SlideShare a Scribd company logo
1 of 49
PRESENTED BY
MUHAMAD LUQMAN NULHAKIM BIN MANSOR
BTBL16043975
SUPERVISED BY
PROF. MADYA. DR.AFENDEE BIN MOHAMED
IMAGE
ENCRYPTION
USING CHAOTIC
BASED
CRYPTOSYSTEM
“Cryptography is typically
bypassed, not penetrated.”
-Adi Shamir
WOODGROVE
BANK
INTRODUCTION
PROJECT MOTIVATION
o PROBLEM STATEMENTS
o OBJECTIVES
LITERATURE REVIEW
o RELATED RESEARCHES
METHODOLOGY
o PROCESS MODEL
o DATA MODEL
o PROOF OF CONCEPT
o SOLUTION COMPLEXITY
o EXPECTED RESULT
PRESENTATION CONTENT
The related things for Image Encryption using
Chaotic Based Cryptosystem
WOODGROVE
BANK
INTRODUCTION
WHAT IS CRYPTOSYSTEM
ISASTRUCTURETHATHAVECRYPTOGRAPHICALGORITHMTO
PROVIDESASECURITYSERVICE
Confidentiality
AvailabilityIntegrity
CRYPTOSYSTEM
AIC TRAID
ITHELPSUSERTOHAVEASECUREDATATRANSFERANDSTORING
DATA
TYPES OF CRYPTOSYSTEM
 SymmetricKeyEncryption
 AsymmetricKeyEncryption
WOODGROVE
BANK
INTRODUCTION
IMAGE ENCRYPTIONIS THE ABILITY TO MAKE THE INFORMATION AND CONTENT
OF THE IMAGES
UNREADABLEONLY THOSE WITH KEY CAN READ THE ORIGINAL
CONTENT
WOODGROVE
BANK
INTRODUCTION
CHAOTIC MAP
IS A MATHEMATICAL FUNCTION THAT EXHIBIT CHAOS
BEHAVIOURS AND
CHARACTERISTIC
CHAOS BEHAVIOURS:
a) SENSITIVE TO INITIAL CONDITION
b) DETERMINISM
c) LONG-TERM PREDICTION
A SLIGHT CHANGES IN INITIAL
VALUES, WILL MAKE THE
SYSTEM PRODUCE DIFFERENT
OUTCOME
CHAOS THEORY
GENERALLY, IT IS AN ENVIRONMENT WHERE A
SMALL CHANGES WILL AFFECT THE FUTURE
OUTCOMESMATHEMATICALLY, IT IS A BRANCH THAT DEAL WITH
COMPLEX SYSTEM THAT HIGHLY SENSITIVE TO
INTIAL CONDITION.
WOODGROVE
BANK
INTRODUCTION
CHAOTIC MAP
IS A MATHEMATICAL FUNCTION THAT EXHIBIT CHAOS
BEHAVIOURS AND
CHARACTERISTIC
CHAOS BEHAVIOURS:
a) SENSITIVE TO INITIAL CONDITION
b) DETERMINISM
c) LONG-TERM PREDICTION
A SYSTEM THAT PRE-
DETERMINED BY THE INTIAL
VALUES
CHAOS THEORY
GENERALLY, IT IS AN ENVIRONMENT WHERE A
SMALL CHANGES WILL AFFECT THE FUTURE
OUTCOMESMATHEMATICALLY, IT IS A BRANCH THAT DEAL WITH
COMPLEX SYSTEM THAT HIGHLY SENSITIVE TO
INTIAL CONDITION.
WOODGROVE
BANK
INTRODUCTION
CHAOTIC MAP
IS A MATHEMATICAL FUNCTION THAT EXHIBIT CHAOS
BEHAVIOURS AND
CHARACTERISTIC
CHAOS BEHAVIOURS:
a) SENSITIVE TO INITIAL CONDITION
b) DETERMINISM
c) LONG-TERM PREDICTION
THE LONG-TERM PREDICTION
IS HARD, DUE TO SENSITIVITY
TO INITIAL CONDITION.
CHAOS THEORY
GENERALLY, IT IS AN ENVIRONMENT WHERE A
SMALL CHANGES WILL AFFECT THE FUTURE
OUTCOMESMATHEMATICALLY, IT IS A BRANCH THAT DEAL WITH
COMPLEX SYSTEM THAT HIGHLY SENSITIVE TO
INTIAL CONDITION.
WOODGROVE
BANK
INTRODUCTION
HOW TO DEMOSTRATE THE CHAOS
The logistic map function
x is an initial value in the system
r is a coefficient also a
parameter in the system
x needs to be between 0 and 1
r number is picked between 0
and 4
PROCESS:
First get the next value of r
times x because we need to
get xₙ₊₁ to continue iteration.
Assume we have 10 iterations.
Check the sequence produced,
does it oscillating between
