NAME: MUHAMAD LUQMAN NULHAKIM BIN MANSOR
NO MATRIC: BTBL16043975
COURSE: ISM (SK) KESELAMATAN RANGKAIAN KOMPUTER
SUPERVISOR: PROF. MADYA DR AFENDEE BIN MOHAMED
UNIVERSITI SULTAN ZAINAL ABIDIN
An Image Encryption using Chaotic Based Cryptosystem
1. PRESENTED BY
MUHAMAD LUQMAN NULHAKIM BIN MANSOR
BTBL16043975
SUPERVISED BY
PROF. MADYA. DR.AFENDEE BIN MOHAMED
IMAGE
ENCRYPTION
USING CHAOTIC
BASED
CRYPTOSYSTEM
“Cryptography is typically
bypassed, not penetrated.”
-Adi Shamir
2. WOODGROVE
BANK
INTRODUCTION
PROJECT MOTIVATION
o PROBLEM STATEMENTS
o OBJECTIVES
LITERATURE REVIEW
o RELATED RESEARCHES
METHODOLOGY
o PROCESS MODEL
o DATA MODEL
o PROOF OF CONCEPT
o SOLUTION COMPLEXITY
o EXPECTED RESULT
PRESENTATION CONTENT
The related things for Image Encryption using
Chaotic Based Cryptosystem
5. WOODGROVE
BANK
INTRODUCTION
CHAOTIC MAP
IS A MATHEMATICAL FUNCTION THAT EXHIBIT CHAOS
BEHAVIOURS AND
CHARACTERISTIC
CHAOS BEHAVIOURS:
a) SENSITIVE TO INITIAL CONDITION
b) DETERMINISM
c) LONG-TERM PREDICTION
A SLIGHT CHANGES IN INITIAL
VALUES, WILL MAKE THE
SYSTEM PRODUCE DIFFERENT
OUTCOME
CHAOS THEORY
GENERALLY, IT IS AN ENVIRONMENT WHERE A
SMALL CHANGES WILL AFFECT THE FUTURE
OUTCOMESMATHEMATICALLY, IT IS A BRANCH THAT DEAL WITH
COMPLEX SYSTEM THAT HIGHLY SENSITIVE TO
INTIAL CONDITION.
6. WOODGROVE
BANK
INTRODUCTION
CHAOTIC MAP
IS A MATHEMATICAL FUNCTION THAT EXHIBIT CHAOS
BEHAVIOURS AND
CHARACTERISTIC
CHAOS BEHAVIOURS:
a) SENSITIVE TO INITIAL CONDITION
b) DETERMINISM
c) LONG-TERM PREDICTION
A SYSTEM THAT PRE-
DETERMINED BY THE INTIAL
VALUES
CHAOS THEORY
GENERALLY, IT IS AN ENVIRONMENT WHERE A
SMALL CHANGES WILL AFFECT THE FUTURE
OUTCOMESMATHEMATICALLY, IT IS A BRANCH THAT DEAL WITH
COMPLEX SYSTEM THAT HIGHLY SENSITIVE TO
INTIAL CONDITION.
7. WOODGROVE
BANK
INTRODUCTION
CHAOTIC MAP
IS A MATHEMATICAL FUNCTION THAT EXHIBIT CHAOS
BEHAVIOURS AND
CHARACTERISTIC
CHAOS BEHAVIOURS:
a) SENSITIVE TO INITIAL CONDITION
b) DETERMINISM
c) LONG-TERM PREDICTION
THE LONG-TERM PREDICTION
IS HARD, DUE TO SENSITIVITY
TO INITIAL CONDITION.
CHAOS THEORY
GENERALLY, IT IS AN ENVIRONMENT WHERE A
SMALL CHANGES WILL AFFECT THE FUTURE
OUTCOMESMATHEMATICALLY, IT IS A BRANCH THAT DEAL WITH
COMPLEX SYSTEM THAT HIGHLY SENSITIVE TO
INTIAL CONDITION.
8. WOODGROVE
BANK
INTRODUCTION
HOW TO DEMOSTRATE THE CHAOS
The logistic map function
x is an initial value in the system
r is a coefficient also a
parameter in the system
x needs to be between 0 and 1
r number is picked between 0
and 4
PROCESS:
First get the next value of r
times x because we need to
get xₙ₊₁ to continue iteration.
Assume we have 10 iterations.
Check the sequence produced,
does it oscillating between
two values?
16. WOODGROVE
BANK
PROJECT MOTIVATION
16
WHY IMAGE ENCRYPTION?
IMAGES DATA HAS BEEN WIDELY USED
DATA TRANSMISSION CAN BE TAPPED
AND EAVESDROPPED UNWANTED
PERSON DURING TRANSMISSION IN
PUBLIC NETWORK
STORING IMAGES LOCALLY CAN BE
LESS SECURE
17. WOODGROVE
BANK
PROJECT MOTIVATION
GOALS
To evaluate the
performance of the
cryptosystem
To develop a suitable
chaotic map for encryption
Develop an image
encryption based on
chaotic cryptography
To create a secure image
sharing environment
19. WOODGROVE
BANK
LITERATURE REVIEW
RELATED RESEARCH
Author Title Description Method
Seyed Hossein Kamali,
Reza Shakeria
A New Modified
Version of
Advanced
Encryption
Standard Based
Algorithm for
Image Encryption
An encryption
technique using
Symmetrical
Encryption and
ShiftRow
transformation based on
a modified version of
AES
Modified Version of
AES;
ShiftRow
Transformation and
Symmetrical
Encryption
20. WOODGROVE
BANK
LITERATURE REVIEW
RELATED RESEARCH
Author Title Description Method
K.C.Ravishankar,
M.G.
Venkateshmury
Region Based
Selective Image
Encryption
The encryption
technique use the
selective region in
the image. It will
use transposition
technique
Position
permutation
technique, value
transformation
and combine
both.
21. WOODGROVE
BANK
LITERATURE REVIEW
RELATED RESEARCH
Author Title Description Method
Aditee Gautam,
Meenakshi
Panwar,
Dr.P.R Gupta
A New Image
Encryption
Approach Using
Block Based
Transformation
Algorithm
An encryption
technique using
block cipher by
combining a
multiple images in
transformation
Block-cipher
modes, Image
permutation
technique
22. WOODGROVE
BANK
LITERATURE REVIEW
RELATED RESEARCH
Author Title Description Method
Xiang FeiˈGuo
Xiao-cong
An Image
Encryption
Algorithm based
on Scrambling and
Substitution using
Hybrid Chaotic
Systems
This project
simulate an
encryption
technique by
scrambling the
image pixel then
substitution
technique was
apply after
scrambling.
Scrambling
Technique, and
Substitution based
on Chua’s Chaotic
Map
23. WOODGROVE
BANK
LITERATURE REVIEW
RELATED RESEARCH
Author Title Description Method
Bibhudendra
Acharya Saroj
Kumar
Panigrahy,
SaratKumar
Patra, and
Ganapati Panda
Image
Encryption
Using
Advanced Hill
Cipher
Algorithm
This image
encryption use a
novel Advanced
Hill Cipher
Algorithm which
can be use both
for greyscale
image and color-
image.
Advanced Hill
Cipher
Algorithm,
30. WOODGROVE
BANK
METHODOLOGY
DEVELOPMENT PHASE
LOGICAL PROOF OF CONCEPT
Input Plain-image
Image Channel
Separation
Chaos Sequence
Key Generation
Pixel Shuffling
PROCESS
Receive input images, recommended image that
have RGB modes.
Execute Image Channel Separation
This to ensure the integrity of the image is
contained. After that we can proceed with key
generation using chaos sequence
Original Image
Red Channel Green Channel Blue Channel
START ENCRYPTION
31. WOODGROVE
BANK
METHODOLOGY
DEVELOPMENT PHASE
LOGICAL PROOF OF CONCEPT
Input Plain-image
Image Channel
Separation
Chaos Sequence
Key Generation
Pixel Shuffling
The key generation use in Equation (1), from
Rossler System.
x = -y+(-z)
y = x + ay
z = b + z(x – c)
The Rossler System have a chaotic behavior at
values a=b= 0.2 and c= 5.7
Then an equation use to create initial value from
128-bit key (16 Characters). After acquired, then
we can proceed use the Rossler’s Equation (1).
32. WOODGROVE
BANK
METHODOLOGY
DEVELOPMENT PHASE
LOGICAL PROOF OF CONCEPT
Input Plain-image
Image Channel
Separation
Chaos Sequence
Key Generation
Pixel Shuffling
Pixel Shuffling
Pixel Shuffling will be conduct using the XOR
Operation. Where bits were tested
Eg:
Original Pixel: 01001100 (L)
Chaotic Sequence Pixel: 01001000 (H)
Encrypted Pixel: 00000100
Original Pixel ⊕ Chaotic Sequence Pixel =
00000100 ( )
l(i,j) is the original pixel,
x(i,j) is the chaotic sequence pixel.
where i is 1 ≤ i ≤ M and j is 1 ≤ j ≤ N
33. WOODGROVE
BANK
METHODOLOGY
DEVELOPMENT PHASE
LOGICAL PROOF OF CONCEPT
Pixel Shuffling
NOT Operation
Image Channel
Merger
Cipher-image
and Key
To ensure the reliability of the
cryptosystem.
Implementation of NOT Operation
Eg:
Encrypted Pixel: 01011000 (X)
NOT Operation Pixel: 10100111(?)
34. WOODGROVE
BANK
METHODOLOGY
DEVELOPMENT PHASE
LOGICAL PROOF OF CONCEPT
Pixel Shuffling
NOT Operation
Image Channel
Merger
Cipher-image
and Key
Encrypted Blue
Channel
Original Image
Red Channel Green Channel Blue Channel
Encrypted Red
Channel
Encrypted Green
Channel
Encrypted Image
36. WOODGROVE
BANK
METHODOLOGY
DEVELOPMENT PHASE
LOGICAL PROOF OF CONCEPT
Input Cipher-
image
Input Key
Image Channel
Separator
NOT Operation
Encrypted Image
Encrypted Blue
Channel
Encrypted Red
Channel
Encrypted Green
Channel
Image Channel
Separator
START DECRYPTION
37. WOODGROVE
BANK
METHODOLOGY
DEVELOPMENT PHASE
LOGICAL PROOF OF CONCEPT
Input Cipher-
image
Input Key
Image Channel
Separator
NOT Operation
To ensure the reliability of the
cryptosystem.
Implementation of NOT Operation
Eg:
Encrypted Pixel: 01011000 (X)
NOT Operation Pixel: 10100111(?)
38. WOODGROVE
BANK
METHODOLOGY
DEVELOPMENT PHASE
LOGICAL PROOF OF CONCEPT
Input Cipher-
image
Input Key
Image Channel
Separator
NOT Operation
Encrypted Blue
Channel
Encrypted Red
Channel
Encrypted Green
Channel
NOT Operation
Encrypted Blue
Channel
Encrypted Red
Channel
Encrypted Green
Channel
39. WOODGROVE
BANK
METHODOLOGY
DEVELOPMENT PHASE
LOGICAL PROOF OF CONCEPT
NOT Operation
Pixel Reverse
Shuffling
Image Channel
Merger
Plain-image
PROCESS
Pixel Reverse Shuffling will be execute using several
inputs, XOR Operation will be demonstrated.
Encrypted Blue
Channel
Encrypted Red
Channel
Encrypted Green
Channel
Pixel Reverse Shuffling
Red Channel Green Channel Blue Channel
40. WOODGROVE
BANK
METHODOLOGY
LOGICAL PROOF OF CONCEPT
NOT Operation
Pixel Reverse
Shuffling
Image Channel
Merger
Plain-image
Original Image
Red Channel Green Channel Blue Channel
Image Channel Merger
FINISH DECRYPTION
DEVELOPMENT PHASE
46. WOODGROVE
BANK
METHODOLOGY
ANALYSIS PHASETo check the pixel position after
encryption, does it still the same
spot?
Fixed Point
Analysis
How many percentage of error
can be cope during encryption
Entropy Analysis