SlideShare a Scribd company logo
International Journal of Computer Applications Technology and Research
Volume 4– Issue 2, 165 - 169, 2015, ISSN:- 2319–8656
www.ijcat.com 165
New Technique for Image Encryption Based on Choas
and Change of MSB
Fariba Ghorbany beram
Sama Technical and Vocational
Training College
Islamic Azad University
Shoushtar Branch, Shoushtar
Iran
Mojtaba khayt
Sama Technical and Vocational
Training College
Islamic Azad University
Shoushtar Branch, Shoushtar
Iran
Sajjad Ghorbany Beram
Sama Technical and Vocational
Training College
Islamic Azad University
Shoushtar Branch, Shoushtar
Iran
Abstract:
In this paper, an algorithm for image encryption using chaotic systems and techniques to change the pixel values are proposed for
protecting digital images in an efficient and safe manner will be offered. In the proposed algorithm, the stochastic properties of chaotic
Logistic system is used. To evaluate the performance of the proposed algorithm, we have implemented it in MATLAB using
parameters such as visual analysis, key space analysis, histogram analysis. Implementation results show that the proposed algorithm,
the algorithm is efficient and safe.
1. INTRODUCTION
Cryptography is the science of code and secrets. It is an
ancient art and it has been used for several centuries amang
commeders, informers and others to protect the message
amang them and to keep the messages privately. When we are
dealing with the data safety, we need the identity sender and
receiver of the message and also we should make sure about
the content of message has not been manipulated. These three
subjects, in other words, confidentiality, confirming the
identity and generality are at the center of safety of modern
data communication and can make use of cryptography. As a
whole, this issue should be guaranteed that a message can
only be decoded(read) by means of the people to whom the
message has been sent and others are not allowed to read
them. The method wich provides this issue is called
cryptography[1,2,3].
2.CHAOS
Chaos is a phenomenon wich takes place in the definable
nonlinear systems that have a lot of sensitivity against the
primary conditions and their uasi randomized behavior
suchlike systems satisfy the liapanof appearance they will be
in a stable condition in the peak of chaos. The out put of this
system is always under the effect of primary amounts of input.
On the other hand prediction of this kind of signal is almost
impossible with having the primary amounts and the physical
appearance(shape) of this signal is similar to noise. The chaos
environs have the following specifications:high sensitivity in
relation to the primary conditions, exactness and lack of
statistical prediction[4,5,6].
Formula1
Xn+1=r.xn(1-xn)
xn is the state variable being in the interval [0, 1] and r
is system parameter which might have any value between 1
and 4. In this paper we have used the logistic function to
generate the secret key.
3. THE PROPOSED METHOD
In this study an algoritm is presented which changes the
order of pixels in the input image in a way that there will be
very difference between the input and output image. At first
we divide the input image into three sub-bands, namely red,
green, blue to satisfy our expectation, and the current place of
pixels is randomly changed into a place which is determined
by means of fourmalu2,3. In order to change the mounts of
the pixels which are fixed in new places with ane of the lines
of table1 which is randomly assigned by fourmala4. table 1
includes 16 lines that each line with 4 valuable bits is xor with
the pixels amounts.
Fourmalu2
Xn+1=(r.xn(1-xn))*a 1<a<number of rows
Fourmalu3
Xn+1=(r.xn(1-xn))*b 1<b<number of columns
fourmalu14
Xn+1=(r.xn(1-xn))*c 1<c<16
a, b are selected so that the Chaos integer between 1 to
Number of rows and 1 columns are generated, and c are
International Journal of Computer Applications Technology and Research
Volume 4– Issue 2, 165 - 169, 2015, ISSN:- 2319–8656
www.ijcat.com 166
determined by a number between one and sixteen production
so that each execution of the scalar random selection row of
table 1 is selected.
For example, if the pixel value 150 is a binary value of
10010110 is then based on the value of the Formula 4 comes a
row of Table 1 is selected and a four digit value of
number(10010110), XOR, and the new value replaces the
pixel values of previous that is, if the number 14 is derived
from the logistic map, 4MSB(most sign bit of number) with
the number 150 (1001) with row 1 of table (1110), XOR is
and result is 118(Figure1,2).
Table1
Figure1-change MSb of pixel with the selected rows
Figure 2-Flowchart of the data encryption process
The image is composed of pixels, the pixel values are in
hiding and encryption technique for digital images. Change in
the least significant bit[7,8,9] of a pixel, which is technically
referred to as steganogeraphy[10,11,12]( Figure 3).
As shown in Figure 4, we change a bit in the pixel values of
images will not cause a visual change .in this paper we have
used the change in the msb. As we see in Figure 5, this change
is very real.
We also intend to change the values of the pixels in such a
way that the basic shape vary.
Figure 3
P7 P6 P5 P4 P3 P2 P1 P0
Msb
MSB
Msb
LSB
CRYPTOGRAPHY STEGANOGERAPHY
ROWES XOR
0 0000
1 0001
2 0010
3 0011
4 0100
5 0101
6 0110
7 0111
8 1000
9 1001
10 1010
11 1011
12 1100
13 1101
14 1110
15 1111
International Journal of Computer Applications Technology and Research
Volume 4– Issue 2, 165 - 169, 2015, ISSN:- 2319–8656
www.ijcat.com 167
Figure4.change of LSB bits of pixel
Figure5.change of MSB bits of pixel
A. Encryption algorithm
1) The original image into three sub-bands of red, green and
blue break
2) change position of pixel(row and column) based on the
logistic map.
3) Changing the pixel values given in Table 1.
4. IMPLEMENTATION
A method of good cryptography must be resistant against
difference kinds of code-detection and statistical attacks. In
the continuation the suggested algoritm will be analysis, the
analysis of sensitivity of this method in relation to key
changing, the analysis of The key space and histogram.
A. THE HISTOGRAM CHART
it is a kind of method of examining the encoded image of
observation, a good cryptography algoritm should arrange the
image in such a way that its specifications not to be
specifiable. Also, no kind of information in the encoded
image by comparing the encoded image with the main image
should be observed. The main image and the encoded image
should be seprate visually. The analysis of histogram
expresses that pixels are distributed. In the images by means
of drawing the observations numbers of the light severity.
However we con not find the major image by prossessing the
chart. In cryptography the greater difference between the main
image histogram and encoded image will cause the safer
algoritm. As it come be clearly seen in Figure6, Figure7,
Figure8 and Figure 9 , that the histogram of cryptography
image is totally different from the main image histogram. This
problem increases th risk of possibility of statistical attacks.
The analysis of random of randomization:an algoritm should
have certain suitable probable features such as good
distribution, high complexity and efficiency in order to have
more security.
Figure 6-original image
International Journal of Computer Applications Technology and Research
Volume 4– Issue 2, 165 - 169, 2015, ISSN:- 2319–8656
www.ijcat.com 168
Figure7-encrypted image
Figure8- histogram of original image
Figure9- histogram of encrypted image
B. THERE ARE VARIOUS WAYS IN
ORDER TO CREATE RANDOM
NUMBERS
Today, researchers have paied special attention to chaos
systems. We applied logestic chaos system to make random
number in this paper. Fourm1 shows one of most famous
signals which has chaos behavior and it is called logestic map.
While r[3.57 4] the behavior of system is generally like a
chaos.
As a whole one ideal feature for an encrypted image is its
sensitivity in relation with the partial changes in the main
image, in other words changing one pixel. The invader tries to
create some partial changes in the input images to observe the
result changes in the secret image. By usig this method the
meaningful relation between the main image and the
encrypted image will be obvious. This activity itself made the
key to be diagnosed and to be known in more simple way. one
of the feauures of evaluating the cryptography algoritms is
the analysis of sensitivity to the key[9]. Namely, making
changes in the key should create a totally different encrypted
image.to do this, it is enough to change the amounts of x,y,r in
the suggested algoritm, as a result, regarding the feature of
chaos environs which are related to the primary elements, the
produced amounts change and the result of it is creating
different encrypted images(Figure10,11).
International Journal of Computer Applications Technology and Research
Volume 4– Issue 2, 165 - 169, 2015, ISSN:- 2319–8656
www.ijcat.com 169
Figure10.image encrypted based on initial x1,y1,r1
Figure11.image encrypted based on initial x2,y2,r2
5. CONCLUSION
An algoritm for cryptography of image was introduced in this
article. The suggested algoritm was evaluated by means of
some exams to assess the efficacy of the algoritm. The result
of visual tests and the analysis of histogram showed that there
is not any obvious fiber in the encrypted images by suggested
algoritm and there is no similarity between the main image
and the encrypted image from the viewpoint of statistics. The
result of the analysis of sensitivity to the key showed that the
suggested algoritm is very sensitive regarding switching the
key.
6. REFERENCES
[1] Shiguo Lian_, JinshengSun, Zhiquan Wang, “Security
analysis ofa chaos-based image encryption algorithm”,
Elsevier, Physica A, Vol. 351, pp. 645–661,2005.
[2] B. Schneier, “Applied Cryptography Second Edition :
protocols, algorithms, and source code in C”, ISBN
9971-51-348-X, John Wiley & Sons,1996.
[3] Fethi Belkhouche, Uvais Qidwai, Ibrahim Gokcen, Dale
Joachim, “Binary Image Transformation Using Two-
Dimensional Chaotic Maps”, IEEE, Proceedings of the
17th International Conference on Pattern Recognition
(ICPR), 2004.
[4] Grummt, E., Ackermann, R.: Proof of Possession:
Using RFID for large-scale Authorization
Management. In: Mhlhuser, M., Ferscha, A.,
Aitenbichler, E. (eds.) Constructing Ambient
Intelligence, AmI-07 Workshops Proceedings.
Communications in Computer and Information
Science, pp. 174, 182 (2008)
[5] Pecorra, L.M., Carroll, T. L.,“Synchronization in
chaotic systems”, Phys. Rev. Lett., Vol. 64, No. 8,
pp. 821–824, 1990.
[6] Pareek, N.K., Patidar, V., Sud, K.K., “A Random
Bit Generator Using Chaotic Maps”, International
Journal of Network Security, Vol. 10, No. 1, pp. 32-38,
2010.
[7] Mohammad Ahmad Alia, A.A.Y., Public–Key
Steganography Based on Matching Method, in
European Journal of Scientific Research.2010.p.209
[8] D. Bret, A detailed look at Steganographic
Techniques,US:SANS institute, 2002.
[9] Belkacem, S. Dibi, Z. Bouridane, “Color Image
Watermarking based on Chaotic Map”, 14th IEEE
International Conference of Electronics, Circuits and
Systems, 2007.
[10] Masoud Nosrati , Ronak Karimi,” A Survey on Usage of
Genetic Algorithmsin Recent Steganography
Researches”, World Applied Programming, Vol (2), No
(3), March 2012. 206-210,ISSN: 2222-2510,©2011
WAP journal. www.waprogramming.com
[11] Indradip Banerjee, Souvik Bhattacharyya, Gautam
Sanyal,” A Procedure of Text Steganography Using
Indian Regional Language”, J. Computer Network and
Information Security, 2012, 8, 65-73 Published Online
August 2012 in MECS (http://www.mecs-press.org/)
[12] Seyyed Amin Seyyedi, Rauf.Kh Sadykhov,” Digital
Image Steganography Concept and Evaluation”,
International Journal of Computer Applications (0975 –
8887) Volume 66– No.5, March 2013

More Related Content

What's hot

Automatic digital terrain modelling
Automatic digital terrain modellingAutomatic digital terrain modelling
Automatic digital terrain modellingSumant Diwakar
 
Object Tracking By Online Discriminative Feature Selection Algorithm
Object Tracking By Online Discriminative Feature Selection AlgorithmObject Tracking By Online Discriminative Feature Selection Algorithm
Object Tracking By Online Discriminative Feature Selection Algorithm
IRJET Journal
 
Fuzzy Genetic Algorithm Approach for Verification of Reachability and Detect...
Fuzzy Genetic Algorithm Approach for Verification  of Reachability and Detect...Fuzzy Genetic Algorithm Approach for Verification  of Reachability and Detect...
Fuzzy Genetic Algorithm Approach for Verification of Reachability and Detect...
Dr. Amir Mosavi, PhD., P.Eng.
 
Viterbi optimization for crime detection and identification
Viterbi optimization for crime detection and identificationViterbi optimization for crime detection and identification
Viterbi optimization for crime detection and identification
TELKOMNIKA JOURNAL
 
On the Performance of the Pareto Set Pursuing (PSP) Method for Mixed-Variable...
On the Performance of the Pareto Set Pursuing (PSP) Method for Mixed-Variable...On the Performance of the Pareto Set Pursuing (PSP) Method for Mixed-Variable...
On the Performance of the Pareto Set Pursuing (PSP) Method for Mixed-Variable...Amir Ziai
 
Data Processing Techniques for 3D Surface Morphology
Data Processing Techniques for 3D Surface MorphologyData Processing Techniques for 3D Surface Morphology
Data Processing Techniques for 3D Surface Morphology
theijes
 
The Improved Hybrid Algorithm for the Atheer and Berry-ravindran Algorithms
The Improved Hybrid Algorithm for the Atheer and  Berry-ravindran Algorithms  The Improved Hybrid Algorithm for the Atheer and  Berry-ravindran Algorithms
The Improved Hybrid Algorithm for the Atheer and Berry-ravindran Algorithms
IJECEIAES
 
Graph Signal Processing for Machine Learning A Review and New Perspectives - ...
Graph Signal Processing for Machine Learning A Review and New Perspectives - ...Graph Signal Processing for Machine Learning A Review and New Perspectives - ...
Graph Signal Processing for Machine Learning A Review and New Perspectives - ...
lauratoni4
 
Iaetsd an efficient and large data base using subset selection algorithm
Iaetsd an efficient and large data base using subset selection algorithmIaetsd an efficient and large data base using subset selection algorithm
Iaetsd an efficient and large data base using subset selection algorithm
Iaetsd Iaetsd
 
Spline (Interpolation)
Spline (Interpolation)Spline (Interpolation)
Spline (Interpolation)
Pallab Jana
 
A Combined Model between Artificial Neural Networks and ARIMA Models
A Combined Model between Artificial Neural Networks and ARIMA ModelsA Combined Model between Artificial Neural Networks and ARIMA Models
A Combined Model between Artificial Neural Networks and ARIMA Models
paperpublications3
 
Farsi character recognition using new hybrid feature extraction methods
Farsi character recognition using new hybrid feature extraction methodsFarsi character recognition using new hybrid feature extraction methods
Farsi character recognition using new hybrid feature extraction methods
ijcseit
 
A Homomorphism-based Framework for Systematic Parallel Programming with MapRe...
A Homomorphism-based Framework for Systematic Parallel Programming with MapRe...A Homomorphism-based Framework for Systematic Parallel Programming with MapRe...
A Homomorphism-based Framework for Systematic Parallel Programming with MapRe...
Yu Liu
 
IRJET - Application of Linear Algebra in Machine Learning
IRJET -  	  Application of Linear Algebra in Machine LearningIRJET -  	  Application of Linear Algebra in Machine Learning
IRJET - Application of Linear Algebra in Machine Learning
IRJET Journal
 
Xmr im
Xmr imXmr im
Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...
LogicMindtech Nologies
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System
iosrjce
 
Template matching03
Template matching03Template matching03
Template matching03
amitkhanna1991
 
A Comparison between FPPSO and B&B Algorithm for Solving Integer Programming ...
A Comparison between FPPSO and B&B Algorithm for Solving Integer Programming ...A Comparison between FPPSO and B&B Algorithm for Solving Integer Programming ...
A Comparison between FPPSO and B&B Algorithm for Solving Integer Programming ...
Editor IJCATR
 

What's hot (19)

Automatic digital terrain modelling
Automatic digital terrain modellingAutomatic digital terrain modelling
Automatic digital terrain modelling
 
Object Tracking By Online Discriminative Feature Selection Algorithm
Object Tracking By Online Discriminative Feature Selection AlgorithmObject Tracking By Online Discriminative Feature Selection Algorithm
Object Tracking By Online Discriminative Feature Selection Algorithm
 
Fuzzy Genetic Algorithm Approach for Verification of Reachability and Detect...
Fuzzy Genetic Algorithm Approach for Verification  of Reachability and Detect...Fuzzy Genetic Algorithm Approach for Verification  of Reachability and Detect...
Fuzzy Genetic Algorithm Approach for Verification of Reachability and Detect...
 
Viterbi optimization for crime detection and identification
Viterbi optimization for crime detection and identificationViterbi optimization for crime detection and identification
Viterbi optimization for crime detection and identification
 
On the Performance of the Pareto Set Pursuing (PSP) Method for Mixed-Variable...
On the Performance of the Pareto Set Pursuing (PSP) Method for Mixed-Variable...On the Performance of the Pareto Set Pursuing (PSP) Method for Mixed-Variable...
On the Performance of the Pareto Set Pursuing (PSP) Method for Mixed-Variable...
 
Data Processing Techniques for 3D Surface Morphology
Data Processing Techniques for 3D Surface MorphologyData Processing Techniques for 3D Surface Morphology
Data Processing Techniques for 3D Surface Morphology
 
The Improved Hybrid Algorithm for the Atheer and Berry-ravindran Algorithms
The Improved Hybrid Algorithm for the Atheer and  Berry-ravindran Algorithms  The Improved Hybrid Algorithm for the Atheer and  Berry-ravindran Algorithms
The Improved Hybrid Algorithm for the Atheer and Berry-ravindran Algorithms
 
Graph Signal Processing for Machine Learning A Review and New Perspectives - ...
Graph Signal Processing for Machine Learning A Review and New Perspectives - ...Graph Signal Processing for Machine Learning A Review and New Perspectives - ...
Graph Signal Processing for Machine Learning A Review and New Perspectives - ...
 
Iaetsd an efficient and large data base using subset selection algorithm
Iaetsd an efficient and large data base using subset selection algorithmIaetsd an efficient and large data base using subset selection algorithm
Iaetsd an efficient and large data base using subset selection algorithm
 
Spline (Interpolation)
Spline (Interpolation)Spline (Interpolation)
Spline (Interpolation)
 
A Combined Model between Artificial Neural Networks and ARIMA Models
A Combined Model between Artificial Neural Networks and ARIMA ModelsA Combined Model between Artificial Neural Networks and ARIMA Models
A Combined Model between Artificial Neural Networks and ARIMA Models
 
Farsi character recognition using new hybrid feature extraction methods
Farsi character recognition using new hybrid feature extraction methodsFarsi character recognition using new hybrid feature extraction methods
Farsi character recognition using new hybrid feature extraction methods
 
A Homomorphism-based Framework for Systematic Parallel Programming with MapRe...
A Homomorphism-based Framework for Systematic Parallel Programming with MapRe...A Homomorphism-based Framework for Systematic Parallel Programming with MapRe...
A Homomorphism-based Framework for Systematic Parallel Programming with MapRe...
 
IRJET - Application of Linear Algebra in Machine Learning
IRJET -  	  Application of Linear Algebra in Machine LearningIRJET -  	  Application of Linear Algebra in Machine Learning
IRJET - Application of Linear Algebra in Machine Learning
 
Xmr im
Xmr imXmr im
Xmr im
 
Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...Image forgery detection using adaptive over segmentation and feature point ma...
Image forgery detection using adaptive over segmentation and feature point ma...
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System
 
Template matching03
Template matching03Template matching03
Template matching03
 
A Comparison between FPPSO and B&B Algorithm for Solving Integer Programming ...
A Comparison between FPPSO and B&B Algorithm for Solving Integer Programming ...A Comparison between FPPSO and B&B Algorithm for Solving Integer Programming ...
A Comparison between FPPSO and B&B Algorithm for Solving Integer Programming ...
 

Viewers also liked

!Chaos Control System
!Chaos Control System!Chaos Control System
!Chaos Control System
Claudio Bisegni
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
Eswar Publications
 
Unit 4
Unit 4Unit 4
Scalable and secure sharing of public health record using attribute based Enc...
Scalable and secure sharing of public health record using attribute based Enc...Scalable and secure sharing of public health record using attribute based Enc...
Scalable and secure sharing of public health record using attribute based Enc...
shreyank byadagi
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
Naveena N
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
Pradeep Vishwakarma
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaSunil Kumar R
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
Aashish R
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
Animesh Shaw
 
Cryptography
CryptographyCryptography
Cryptography
Shivanand Arur
 

Viewers also liked (10)

!Chaos Control System
!Chaos Control System!Chaos Control System
!Chaos Control System
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
Unit 4
Unit 4Unit 4
Unit 4
 
Scalable and secure sharing of public health record using attribute based Enc...
Scalable and secure sharing of public health record using attribute based Enc...Scalable and secure sharing of public health record using attribute based Enc...
Scalable and secure sharing of public health record using attribute based Enc...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to New Technique for Image Encryption Based on Choas and Change of MSB

A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
IRJET Journal
 
Three Dimensional Chaotic System for Color Image Scrambling Algorithm
Three Dimensional Chaotic System for Color Image Scrambling AlgorithmThree Dimensional Chaotic System for Color Image Scrambling Algorithm
Three Dimensional Chaotic System for Color Image Scrambling Algorithm
IJCSIS Research Publications
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
Face recognition using gaussian mixture model &amp; artificial neural network
Face recognition using gaussian mixture model &amp; artificial neural networkFace recognition using gaussian mixture model &amp; artificial neural network
Face recognition using gaussian mixture model &amp; artificial neural network
eSAT Journals
 
Sparse Sampling in Digital Image Processing
Sparse Sampling in Digital Image ProcessingSparse Sampling in Digital Image Processing
Sparse Sampling in Digital Image Processing
Eswar Publications
 
IRJET- An Image Cryptography using Henon Map and Arnold Cat Map
IRJET-  	  An Image Cryptography using Henon Map and Arnold Cat MapIRJET-  	  An Image Cryptography using Henon Map and Arnold Cat Map
IRJET- An Image Cryptography using Henon Map and Arnold Cat Map
IRJET Journal
 
Human Activity Recognition Using AccelerometerData
Human Activity Recognition Using AccelerometerDataHuman Activity Recognition Using AccelerometerData
Human Activity Recognition Using AccelerometerData
IRJET Journal
 
A Novel Low Complexity Histogram Algorithm for High Performance Image Process...
A Novel Low Complexity Histogram Algorithm for High Performance Image Process...A Novel Low Complexity Histogram Algorithm for High Performance Image Process...
A Novel Low Complexity Histogram Algorithm for High Performance Image Process...
IRJET Journal
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET Journal
 
Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014
ijcsbi
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
TELKOMNIKA JOURNAL
 
Identification of Geometric Shapes with RealTime Neural Networks
Identification of Geometric Shapes with RealTime Neural NetworksIdentification of Geometric Shapes with RealTime Neural Networks
Identification of Geometric Shapes with RealTime Neural Networks
Eswar Publications
 
Automatic License Plate Detection in Foggy Condition using Enhanced OTSU Tech...
Automatic License Plate Detection in Foggy Condition using Enhanced OTSU Tech...Automatic License Plate Detection in Foggy Condition using Enhanced OTSU Tech...
Automatic License Plate Detection in Foggy Condition using Enhanced OTSU Tech...
IRJET Journal
 
Pg3426762678
Pg3426762678Pg3426762678
Pg3426762678
IJERA Editor
 
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET Journal
 
Chaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey StudyChaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey Study
journalBEEI
 
Recognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic OperationsRecognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic Operations
TELKOMNIKA JOURNAL
 

Similar to New Technique for Image Encryption Based on Choas and Change of MSB (20)

A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
 
Three Dimensional Chaotic System for Color Image Scrambling Algorithm
Three Dimensional Chaotic System for Color Image Scrambling AlgorithmThree Dimensional Chaotic System for Color Image Scrambling Algorithm
Three Dimensional Chaotic System for Color Image Scrambling Algorithm
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
Face recognition using gaussian mixture model &amp; artificial neural network
Face recognition using gaussian mixture model &amp; artificial neural networkFace recognition using gaussian mixture model &amp; artificial neural network
Face recognition using gaussian mixture model &amp; artificial neural network
 
Sparse Sampling in Digital Image Processing
Sparse Sampling in Digital Image ProcessingSparse Sampling in Digital Image Processing
Sparse Sampling in Digital Image Processing
 
IRJET- An Image Cryptography using Henon Map and Arnold Cat Map
IRJET-  	  An Image Cryptography using Henon Map and Arnold Cat MapIRJET-  	  An Image Cryptography using Henon Map and Arnold Cat Map
IRJET- An Image Cryptography using Henon Map and Arnold Cat Map
 
Human Activity Recognition Using AccelerometerData
Human Activity Recognition Using AccelerometerDataHuman Activity Recognition Using AccelerometerData
Human Activity Recognition Using AccelerometerData
 
A Novel Low Complexity Histogram Algorithm for High Performance Image Process...
A Novel Low Complexity Histogram Algorithm for High Performance Image Process...A Novel Low Complexity Histogram Algorithm for High Performance Image Process...
A Novel Low Complexity Histogram Algorithm for High Performance Image Process...
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
 
Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
 
Identification of Geometric Shapes with RealTime Neural Networks
Identification of Geometric Shapes with RealTime Neural NetworksIdentification of Geometric Shapes with RealTime Neural Networks
Identification of Geometric Shapes with RealTime Neural Networks
 
Automatic License Plate Detection in Foggy Condition using Enhanced OTSU Tech...
Automatic License Plate Detection in Foggy Condition using Enhanced OTSU Tech...Automatic License Plate Detection in Foggy Condition using Enhanced OTSU Tech...
Automatic License Plate Detection in Foggy Condition using Enhanced OTSU Tech...
 
Pg3426762678
Pg3426762678Pg3426762678
Pg3426762678
 
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
 
Chaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey StudyChaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey Study
 
Recognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic OperationsRecognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic Operations
 

More from Editor IJCATR

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 Model
Editor IJCATR
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendly
Editor IJCATR
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in Nigeria
Editor IJCATR
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Editor IJCATR
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation Conditions
Editor IJCATR
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Editor IJCATR
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source Site
Editor IJCATR
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Editor IJCATR
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Editor IJCATR
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift
Editor IJCATR
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
Editor IJCATR
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Editor IJCATR
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Editor IJCATR
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Editor IJCATR
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Editor IJCATR
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
Editor IJCATR
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in Education
Editor IJCATR
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Editor IJCATR
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Editor IJCATR
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Editor IJCATR
 

More from Editor IJCATR (20)

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 Model
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendly
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in Nigeria
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation Conditions
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source Site
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in Education
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

New Technique for Image Encryption Based on Choas and Change of MSB

  • 1. International Journal of Computer Applications Technology and Research Volume 4– Issue 2, 165 - 169, 2015, ISSN:- 2319–8656 www.ijcat.com 165 New Technique for Image Encryption Based on Choas and Change of MSB Fariba Ghorbany beram Sama Technical and Vocational Training College Islamic Azad University Shoushtar Branch, Shoushtar Iran Mojtaba khayt Sama Technical and Vocational Training College Islamic Azad University Shoushtar Branch, Shoushtar Iran Sajjad Ghorbany Beram Sama Technical and Vocational Training College Islamic Azad University Shoushtar Branch, Shoushtar Iran Abstract: In this paper, an algorithm for image encryption using chaotic systems and techniques to change the pixel values are proposed for protecting digital images in an efficient and safe manner will be offered. In the proposed algorithm, the stochastic properties of chaotic Logistic system is used. To evaluate the performance of the proposed algorithm, we have implemented it in MATLAB using parameters such as visual analysis, key space analysis, histogram analysis. Implementation results show that the proposed algorithm, the algorithm is efficient and safe. 1. INTRODUCTION Cryptography is the science of code and secrets. It is an ancient art and it has been used for several centuries amang commeders, informers and others to protect the message amang them and to keep the messages privately. When we are dealing with the data safety, we need the identity sender and receiver of the message and also we should make sure about the content of message has not been manipulated. These three subjects, in other words, confidentiality, confirming the identity and generality are at the center of safety of modern data communication and can make use of cryptography. As a whole, this issue should be guaranteed that a message can only be decoded(read) by means of the people to whom the message has been sent and others are not allowed to read them. The method wich provides this issue is called cryptography[1,2,3]. 2.CHAOS Chaos is a phenomenon wich takes place in the definable nonlinear systems that have a lot of sensitivity against the primary conditions and their uasi randomized behavior suchlike systems satisfy the liapanof appearance they will be in a stable condition in the peak of chaos. The out put of this system is always under the effect of primary amounts of input. On the other hand prediction of this kind of signal is almost impossible with having the primary amounts and the physical appearance(shape) of this signal is similar to noise. The chaos environs have the following specifications:high sensitivity in relation to the primary conditions, exactness and lack of statistical prediction[4,5,6]. Formula1 Xn+1=r.xn(1-xn) xn is the state variable being in the interval [0, 1] and r is system parameter which might have any value between 1 and 4. In this paper we have used the logistic function to generate the secret key. 3. THE PROPOSED METHOD In this study an algoritm is presented which changes the order of pixels in the input image in a way that there will be very difference between the input and output image. At first we divide the input image into three sub-bands, namely red, green, blue to satisfy our expectation, and the current place of pixels is randomly changed into a place which is determined by means of fourmalu2,3. In order to change the mounts of the pixels which are fixed in new places with ane of the lines of table1 which is randomly assigned by fourmala4. table 1 includes 16 lines that each line with 4 valuable bits is xor with the pixels amounts. Fourmalu2 Xn+1=(r.xn(1-xn))*a 1<a<number of rows Fourmalu3 Xn+1=(r.xn(1-xn))*b 1<b<number of columns fourmalu14 Xn+1=(r.xn(1-xn))*c 1<c<16 a, b are selected so that the Chaos integer between 1 to Number of rows and 1 columns are generated, and c are
  • 2. International Journal of Computer Applications Technology and Research Volume 4– Issue 2, 165 - 169, 2015, ISSN:- 2319–8656 www.ijcat.com 166 determined by a number between one and sixteen production so that each execution of the scalar random selection row of table 1 is selected. For example, if the pixel value 150 is a binary value of 10010110 is then based on the value of the Formula 4 comes a row of Table 1 is selected and a four digit value of number(10010110), XOR, and the new value replaces the pixel values of previous that is, if the number 14 is derived from the logistic map, 4MSB(most sign bit of number) with the number 150 (1001) with row 1 of table (1110), XOR is and result is 118(Figure1,2). Table1 Figure1-change MSb of pixel with the selected rows Figure 2-Flowchart of the data encryption process The image is composed of pixels, the pixel values are in hiding and encryption technique for digital images. Change in the least significant bit[7,8,9] of a pixel, which is technically referred to as steganogeraphy[10,11,12]( Figure 3). As shown in Figure 4, we change a bit in the pixel values of images will not cause a visual change .in this paper we have used the change in the msb. As we see in Figure 5, this change is very real. We also intend to change the values of the pixels in such a way that the basic shape vary. Figure 3 P7 P6 P5 P4 P3 P2 P1 P0 Msb MSB Msb LSB CRYPTOGRAPHY STEGANOGERAPHY ROWES XOR 0 0000 1 0001 2 0010 3 0011 4 0100 5 0101 6 0110 7 0111 8 1000 9 1001 10 1010 11 1011 12 1100 13 1101 14 1110 15 1111
  • 3. International Journal of Computer Applications Technology and Research Volume 4– Issue 2, 165 - 169, 2015, ISSN:- 2319–8656 www.ijcat.com 167 Figure4.change of LSB bits of pixel Figure5.change of MSB bits of pixel A. Encryption algorithm 1) The original image into three sub-bands of red, green and blue break 2) change position of pixel(row and column) based on the logistic map. 3) Changing the pixel values given in Table 1. 4. IMPLEMENTATION A method of good cryptography must be resistant against difference kinds of code-detection and statistical attacks. In the continuation the suggested algoritm will be analysis, the analysis of sensitivity of this method in relation to key changing, the analysis of The key space and histogram. A. THE HISTOGRAM CHART it is a kind of method of examining the encoded image of observation, a good cryptography algoritm should arrange the image in such a way that its specifications not to be specifiable. Also, no kind of information in the encoded image by comparing the encoded image with the main image should be observed. The main image and the encoded image should be seprate visually. The analysis of histogram expresses that pixels are distributed. In the images by means of drawing the observations numbers of the light severity. However we con not find the major image by prossessing the chart. In cryptography the greater difference between the main image histogram and encoded image will cause the safer algoritm. As it come be clearly seen in Figure6, Figure7, Figure8 and Figure 9 , that the histogram of cryptography image is totally different from the main image histogram. This problem increases th risk of possibility of statistical attacks. The analysis of random of randomization:an algoritm should have certain suitable probable features such as good distribution, high complexity and efficiency in order to have more security. Figure 6-original image
  • 4. International Journal of Computer Applications Technology and Research Volume 4– Issue 2, 165 - 169, 2015, ISSN:- 2319–8656 www.ijcat.com 168 Figure7-encrypted image Figure8- histogram of original image Figure9- histogram of encrypted image B. THERE ARE VARIOUS WAYS IN ORDER TO CREATE RANDOM NUMBERS Today, researchers have paied special attention to chaos systems. We applied logestic chaos system to make random number in this paper. Fourm1 shows one of most famous signals which has chaos behavior and it is called logestic map. While r[3.57 4] the behavior of system is generally like a chaos. As a whole one ideal feature for an encrypted image is its sensitivity in relation with the partial changes in the main image, in other words changing one pixel. The invader tries to create some partial changes in the input images to observe the result changes in the secret image. By usig this method the meaningful relation between the main image and the encrypted image will be obvious. This activity itself made the key to be diagnosed and to be known in more simple way. one of the feauures of evaluating the cryptography algoritms is the analysis of sensitivity to the key[9]. Namely, making changes in the key should create a totally different encrypted image.to do this, it is enough to change the amounts of x,y,r in the suggested algoritm, as a result, regarding the feature of chaos environs which are related to the primary elements, the produced amounts change and the result of it is creating different encrypted images(Figure10,11).
  • 5. International Journal of Computer Applications Technology and Research Volume 4– Issue 2, 165 - 169, 2015, ISSN:- 2319–8656 www.ijcat.com 169 Figure10.image encrypted based on initial x1,y1,r1 Figure11.image encrypted based on initial x2,y2,r2 5. CONCLUSION An algoritm for cryptography of image was introduced in this article. The suggested algoritm was evaluated by means of some exams to assess the efficacy of the algoritm. The result of visual tests and the analysis of histogram showed that there is not any obvious fiber in the encrypted images by suggested algoritm and there is no similarity between the main image and the encrypted image from the viewpoint of statistics. The result of the analysis of sensitivity to the key showed that the suggested algoritm is very sensitive regarding switching the key. 6. REFERENCES [1] Shiguo Lian_, JinshengSun, Zhiquan Wang, “Security analysis ofa chaos-based image encryption algorithm”, Elsevier, Physica A, Vol. 351, pp. 645–661,2005. [2] B. Schneier, “Applied Cryptography Second Edition : protocols, algorithms, and source code in C”, ISBN 9971-51-348-X, John Wiley & Sons,1996. [3] Fethi Belkhouche, Uvais Qidwai, Ibrahim Gokcen, Dale Joachim, “Binary Image Transformation Using Two- Dimensional Chaotic Maps”, IEEE, Proceedings of the 17th International Conference on Pattern Recognition (ICPR), 2004. [4] Grummt, E., Ackermann, R.: Proof of Possession: Using RFID for large-scale Authorization Management. In: Mhlhuser, M., Ferscha, A., Aitenbichler, E. (eds.) Constructing Ambient Intelligence, AmI-07 Workshops Proceedings. Communications in Computer and Information Science, pp. 174, 182 (2008) [5] Pecorra, L.M., Carroll, T. L.,“Synchronization in chaotic systems”, Phys. Rev. Lett., Vol. 64, No. 8, pp. 821–824, 1990. [6] Pareek, N.K., Patidar, V., Sud, K.K., “A Random Bit Generator Using Chaotic Maps”, International Journal of Network Security, Vol. 10, No. 1, pp. 32-38, 2010. [7] Mohammad Ahmad Alia, A.A.Y., Public–Key Steganography Based on Matching Method, in European Journal of Scientific Research.2010.p.209 [8] D. Bret, A detailed look at Steganographic Techniques,US:SANS institute, 2002. [9] Belkacem, S. Dibi, Z. Bouridane, “Color Image Watermarking based on Chaotic Map”, 14th IEEE International Conference of Electronics, Circuits and Systems, 2007. [10] Masoud Nosrati , Ronak Karimi,” A Survey on Usage of Genetic Algorithmsin Recent Steganography Researches”, World Applied Programming, Vol (2), No (3), March 2012. 206-210,ISSN: 2222-2510,©2011 WAP journal. www.waprogramming.com [11] Indradip Banerjee, Souvik Bhattacharyya, Gautam Sanyal,” A Procedure of Text Steganography Using Indian Regional Language”, J. Computer Network and Information Security, 2012, 8, 65-73 Published Online August 2012 in MECS (http://www.mecs-press.org/) [12] Seyyed Amin Seyyedi, Rauf.Kh Sadykhov,” Digital Image Steganography Concept and Evaluation”, International Journal of Computer Applications (0975 – 8887) Volume 66– No.5, March 2013