two values?
WOODGROVE
BANK
INTRODUCTION
HOW TO DEMOSTRATE THE CHAOS
The logistic map function
Assume we set the parameter r = 2
x = 0.5 x = 0.8 x = 1.2
WOODGROVE
BANK
INTRODUCTION
HOW TO DEMOSTRATE THE CHAOS
The logistic map function
Assume we set the parameter x = 0.4
r = 0.8 r = 1.6
WOODGROVE
BANK
INTRODUCTION
HOW TO DEMOSTRATE THE CHAOS
The logistic map function
Assume we set the parameter x = 0.4
r = 3.2 r = 4
WOODGROVE
BANK
INTRODUCTION
HOW TO DEMOSTRATE THE CHAOS
The logistic map function
Assume we set the parameter x = 0.4
r = 3.2 r = 4
WOODGROVE
BANK
INTRODUCTION
HOW TO DEMOSTRATE THE CHAOS
r
x
WOODGROVE
BANK
INTRODUCTION
HOW TO DEMOSTRATE THE CHAOS
r
x
WOODGROVE
BANK
INTRODUCTION
HOW TO DEMOSTRATE THE CHAOS
r
x
WOODGROVE
BANK
PROJECT MOTIVATION
16
WHY IMAGE ENCRYPTION?
IMAGES DATA HAS BEEN WIDELY USED
DATA TRANSMISSION CAN BE TAPPED
AND EAVESDROPPED UNWANTED
PERSON DURING TRANSMISSION IN
PUBLIC NETWORK
STORING IMAGES LOCALLY CAN BE
LESS SECURE
WOODGROVE
BANK
PROJECT MOTIVATION
GOALS
To evaluate the
performance of the
cryptosystem
To develop a suitable
chaotic map for encryption
Develop an image
encryption based on
chaotic cryptography
To create a secure image
sharing environment
WOODGROVE
BANK
INTRODUCTION
LIMITATION OF WORK
The higher resolution of
image, the longer time
taken to encrypt
WOODGROVE
BANK
LITERATURE REVIEW
RELATED RESEARCH
Author Title Description Method
Seyed Hossein Kamali,
Reza Shakeria
A New Modified
Version of
Advanced
Encryption
Standard Based
Algorithm for
Image Encryption
An encryption
technique using
Symmetrical
Encryption and
ShiftRow
transformation based on
a modified version of
AES
Modified Version of
AES;
ShiftRow
Transformation and
Symmetrical
Encryption
WOODGROVE
BANK
LITERATURE REVIEW
RELATED RESEARCH
Author Title Description Method
K.C.Ravishankar,
M.G.
Venkateshmury
Region Based
Selective Image
Encryption
The encryption
technique use the
selective region in
the image. It will
use transposition
technique
Position
permutation
technique, value
transformation
and combine
both.
WOODGROVE
BANK
LITERATURE REVIEW
RELATED RESEARCH
Author Title Description Method
Aditee Gautam,
Meenakshi
Panwar,
Dr.P.R Gupta
A New Image
Encryption
Approach Using
Block Based
Transformation
Algorithm
An encryption
technique using
block cipher by
combining a
multiple images in
transformation
Block-cipher
modes, Image
permutation
technique
WOODGROVE
BANK
LITERATURE REVIEW
RELATED RESEARCH
Author Title Description Method
Xiang FeiˈGuo
Xiao-cong
An Image
Encryption
Algorithm based
on Scrambling and
Substitution using
Hybrid Chaotic
Systems
This project
simulate an
encryption
technique by
scrambling the
image pixel then
substitution
technique was
apply after
scrambling.
Scrambling
Technique, and
Substitution based
on Chua’s Chaotic
Map
WOODGROVE
BANK
LITERATURE REVIEW
RELATED RESEARCH
Author Title Description Method
Bibhudendra
Acharya Saroj
Kumar
Panigrahy,
SaratKumar
Patra, and
Ganapati Panda
Image
Encryption
Using
Advanced Hill
Cipher
Algorithm
This image
encryption use a
novel Advanced
Hill Cipher
Algorithm which
can be use both
for greyscale
image and color-
image.
Advanced Hill
Cipher
Algorithm,
WOODGROVE
BANK
METHODOLOGY
PROJECT DEVELOPMENT
DEFINING PHASE PLANNING PHASE DESIGNING PHASE
DEVELOPMENT PHASEANALYSIS PHASE
WOODGROVE
BANK
METHODOLOGY
STUDY FIELD
DEFINING PHASE
IMAGE
ENCRPYTION
CHAOTIC MAP
IMPLEMENTATION
BLOCK CIPHER
WOODGROVE
BANK
METHODOLOGY
SOFTWARE REQUIREMENT
DEFINING PHASE
ImageJ
NetBeans
IDE
MATLAB
WOODGROVE
BANK
METHODOLOGY
FRAMEWORK MODEL
JOHN
JOHN
MIKE MIKE
ENCRYPTION PROCESS
DECRYPTION PROCESS
PLANNING PHASE
WOODGROVE
BANK
METHODOLOGY
FLOWCHART ENCRYPTION
DESIGNING PHASE
CHAOTIC BASED CRYPTOSYSTEM
ENCRYPTIONOPERATION
WOODGROVE
BANK
METHODOLOGY
FLOWCHART DECRYPTION
DESIGNING PHASE
CHAOTIC BASED CRYPTOSYSTEM DECRYPTION OPERATION
WOODGROVE
BANK
METHODOLOGY
DEVELOPMENT PHASE
LOGICAL PROOF OF CONCEPT
Input Plain-image
Image Channel
Separation
Chaos Sequence
Key Generation
Pixel Shuffling
PROCESS
Receive input images, recommended image that
have RGB modes.
Execute Image Channel Separation
This to ensure the integrity of the image is
contained. After that we can proceed with key
generation using chaos sequence
Original Image
Red Channel Green Channel Blue Channel
START ENCRYPTION
WOODGROVE
BANK
METHODOLOGY
DEVELOPMENT PHASE
LOGICAL PROOF OF CONCEPT
Input Plain-image
Image Channel
Separation
Chaos Sequence
Key Generation
Pixel Shuffling
The key generation use in Equation (1), from
Rossler System.
x = -y+(-z)
y = x + ay
z = b + z(x – c)
The Rossler System have a chaotic behavior at
values a=b= 0.2 and c= 5.7
Then an equation use to create initial value from
128-bit key (16 Characters). After acquired, then
we can proceed use the Rossler’s Equation (1).
WOODGROVE
BANK
METHODOLOGY
DEVELOPMENT PHASE
LOGICAL PROOF OF CONCEPT
Input Plain-image
Image Channel
Separation
Chaos Sequence
Key Generation
Pixel Shuffling
Pixel Shuffling
Pixel Shuffling will be conduct using the XOR
Operation. Where bits were tested
Eg:
Original Pixel: 01001100 (L)
Chaotic Sequence Pixel: 01001000 (H)
Encrypted Pixel: 00000100
Original Pixel ⊕ Chaotic Sequence Pixel =
00000100 ( )
l(i,j) is the original pixel,
x(i,j) is the chaotic sequence pixel.
where i is 1 ≤ i ≤ M and j is 1 ≤ j ≤ N
WOODGROVE
BANK
METHODOLOGY
DEVELOPMENT PHASE
LOGICAL PROOF OF CONCEPT
Pixel Shuffling
NOT Operation
Image Channel
Merger
Cipher-image
and Key
To ensure the reliability of the
cryptosystem.
Implementation of NOT Operation
Eg:
Encrypted Pixel: 01011000 (X)
NOT Operation Pixel: 10100111(?)
WOODGROVE
BANK
METHODOLOGY
DEVELOPMENT PHASE
LOGICAL PROOF OF CONCEPT
Pixel Shuffling
NOT Operation
Image Channel
Merger
Cipher-image
and Key
Encrypted Blue
Channel
Original Image
Red Channel Green Channel Blue Channel
Encrypted Red
Channel
Encrypted Green
Channel
Encrypted Image
WOODGROVE
BANK
METHODOLOGY
DEVELOPMENT PHASE
LOGICAL PROOF OF CONCEPT
Pixel Shuffling
NOT Operation
Image Channel
Merger
Cipher-image
and Key
FINISH ENCRYPTION
Plain-image that contains
confidential data
Cipher-image and Key
WOODGROVE
BANK
METHODOLOGY
DEVELOPMENT PHASE
LOGICAL PROOF OF CONCEPT
Input Cipher-
image
Input Key
Image Channel
Separator
NOT Operation
Encrypted Image
Encrypted Blue
Channel
Encrypted Red
Channel
Encrypted Green
Channel
Image Channel
Separator
START DECRYPTION
WOODGROVE
BANK
METHODOLOGY
DEVELOPMENT PHASE
LOGICAL PROOF OF CONCEPT
Input Cipher-
image
Input Key
Image Channel
Separator
NOT Operation
To ensure the reliability of the
cryptosystem.
Implementation of NOT Operation
Eg:
Encrypted Pixel: 01011000 (X)
NOT Operation Pixel: 10100111(?)
WOODGROVE
BANK
METHODOLOGY
DEVELOPMENT PHASE
LOGICAL PROOF OF CONCEPT
Input Cipher-
image
Input Key
Image Channel
Separator
NOT Operation
Encrypted Blue
Channel
Encrypted Red
Channel
Encrypted Green
Channel
NOT Operation
Encrypted Blue
Channel
Encrypted Red
Channel
Encrypted Green
Channel
WOODGROVE
BANK
METHODOLOGY
DEVELOPMENT PHASE
LOGICAL PROOF OF CONCEPT
NOT Operation
Pixel Reverse
Shuffling
Image Channel
Merger
Plain-image
PROCESS
Pixel Reverse Shuffling will be execute using several
inputs, XOR Operation will be demonstrated.
Encrypted Blue
Channel
Encrypted Red
Channel
Encrypted Green
Channel
Pixel Reverse Shuffling
Red Channel Green Channel Blue Channel
WOODGROVE
BANK
METHODOLOGY
LOGICAL PROOF OF CONCEPT
NOT Operation
Pixel Reverse
Shuffling
Image Channel
Merger
Plain-image
Original Image
Red Channel Green Channel Blue Channel
Image Channel Merger
FINISH DECRYPTION
DEVELOPMENT PHASE
WOODGROVE
BANK
METHODOLOGY
ANALYSIS PHASEDoes a single bit change
in key affect the
decryption process?
Key Sensitivity
Analysis
WOODGROVE
BANK
METHODOLOGY
ANALYSIS PHASE
What happen to the
image after encryption
process
Histogram Analysis
Statistical Analysis
WOODGROVE
BANK
METHODOLOGY
ANALYSIS PHASE
What happen to the
image after encryption
process
Histogram Analysis
Statistical Analysis
WOODGROVE
BANK
METHODOLOGY
ANALYSIS PHASE
Does the pixel still
correlated after
encryption?
Correlation and
Coefficient Analysis
Statistical Analysis
WOODGROVE
BANK
METHODOLOGY
ANALYSIS PHASEDoes a single bit change
in key affect the
decryption process?
Key Sensitivity
Analysis
WOODGROVE
BANK
METHODOLOGY
ANALYSIS PHASETo check the pixel position after
encryption, does it still the same
spot?
Fixed Point
Analysis
How many percentage of error
can be cope during encryption
Entropy Analysis
WOODGROVE
BANK
METHODOLOGY
ANALYSIS PHASE
Check the outcome from
tampered encrypted
images
Intensity Analysis
WOODGROVE
BANK
PROJECT PROGRESS
EXPECTED PROJECT OUTCOME
Stand-alone
Encryption
Application
Measurable
Cryptosystem
Plain image
Cipher image
Plain image
Workable Symmetric
Encryption
THANK YOU
WOODGROVE
BANK

More Related Content

What's hot

Lattice Based Cryptography - GGH Cryptosystem
Lattice Based Cryptography - GGH CryptosystemLattice Based Cryptography - GGH Cryptosystem
Lattice Based Cryptography - GGH Cryptosystem
Varun Janga
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
ZiadAlqady
 
Image encryption
Image encryptionImage encryption
Image encryption
rakshit2105
 

What's hot (16)

Introduction - Lattice-based Cryptography
Introduction - Lattice-based CryptographyIntroduction - Lattice-based Cryptography
Introduction - Lattice-based Cryptography
 
Lattice Based Cryptography - GGH Cryptosystem
Lattice Based Cryptography - GGH CryptosystemLattice Based Cryptography - GGH Cryptosystem
Lattice Based Cryptography - GGH Cryptosystem
 
Template Protection with Homomorphic Encryption
Template Protection with Homomorphic EncryptionTemplate Protection with Homomorphic Encryption
Template Protection with Homomorphic Encryption
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
 
Deep LearningフレームワークChainerと最近の技術動向
Deep LearningフレームワークChainerと最近の技術動向Deep LearningフレームワークChainerと最近の技術動向
Deep LearningフレームワークChainerと最近の技術動向
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 
A survey on Fully Homomorphic Encryption
A survey on Fully Homomorphic EncryptionA survey on Fully Homomorphic Encryption
A survey on Fully Homomorphic Encryption
 
Seattle Scalability Meetup 6-26-13
Seattle Scalability Meetup 6-26-13Seattle Scalability Meetup 6-26-13
Seattle Scalability Meetup 6-26-13
 
On the Usage of Chained Codes in Cryptography
On the Usage of Chained Codes in CryptographyOn the Usage of Chained Codes in Cryptography
On the Usage of Chained Codes in Cryptography
 
Partial Homomorphic Encryption
Partial Homomorphic EncryptionPartial Homomorphic Encryption
Partial Homomorphic Encryption
 
D017433134
D017433134D017433134
D017433134
 
AN EFFICIENT PROXY SIGNCRYPTION SCHEME BASED ON THE DISCRETE LOGARITHM PROBLEM
AN EFFICIENT PROXY SIGNCRYPTION SCHEME BASED ON THE DISCRETE LOGARITHM PROBLEMAN EFFICIENT PROXY SIGNCRYPTION SCHEME BASED ON THE DISCRETE LOGARITHM PROBLEM
AN EFFICIENT PROXY SIGNCRYPTION SCHEME BASED ON THE DISCRETE LOGARITHM PROBLEM
 
Image encryption
Image encryptionImage encryption
Image encryption
 
6.hash mac
6.hash mac6.hash mac
6.hash mac
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 

Similar to An Image Encryption using Chaotic Based Cryptosystem

Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
ANUP PALARAPWAR
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd Iaetsd
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
Alexander Decker
 

Similar to An Image Encryption using Chaotic Based Cryptosystem (20)

An Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based CryptosystemAn Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based Cryptosystem
 
Neural networks
Neural networksNeural networks
Neural networks
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and Decryption
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
 
Aj03102230224
Aj03102230224Aj03102230224
Aj03102230224
 
Pso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofingPso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofing
 
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFING
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFINGPSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFING
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFING
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
 
Improved security system using steganography and elliptic curve crypto...
Improved  security  system using  steganography  and  elliptic  curve  crypto...Improved  security  system using  steganography  and  elliptic  curve  crypto...
Improved security system using steganography and elliptic curve crypto...
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for Authentication
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
 
Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...
 
Image encryption using chaotic sequence and its cryptanalysis
Image encryption using chaotic sequence and its cryptanalysisImage encryption using chaotic sequence and its cryptanalysis
Image encryption using chaotic sequence and its cryptanalysis
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
 
A new four-dimensional hyper-chaotic system for image encryption
A new four-dimensional hyper-chaotic system for image encryption A new four-dimensional hyper-chaotic system for image encryption
A new four-dimensional hyper-chaotic system for image encryption
 
Conference_paper.pdf
Conference_paper.pdfConference_paper.pdf
Conference_paper.pdf
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 

An Image Encryption using Chaotic Based Cryptosystem