signal. Encrypted Henon chaotic signal looks like distortion to unauthorized users ignoring to decrypt it, due to some specific characteristic such as nonperiodicity, ergodicity, randomicity.
  • 3. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications 16 Fig. 2. Chaotic nature of the Henon map IV.ENCRYPTION AND DECRYPTION ALGORITHM The proposed encryption algorithm is based on Henon like mapping. Our algorithm is based on fully layered encryption technique to provide higher level of confidentiality. We used colour image for the encryption process in our proposed technique we can also used same technique for Gray scale image. We perform the colour transformation to separate the RGB colour in its component matrix. For Gray scale image there is no need of colour transformation. Then we select any one of the component (RGB) matrix for encryption to reduce the computational overhead. The encryption process perform in the study can be seen in Fig. 3. (1) Encryption process: Step 1. The Henon like chaotic system is converted in to one-dimensional chaotic map. One dimensional Henon chaotic map mathematically is defined as: Xn+2 = 1 - aX 2 n+1 + bsin (wxn)…………….(1) Step 2. Transform the colour image in to its (RGB) 3 pieces of component matrix. Step 3. One dimensional Henon chaotic map obtain in (1) takes R component of colour image to generate the random bit stream. Step 4. The bit vales obtained in previous step is bit XOR with the original pixel values of R component of original transform matrix. Step 5. The vector result of G and B component of transform colour image with the matrix after bit XOR obtained from the previous stage produce the cipher image. Deterministic behaviour of chaotic map able us to reproduce the original image by providing the secret key component such as initial condition, system parameter, and number of iteration. (2) Decryption process: Step 1. The Henon like chaotic system is converted into one-dimensional chaotic map. One dimensional Henon chaotic map mathematically defined as Xn+2 = 1 – X 2 n+1 + b sin(wXn) which is same as during encryption process. Step 2. Perform colour transformation so that the colour image component RGB has been separated as in encryption process. Step 3. Select the secret key and parameter as used in encryption with the Henon chaotic map function same as (1). This process generates the transform matrix of pixel values of R component of image. Step 4. The XOR operation is computed bit- by- bit between the transform matrix of pixel values of R component of image and the bit values of the R component of cipher image as (2). Step 5. Vector of the decryption result is returned as the value of RGB using the image transformation to produce the original image.
  • 4. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications 17 Fig. 3. Encryption process V. EXPERIMENTAL RESULT The experimental analysis of proposed technique is based on Histogram analysis through Mat Lab. Histogram analysis show the distribution of pixel values between plane image and cipher image, if Histogram of plane image and cipher image has significant diversity then we can say cipher image does not give any clue to perform brute force or cryptanalysis attack on the encryption algorithm. We take Lena plane image with the size 256*256 as shown in Fig 4. The histogram of this plane image is shown in Fig. 5. We use frequency parameter w and X0, X1 as the keys. Using X0 = 0.011, X1 = 0.021 and w = 08071982, the encrypted image is shown in Fig. 6 and corresponding histogram of encrypted image is shown Fig. 7. Chaos system is reversible in nature after Decryption we get back the original Lena image as shown in Fig. 7. Proposed technique is based on single channel encryption. We encrypt only R component of the plane image and leave other G and B component as such after combining these component we get the cipher image. Fig. 7 shows the Histogram of ‘Original R component and Fig. 8 shown the Histogram of corresponding encrypted R component. Fig. 4. Original Plane Lena image Plane image Transformasi image G R B Chaosbased encryption-n G R B BitXOR G R B Cipher image
  • 5. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications 18 Fig. 5. Histogram of Plane Lena image Fig. 6. Encrypted Lena Image VI.SIMULATION ANALYSIS OF SECURITY To determine the proposed technique is robust, we use to perform analysis and testing of the encryption algorithm sues different parameter, like Histogram analysis is used to decide the colour distribution between the plane image and cipher image. Both the Histogram gives the significant difference to decide the robustness of encrypted algorithm. Fig. 4. Represent the Histogram of original lena image and Fig. 5. Represent the histogram of corresponding encrypted image. Both Histograms has significant difference which shows there is no possibility of brute-force attack. Similarly from the Fig. and Fig. shows the Histogram of original R channel and encrypted R channel, both the Histogram shows the significant amount of difference due to their pixel distribution. In our proposed algorithm we used w and the initial value X0,X1 as a secret key. Henon like chaotic system is very sensitive to initial condition and parameter. The experimental result demonstrates the encryption algorithm is very sensitive to the secret key. In our experiment if we change the secret Fig. 7. Decrypted Lena Image
  • 6. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications 19 Fig. 8. Histogram of original R component Fig. 9. Histogram of Encrypted R component Key X0 from X0= 0.001 to X0= 0.0000000001 the resultant encrypted image become entirely changed form original image. We take the different value of secret key for calculating the correlation coefficient between plane image and cipher image and also find the Entropy of encrypted image for different key value, and then we find the average correlation coefficient 0.000014 and average entropy 7.85200. The average Calculation of correlation and entropy determine the quality of encrypted image. The higher value of entropy and lower correlation between pixel values of encrypted image determine the safe encryption algorithm. The average result of correlation coefficient and Entropy shows the guarantees of security of proposed scheme under any cryptanalysis. VII. CONCLUSION this paper proposed a new colour image encryption algorithm based on Henon like chaotic map. The encryption process applied on any RGB channel. The selected channel goes through the one dimensional Henon like chaotic map to produce the random bit stream. This random bit stream bit XOR with the original pixel value of selected channel to produce the encrypted image. The proposed scheme has multi-dimensional large key space to resist the all possible type of brut-force attack. Several Experiments were carried out with numerical analysis, to shows the robustness of proposed scheme. In the future work we intend to make our system to achieve more flexible, reliable and higher level of quality performance in real time system. ACKNOWLEDGEMENT The study taken up during perusing M.Tech (computer science & Engineering) in partially supported by IT infrastructure development project, Department of Information Technology, Govt of India. REFERENCES 1. Chen Wei-bin, Zhang Xin, Image Encryption Algorithm Based on Henon chaotic System, International Conference on image Analysis and Signal Processing, 2009, pp. 94-97. 2. Li Chuanmu, Hong Lianxi, A New Image encryption scheme based on Hyper chaotic Sequence, IEEE International Workshop on Ant counterfeiting, Security, Identification, IEEE 2007, pp. 237-240. 3. Long Min, Huang Lu, Design and Analysis of a novel Chaotic Image Encryption. International conference on Computer Modeling and Simulation(ICCMS’ 10), Vol 1,2010.pp. 517-520. 4. S. Behnia, A. Akhshani, H. Mahmodi and A. Akhavan, A novel Algorithm for image Encryption based on Mixture of Chaotic Maps, Chaos, Solutions and Fractals, Vol. 35, 2008, pp. 408-419.
  • 7. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications 20 5. Kocarev L, Chaos-based Cryptography, a brief overview. IEEE Circ Syst2001,1.6-21. 6. D. Xiao, X. Liao and P. Wei, Analysis and Improvement of a Chaos-Based Image Encryption Algorithm, “Chaos Solution & Fractials, Vol.pp.40,2007. 7. Y. Wanga, K.W. Wanga, X. F. Liao and G. R. Chen, A New Chaos-Based Fast Image Encryption Algorithm, Applied Soft Computing, Vol. 11, No. 1, 2011, pp. 514-522.
  • 8. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org CALL FOR PAPERS The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. There’s no deadline for submission. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/Journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar