SlideShare a Scribd company logo
Ankita Gaur et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.904-907
www.ijera.com 904 | P a g e
Review: Image Encryption Using Chaos Based algorithms
Er. Ankita Gaur*, Er. Maneesha Gupta**
*(M.tech scholar, Electronics and communication Engineering department, SKIET, kurukshetra)
** (Lecturer, Electronics and communication Engineering Department, SKIET, Kurukshetra)
ABSTRACT
Due to the development in the field of network technology and multimedia applications, every minute thousands
of messages which can be text, images, audios, videos are created and transmitted over wireless network.
Improper delivery of the message may leads to the leakage of important information. So encryption is used to
provide security. In last few years, variety of image encryption algorithms based on chaotic system has been
proposed to protect image from unauthorized access. 1-D chaotic system using logistic maps has weak security,
small key space and due to the floating of pixel values, some data lose occurs and proper decryption of image
becomes impossible. In this paper different chaotic maps such as Arnold cat map, sine map, logistic map, tent
map have been studied.
Keywords – Arnold cat map, Encryption, logistic map, sine map, tent map, 1-D chaotic system.
I. Introduction
Protection of multimedia contents from
unauthorized access is necessary nowadays. With the
help of cryptography readable form of message is
converted to the non readable form. And reverse of
cryptography in which non readable form of message
is converted back to readable form, is called
cryptanalysis. The combination of these two
techniques is referred as Cryptology.
Communication in human language referred as
Plain Text which can be easily understandable by
anyone else. In order to provide security plain text is
coded with suitable encryption shames and the
codified message is referred as cipher text. Fig.1
represents the block diagram of encryption, where Ke
is the encryption key.
Ke
figure 1:block diagram of encryption
Encryption key Ke is implemented on plain text to
convert it to cipher text.
Fig. 2 represents the basic decryption technique,
where Kd is the decryption key. Similarly Kd is
implemented on cipher text to convert back it to the
plain text.
Kd
figure 2: block diagram of decryption
Encryption techniques can be classified on the basis
of key, structure of algorithms and percentage of
encrypted data.
On the basis of key encryption can be symmetric
encryption and asymmetric encryption, on the basis
of structure encryption can be block cipher and
stream cipher. And on the basis of basis of
percentage of encrypted data encryption can be full
encryption and partial encryption.
II. Literature Review
Varsha S.Nemade et.al discussed that text
encryption algorithms which have been already
developed are not suitable for the image encryption,
Encryption
Decryption
Cipher Text
Cipher Text
Plain Text
Plain Text
RESEARCH ARTICLE OPEN ACCESS
Ankita Gaur et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.904-907
www.ijera.com 905 | P a g e
because image containing large amount of data
means it contains number of pixels. Image encryption
techniques scrambled the pixels of the image and
decrease the correlation among the pixels, so that we
will get lower correlation among the pixel and get the
encrypted image. In this paper survey of different
image encryption techniques has been discussed
Jolly Shah et.al stated that image applications
have been increasing in recent years. Encryption is
used to provide the security needed for image
applications. In this paper, we classify various image
encryption schemes and analyze them with respect to
various parameters like tunability, visual degradation,
compression friendliness, format compliance,
encryption ratio, speed, and cryptographic security.
Haojiang Gao et.al discussed that recent
researches of image encryption algorithms based on
chaotic systems, but the drawbacks of small key
space and weak security in one-dimensional chaotic
cryptosystems are obvious. This paper presents a new
nonlinear chaotic algorithm (NCA) which uses power
function and tangent function instead of linear
function. Its structural parameters are obtained by
experimental analysis. And an image encryption
algorithm in a one-time-one password system is
designed. The experimental results demonstrate that
the image encryption algorithm based on NCA shows
advantages of large key space and high-level
security, while maintaining acceptable efficiency.
Compared with some general encryption algorithms
such as DES, the encryption algorithm is more
secure.
Yicong Zhou et.al introduced a new parametric
switching chaotic system (PSCS) and its
corresponding transforms for image encryption. The
proposed PSCS has a simple structure and integrates
the Logistic, Sine and Tent maps into one single
system. The PSCS shows more general properties,
including the Sine and Tent maps as special
instances. It has complex chaotic behaviors. A novel
image encryption algorithm is introduced using the
proposed PSCS and its transforms. Simulation results
and security analysis are given to demonstrate that
the proposed algorithm can encrypt different types of
images with a high level of security.
III. Methodology
Text encryption algorithms such as
Advanced Encryption Standard (AES) or Data
Encryption Standard (DES) cannot be used for image
encryption because image is made up of pixels or in
other words image has large data as compared to text.
Image encryption can be done by chaos theory. Fig.3
shows the image before and after the encryption.
Original image Encrypted image
figure 3: image encryption
3.1 Chaotic system: Chaotic system can be
considered as source of randomness and chaos is
randomness of a deterministic dynamical system.
Mathematically A chaotic map can be defined as
Xn+1= f (Xn) …………………………….. ……...(1)
Where 0<Xn<1 and n=0, 1, 2…
Chaotic sequence can be used as random number
sequence and spread spectrum sequence. The chaotic
systems are characterized by the non linear and
unpredictable. They appear to have irregular order
but infect there is a sense of order. Chaotic
systems are sensitive to initial conditions, small
change in starting point can cause different outcomes.
Chaos has many applications in modulation,
compression, and encryption. In image encryption, 1-
D chaotic system using logistic maps has simplicity
and high efficiency but it has weak security and small
key space. Different Chaotic maps can be used for
this purpose. Generally in chaos based algorithm,
pixels of image are scrambled and correlation among
pixels is decreased to get encrypted image. Figure 2
represent the basic image encryption flow chart of
chaos based algorithms. Where k and iv are the key
and initial vector generated by chaotic system.
3.1.1 Arnold cat map: it was demonstrated by
Vladimir Arnold in 1960s by using an image of a cat.
Arnold cat map uses the concept of linear algebra to
change the position of pixels of original image.
Original image is divided into blocks and then
Arnold transformation is done.
Let X is a vector, X= [ ], then Arnold cat map
transformation is, Γ: [ ] → [ ] 𝑚𝑜𝑑 𝑛
Some conditions such as p and q are positive integers
and
=1
This makes it area-preserving. Original image can be
shuffled by applying Arnold map operation
iteratively. But shuffled image can return to original
form after several iterations.
Encryption
Ankita Gaur et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.904-907
www.ijera.com 906 | P a g e
3.1.2 Logistic map: 1-D logistic map was proposed
by RM may. This map is simplest non linear chaotic
system which can be defined as
zn+1= λ zn(1-zn)…………………………………..(2)
Where z0 is initial condition, n is number of iterations
and λ is system parameter.
For 3.57 < λ < 4 map is considered as chaotic .And z
n+1 belong to (0, 1) for all n. equation 1 is used to
encrypt the shuffled pixels.
3.1.3 Sine map: sine map is defined as
X n+1=a xn
2
sin(π xn) …………………………..(3)
when x0 = 0.7 and a=2.3, equation 2 has the
simplified form . for the interval (0,1) it generates
chaotic sequence .
3.1.4 Tent map: tent map resembles the logistic
map. It generates chaotic sequences in (0,1) assuming
the following equation
Where µ is a positive number and depending on its
value tent map exhibit dynamic behavior ranging
from predictable to chaotic.
3.1.5 Circle map: it is defined as
Xn+1= Xn + d – (c/2π) sin( 2πXn) mod(1)………(4)
Where d = 0.2, c = 0.5, and x0 € [0,1] generates
Chaotic sequence in [0,1].
IV. Conclusion
In order to provide security to the image,
cryptography is used which converts an image into
another form (non readable form). Chaotic systems
have many applications in image processing such as
image compression and image encryption.
Combination of chaos theory with cryptography may
provide security of high level. Chaotic maps like
Arnold cat map, tent map, sine map, logistic map are
used in image encryption. Two or more maps can
also be used in combination. Arnold cat map cannot
be efficient alone for image encryption so it can be
used with other maps for efficient encryption.
REFERENCES
[1] Ljupcˇo Kocarev, Chaos-Based
Cryptography:A Brief Overview, IEEE,
1531-636X/10/$10.00©2001,
[2] Shiguo Lian, Jinsheng Sun, Zhiquan Wang,
Security Analysis of A Chaos-based Image
Encryption Algorithm, The paper was
accepted by Phisica A, Elsevier Science,
2005.
[3] Haojiang Gao , Yisheng Zhang, Shuyun
Liang, Dequn Li, A new chaotic algorithm
for image encryption, ©2005 Published by
Elsevier Ltd.
[4] Mohammad Ali Bani Younes and Aman
Jantan, Image Encryption Using Block-Based
Transformation Algorithm, International
Journal of Computer Science, 35:1,
IJCS_35_1_03, Issue 19, February 2008
[5] Alireza Jolfaei and Abdolrasoul Mirghadri,
Survey: Image Encryption Using Salsa20,
International Journal of Computer Science,
Vol. 7, Issue 5, September 2010 ,ISSN
(Online): 1694-0814
[6] Mao-Yu Huang et .al, Image Encryption
Algorithm Based on Chaotic Maps, 978-1-
4244-7640-4/10/$26.00 ©2010 IEEE .
[7] Jolly Shah and Dr. Vikas Saxena,
Performance Study on Image Encryption
Schemes, International Journal of Computer
Science, Vol. 8, Issue 4, No 1, July 2011
[8] Yicong Zhou, Long Bao, C. L. Philip Chen,
Image Encryption Using a New Parametric
Switching Chaotic System, ©2011 Published
by Elsevier Ltd.
[9] Mintu Philip et.al, Survey: Image Encryption
using Chaotic Cryptography Schemes,
International Journal of Computer
Applications, Special Issue on Computational
Science - New Dimensions & Perspectives,
NCCSE, 2011
[10] Varsha S.Nemade and R.B.Wagh, Review of
different image encryption techniques, Proc.
of National Conference on Emerging Trends
in Computer Technology (NCETCT-2012)
Held at R.C.Patel Institute of Technology,
Shirpur, Dist. Dhule,Maharashtra,India. April
21, 2012
[11] Ruisong Ye and Wenping Yu, An Image
Hiding Scheme Using 3D Sawtooth Map and
Discrete Wavelet Transform, I.J. Image,
Graphics and Signal Processing, 2012, 6, 52-
60
[12] Pankesh et al., Image Encryption Using Pixel
Shuffling, International Journal of Advanced
Research in Computer Science and Software
Engineering 2 (12), December - 2012, pp.
279-282 © 2012, All Rights Reserved Page |
279 Volume 2, Issue 12, December 2012
ISSN: 2277 128X
[13] Shubhangini P.Nichat, Prof.Mrs.S.S.Sikchi,
Image Encryption using Hybrid Genetic
Algorithm, International Journal of
Ankita Gaur et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.904-907
www.ijera.com 907 | P a g e
Advanced Research in Computer Science and
Software Engineering, Volume 3, Issue 1,
January 2013 ISSN: 2277 128X.
[14] Rajinder Kaur1, Er.Kanwalprit Singh, Image
Encryption Techniques: A Selected Review,
IOSR Journal of Computer Engineering
(IOSR-JCE) e-ISSN: 2278-0661, p- ISSN:
2278-8727,Volume 9, Issue 6 (Mar. - Apr.
2013), PP 80-83
[15] Mohammed A. Shreef and Haider K.
Hoomod, Image Encryption Using Lagrange-
Least Squares Interpolation, International
Journal of Advanced Computer Science
andInformation Technology ,Vol. 2, No. 4,
2013, Page: 35-55, ISSN: 2296-1739
[16] Pia Singh, Prof. Karamjeet Singh, Image
Encryption And Decryption Using Blowfish
Algorithm In Matlab, International Journal
of Scientific & Engineering Research,
Volume 4, Issue 7, July-2013.
[17] Vani et al., International Journal of
Advanced Research in Computer Science and
Software Engineering 3(9), September -
2013, pp. 1210-1215
[18] Prachi Junwale , R. Manasa Annapurna,
G.Sobha,A Review on Image Encryption
Technique based on Hyper Image Encryption
Algorithm, International Journal of
Advanced Research in Computer Science and
Software Engineering 3(11), November -
2013, pp. 614-618.
[19] Sukhjeevan Kaur et al , A Review of
ImageEncryption Schemes Based on the
Chaotic Map , International Journal of
Computer Technology & Applications,Vol 5
(1),PP144-149, 2014, ISSN:2229-6093

More Related Content

What's hot

Image Security
Image SecurityImage Security
Image Security
Satyendra Rajput
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniqueAncy Mariam Babu
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
AnsabArshad
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
IJNSA Journal
 
An Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based CryptosystemAn Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based Cryptosystem
xlyle
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
Editor IJCATR
 
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
IJORCS
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
IOSR Journals
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
Sayantan Sur
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
Pradeep Vishwakarma
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
Aashish R
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptography
Zac Darcy
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
IJERA Editor
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
idescitation
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
IJAEMSJORNAL
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
IJNSA Journal
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted images
eSAT Journals
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
IJERA Editor
 

What's hot (19)

Image Security
Image SecurityImage Security
Image Security
 
Thesis Background
Thesis BackgroundThesis Background
Thesis Background
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 
An Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based CryptosystemAn Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based Cryptosystem
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptography
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted images
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 

Viewers also liked

Ey4301913917
Ey4301913917Ey4301913917
Ey4301913917
IJERA Editor
 
D43042025
D43042025D43042025
D43042025
IJERA Editor
 
D43021519
D43021519D43021519
D43021519
IJERA Editor
 
Cj4301492497
Cj4301492497Cj4301492497
Cj4301492497
IJERA Editor
 
Cf4301466469
Cf4301466469Cf4301466469
Cf4301466469
IJERA Editor
 
Fa4301925930
Fa4301925930Fa4301925930
Fa4301925930
IJERA Editor
 
F43053237
F43053237F43053237
F43053237
IJERA Editor
 
I43055257
I43055257I43055257
I43055257
IJERA Editor
 
Dg4301625635
Dg4301625635Dg4301625635
Dg4301625635
IJERA Editor
 
Eo4301852855
Eo4301852855Eo4301852855
Eo4301852855
IJERA Editor
 
F43022431
F43022431F43022431
F43022431
IJERA Editor
 
D43062127
D43062127D43062127
D43062127
IJERA Editor
 
Cm4301507513
Cm4301507513Cm4301507513
Cm4301507513
IJERA Editor
 
El4301832837
El4301832837El4301832837
El4301832837
IJERA Editor
 
Cc4301455457
Cc4301455457Cc4301455457
Cc4301455457
IJERA Editor
 
J43025258
J43025258J43025258
J43025258
IJERA Editor
 
Lk3619561964
Lk3619561964Lk3619561964
Lk3619561964
IJERA Editor
 

Viewers also liked (20)

Ey4301913917
Ey4301913917Ey4301913917
Ey4301913917
 
D43042025
D43042025D43042025
D43042025
 
D43021519
D43021519D43021519
D43021519
 
Cj4301492497
Cj4301492497Cj4301492497
Cj4301492497
 
By4301435440
By4301435440By4301435440
By4301435440
 
Cf4301466469
Cf4301466469Cf4301466469
Cf4301466469
 
Fa4301925930
Fa4301925930Fa4301925930
Fa4301925930
 
F43053237
F43053237F43053237
F43053237
 
I43055257
I43055257I43055257
I43055257
 
Dg4301625635
Dg4301625635Dg4301625635
Dg4301625635
 
Eo4301852855
Eo4301852855Eo4301852855
Eo4301852855
 
F43022431
F43022431F43022431
F43022431
 
D43062127
D43062127D43062127
D43062127
 
Cm4301507513
Cm4301507513Cm4301507513
Cm4301507513
 
El4301832837
El4301832837El4301832837
El4301832837
 
Cc4301455457
Cc4301455457Cc4301455457
Cc4301455457
 
C43021014
C43021014C43021014
C43021014
 
J43025258
J43025258J43025258
J43025258
 
Lk3619561964
Lk3619561964Lk3619561964
Lk3619561964
 
Alans English homework
Alans English homeworkAlans English homework
Alans English homework
 

Similar to Ew4301904907

Medical image encryption using multi chaotic maps
Medical image encryption using multi chaotic mapsMedical image encryption using multi chaotic maps
Medical image encryption using multi chaotic maps
TELKOMNIKA JOURNAL
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
ijcsit
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
cscpconf
 
Image encryption algorithm based on the density and 6D logistic map
Image encryption algorithm based on the density and 6D logistic map Image encryption algorithm based on the density and 6D logistic map
Image encryption algorithm based on the density and 6D logistic map
IJECEIAES
 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systems
TELKOMNIKA JOURNAL
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
ijcisjournal
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
ijcisjournal
 
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
sipij
 
Secure image hiding in speech signal by steganography-mining and encryption
Secure image hiding in speech signal by steganography-mining  and encryptionSecure image hiding in speech signal by steganography-mining  and encryption
Secure image hiding in speech signal by steganography-mining and encryption
nooriasukmaningtyas
 
T01022103108
T01022103108T01022103108
T01022103108
IOSR Journals
 
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
IJERA Editor
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
IJNSA Journal
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
ijsrd.com
 
Chaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey StudyChaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey Study
journalBEEI
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
IRJET Journal
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
CSCJournals
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
Jeff Brooks
 

Similar to Ew4301904907 (20)

Medical image encryption using multi chaotic maps
Medical image encryption using multi chaotic mapsMedical image encryption using multi chaotic maps
Medical image encryption using multi chaotic maps
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
 
Image encryption algorithm based on the density and 6D logistic map
Image encryption algorithm based on the density and 6D logistic map Image encryption algorithm based on the density and 6D logistic map
Image encryption algorithm based on the density and 6D logistic map
 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systems
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
 
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
 
Secure image hiding in speech signal by steganography-mining and encryption
Secure image hiding in speech signal by steganography-mining  and encryptionSecure image hiding in speech signal by steganography-mining  and encryption
Secure image hiding in speech signal by steganography-mining and encryption
 
T01022103108
T01022103108T01022103108
T01022103108
 
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
Chaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey StudyChaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey Study
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Ew4301904907

  • 1. Ankita Gaur et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.904-907 www.ijera.com 904 | P a g e Review: Image Encryption Using Chaos Based algorithms Er. Ankita Gaur*, Er. Maneesha Gupta** *(M.tech scholar, Electronics and communication Engineering department, SKIET, kurukshetra) ** (Lecturer, Electronics and communication Engineering Department, SKIET, Kurukshetra) ABSTRACT Due to the development in the field of network technology and multimedia applications, every minute thousands of messages which can be text, images, audios, videos are created and transmitted over wireless network. Improper delivery of the message may leads to the leakage of important information. So encryption is used to provide security. In last few years, variety of image encryption algorithms based on chaotic system has been proposed to protect image from unauthorized access. 1-D chaotic system using logistic maps has weak security, small key space and due to the floating of pixel values, some data lose occurs and proper decryption of image becomes impossible. In this paper different chaotic maps such as Arnold cat map, sine map, logistic map, tent map have been studied. Keywords – Arnold cat map, Encryption, logistic map, sine map, tent map, 1-D chaotic system. I. Introduction Protection of multimedia contents from unauthorized access is necessary nowadays. With the help of cryptography readable form of message is converted to the non readable form. And reverse of cryptography in which non readable form of message is converted back to readable form, is called cryptanalysis. The combination of these two techniques is referred as Cryptology. Communication in human language referred as Plain Text which can be easily understandable by anyone else. In order to provide security plain text is coded with suitable encryption shames and the codified message is referred as cipher text. Fig.1 represents the block diagram of encryption, where Ke is the encryption key. Ke figure 1:block diagram of encryption Encryption key Ke is implemented on plain text to convert it to cipher text. Fig. 2 represents the basic decryption technique, where Kd is the decryption key. Similarly Kd is implemented on cipher text to convert back it to the plain text. Kd figure 2: block diagram of decryption Encryption techniques can be classified on the basis of key, structure of algorithms and percentage of encrypted data. On the basis of key encryption can be symmetric encryption and asymmetric encryption, on the basis of structure encryption can be block cipher and stream cipher. And on the basis of basis of percentage of encrypted data encryption can be full encryption and partial encryption. II. Literature Review Varsha S.Nemade et.al discussed that text encryption algorithms which have been already developed are not suitable for the image encryption, Encryption Decryption Cipher Text Cipher Text Plain Text Plain Text RESEARCH ARTICLE OPEN ACCESS
  • 2. Ankita Gaur et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.904-907 www.ijera.com 905 | P a g e because image containing large amount of data means it contains number of pixels. Image encryption techniques scrambled the pixels of the image and decrease the correlation among the pixels, so that we will get lower correlation among the pixel and get the encrypted image. In this paper survey of different image encryption techniques has been discussed Jolly Shah et.al stated that image applications have been increasing in recent years. Encryption is used to provide the security needed for image applications. In this paper, we classify various image encryption schemes and analyze them with respect to various parameters like tunability, visual degradation, compression friendliness, format compliance, encryption ratio, speed, and cryptographic security. Haojiang Gao et.al discussed that recent researches of image encryption algorithms based on chaotic systems, but the drawbacks of small key space and weak security in one-dimensional chaotic cryptosystems are obvious. This paper presents a new nonlinear chaotic algorithm (NCA) which uses power function and tangent function instead of linear function. Its structural parameters are obtained by experimental analysis. And an image encryption algorithm in a one-time-one password system is designed. The experimental results demonstrate that the image encryption algorithm based on NCA shows advantages of large key space and high-level security, while maintaining acceptable efficiency. Compared with some general encryption algorithms such as DES, the encryption algorithm is more secure. Yicong Zhou et.al introduced a new parametric switching chaotic system (PSCS) and its corresponding transforms for image encryption. The proposed PSCS has a simple structure and integrates the Logistic, Sine and Tent maps into one single system. The PSCS shows more general properties, including the Sine and Tent maps as special instances. It has complex chaotic behaviors. A novel image encryption algorithm is introduced using the proposed PSCS and its transforms. Simulation results and security analysis are given to demonstrate that the proposed algorithm can encrypt different types of images with a high level of security. III. Methodology Text encryption algorithms such as Advanced Encryption Standard (AES) or Data Encryption Standard (DES) cannot be used for image encryption because image is made up of pixels or in other words image has large data as compared to text. Image encryption can be done by chaos theory. Fig.3 shows the image before and after the encryption. Original image Encrypted image figure 3: image encryption 3.1 Chaotic system: Chaotic system can be considered as source of randomness and chaos is randomness of a deterministic dynamical system. Mathematically A chaotic map can be defined as Xn+1= f (Xn) …………………………….. ……...(1) Where 0<Xn<1 and n=0, 1, 2… Chaotic sequence can be used as random number sequence and spread spectrum sequence. The chaotic systems are characterized by the non linear and unpredictable. They appear to have irregular order but infect there is a sense of order. Chaotic systems are sensitive to initial conditions, small change in starting point can cause different outcomes. Chaos has many applications in modulation, compression, and encryption. In image encryption, 1- D chaotic system using logistic maps has simplicity and high efficiency but it has weak security and small key space. Different Chaotic maps can be used for this purpose. Generally in chaos based algorithm, pixels of image are scrambled and correlation among pixels is decreased to get encrypted image. Figure 2 represent the basic image encryption flow chart of chaos based algorithms. Where k and iv are the key and initial vector generated by chaotic system. 3.1.1 Arnold cat map: it was demonstrated by Vladimir Arnold in 1960s by using an image of a cat. Arnold cat map uses the concept of linear algebra to change the position of pixels of original image. Original image is divided into blocks and then Arnold transformation is done. Let X is a vector, X= [ ], then Arnold cat map transformation is, Γ: [ ] → [ ] 𝑚𝑜𝑑 𝑛 Some conditions such as p and q are positive integers and =1 This makes it area-preserving. Original image can be shuffled by applying Arnold map operation iteratively. But shuffled image can return to original form after several iterations. Encryption
  • 3. Ankita Gaur et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.904-907 www.ijera.com 906 | P a g e 3.1.2 Logistic map: 1-D logistic map was proposed by RM may. This map is simplest non linear chaotic system which can be defined as zn+1= λ zn(1-zn)…………………………………..(2) Where z0 is initial condition, n is number of iterations and λ is system parameter. For 3.57 < λ < 4 map is considered as chaotic .And z n+1 belong to (0, 1) for all n. equation 1 is used to encrypt the shuffled pixels. 3.1.3 Sine map: sine map is defined as X n+1=a xn 2 sin(π xn) …………………………..(3) when x0 = 0.7 and a=2.3, equation 2 has the simplified form . for the interval (0,1) it generates chaotic sequence . 3.1.4 Tent map: tent map resembles the logistic map. It generates chaotic sequences in (0,1) assuming the following equation Where µ is a positive number and depending on its value tent map exhibit dynamic behavior ranging from predictable to chaotic. 3.1.5 Circle map: it is defined as Xn+1= Xn + d – (c/2π) sin( 2πXn) mod(1)………(4) Where d = 0.2, c = 0.5, and x0 € [0,1] generates Chaotic sequence in [0,1]. IV. Conclusion In order to provide security to the image, cryptography is used which converts an image into another form (non readable form). Chaotic systems have many applications in image processing such as image compression and image encryption. Combination of chaos theory with cryptography may provide security of high level. Chaotic maps like Arnold cat map, tent map, sine map, logistic map are used in image encryption. Two or more maps can also be used in combination. Arnold cat map cannot be efficient alone for image encryption so it can be used with other maps for efficient encryption. REFERENCES [1] Ljupcˇo Kocarev, Chaos-Based Cryptography:A Brief Overview, IEEE, 1531-636X/10/$10.00©2001, [2] Shiguo Lian, Jinsheng Sun, Zhiquan Wang, Security Analysis of A Chaos-based Image Encryption Algorithm, The paper was accepted by Phisica A, Elsevier Science, 2005. [3] Haojiang Gao , Yisheng Zhang, Shuyun Liang, Dequn Li, A new chaotic algorithm for image encryption, ©2005 Published by Elsevier Ltd. [4] Mohammad Ali Bani Younes and Aman Jantan, Image Encryption Using Block-Based Transformation Algorithm, International Journal of Computer Science, 35:1, IJCS_35_1_03, Issue 19, February 2008 [5] Alireza Jolfaei and Abdolrasoul Mirghadri, Survey: Image Encryption Using Salsa20, International Journal of Computer Science, Vol. 7, Issue 5, September 2010 ,ISSN (Online): 1694-0814 [6] Mao-Yu Huang et .al, Image Encryption Algorithm Based on Chaotic Maps, 978-1- 4244-7640-4/10/$26.00 ©2010 IEEE . [7] Jolly Shah and Dr. Vikas Saxena, Performance Study on Image Encryption Schemes, International Journal of Computer Science, Vol. 8, Issue 4, No 1, July 2011 [8] Yicong Zhou, Long Bao, C. L. Philip Chen, Image Encryption Using a New Parametric Switching Chaotic System, ©2011 Published by Elsevier Ltd. [9] Mintu Philip et.al, Survey: Image Encryption using Chaotic Cryptography Schemes, International Journal of Computer Applications, Special Issue on Computational Science - New Dimensions & Perspectives, NCCSE, 2011 [10] Varsha S.Nemade and R.B.Wagh, Review of different image encryption techniques, Proc. of National Conference on Emerging Trends in Computer Technology (NCETCT-2012) Held at R.C.Patel Institute of Technology, Shirpur, Dist. Dhule,Maharashtra,India. April 21, 2012 [11] Ruisong Ye and Wenping Yu, An Image Hiding Scheme Using 3D Sawtooth Map and Discrete Wavelet Transform, I.J. Image, Graphics and Signal Processing, 2012, 6, 52- 60 [12] Pankesh et al., Image Encryption Using Pixel Shuffling, International Journal of Advanced Research in Computer Science and Software Engineering 2 (12), December - 2012, pp. 279-282 © 2012, All Rights Reserved Page | 279 Volume 2, Issue 12, December 2012 ISSN: 2277 128X [13] Shubhangini P.Nichat, Prof.Mrs.S.S.Sikchi, Image Encryption using Hybrid Genetic Algorithm, International Journal of
  • 4. Ankita Gaur et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.904-907 www.ijera.com 907 | P a g e Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 1, January 2013 ISSN: 2277 128X. [14] Rajinder Kaur1, Er.Kanwalprit Singh, Image Encryption Techniques: A Selected Review, IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727,Volume 9, Issue 6 (Mar. - Apr. 2013), PP 80-83 [15] Mohammed A. Shreef and Haider K. Hoomod, Image Encryption Using Lagrange- Least Squares Interpolation, International Journal of Advanced Computer Science andInformation Technology ,Vol. 2, No. 4, 2013, Page: 35-55, ISSN: 2296-1739 [16] Pia Singh, Prof. Karamjeet Singh, Image Encryption And Decryption Using Blowfish Algorithm In Matlab, International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013. [17] Vani et al., International Journal of Advanced Research in Computer Science and Software Engineering 3(9), September - 2013, pp. 1210-1215 [18] Prachi Junwale , R. Manasa Annapurna, G.Sobha,A Review on Image Encryption Technique based on Hyper Image Encryption Algorithm, International Journal of Advanced Research in Computer Science and Software Engineering 3(11), November - 2013, pp. 614-618. [19] Sukhjeevan Kaur et al , A Review of ImageEncryption Schemes Based on the Chaotic Map , International Journal of Computer Technology & Applications,Vol 5 (1),PP144-149, 2014, ISSN:2229-6093