SlideShare a Scribd company logo
Secure Image Encryption using Two Dimensional
Logistic Map
* Gangadhar Tiwari1, Debashis Nandi2, Abhishek Kumar3, Madhusudhan Mishra4 1,
2Department of Information Technology, NIT Durgapur (W.B.), India 3Department of
Electronics and Electrical Engineering, NITAP, (A.P.), India 4Department of Electronics and
Communication Engineering, NERIST, (A.P.), India
1www.icgst.com
http://www.icgst.com/paper.aspx?pid=P1151351311
Current researches in image encryption techniques suggest using chaotic systems.
But, one-dimensional (1D) chaotic schemes have drawbacks like small key space
and weak security. This paper proposes a novel chaotic image encryption scheme
based on two-dimensional (2D) logistic map. The 2D logistic map has more
complex chaotic behaviors with respect to 1D logistic map like basin structures
and attractors. The proposed scheme is based on permutation-substitution
network and offers good confusion and diffusion properties in stream and block
ciphers both. It encrypts plaintext image into random-like ciphertext image by
generating the pseudorandom sequences from logistic map. The key schedule
algorithm translates a binary encryption key to initial values and system
parameters used in the 2D logistic map. This scheme uses 256 bit long cipher key
for encryption/decryption. Experimental result indicates that the proposed
scheme is secure against known cryptanalytic attacks and offers superior
performance compared to existing chaotic image encryption schemes.
2www.icgst.com
http://www.icgst.com/paper.aspx?pid=P1151351311
Secure Image Encryption using Two Dimensional Logistic Map
Abstract
3www.icgst.com
Mr. Gangadhar Tiwari completed B.Sc.(Mathematics) from Guwahati University,
Guwahati in 2006 and M.Sc.(Information Technology) from Punjab Technical
University,Jalandhar in 2011. Currently, he is pursuing PhD at NIT Durgapur, India.His
research interests include Information Security and Digital Image Processing.
NIT Durgapur
http://www.nitdgp.ac.in/
4www.icgst.com
Dr. Debashis Nandi received his BE degree in Electronics and Communication
Engineering from RE College, Durgapur (University of Burdwan), India, in 1994 and M.
Tech. Degree from Burdwan University on Microwave Engineering in 1997. He
received his PhD degree from IIT, Kharagpur, India on Medical Imaging Technology.
His area of research includes Computer security and cryptography, Secure chaotic
communication, Video coding. He is an Associate Professor in the Department of
Information Technology, NIT, Durgapur, India.
NIT Durgapur
http://www.nitdgp.ac.in/
5www.icgst.com
Mr. Abhishek Kumar received his B.Tech degree in Electrical and Electronics
Engineering from Pondicherry University in 2009 and M.Tech degree in Power System
Engineering from North Eastern Regional Institute of Science and Technology, India in
the 2012.He is currently working as an Assistant Professor with Department of
Electrical & Electronics Engineering, National Institute of Technology, Arunachal
Pradesh, India.
National Institute of Technology, Arunachal
Prades
http://www.nitap.in/
6www.icgst.com
Mr. Madhusudhan Mishra has completed his B.Tech in Electronics and
Communication Engineering from North Eastern Regional Institute of Science and
Technology (NERIST), Nirjuli, Arunachal Pradesh in 2004 and M.Tech in Signal
Processing from IIT Guwahati in 2011. He worked in Sankara Institute of Technology,
Kukas, Jaipur for some years and joined NERIST as Assistant Professor in 2006. His
main interest of research area includes Digital Signal and Image Processing.
National Institute of Technology, Arunachal
Prades
http://www.nitap.in/
7

More Related Content

What's hot

Resume
ResumeResume
Resume
Zaheer Babar
 
Thirunavukkarasu (2)
Thirunavukkarasu (2)Thirunavukkarasu (2)
Thirunavukkarasu (2)
thirunavukkarasu jagadeesan
 
Resume
ResumeResume
Dynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationDynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentation
eSAT Publishing House
 
Dynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationDynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentation
eSAT Journals
 
Invisible water marking within media files using state of-the-art technology
Invisible water marking within media files using state of-the-art technologyInvisible water marking within media files using state of-the-art technology
Invisible water marking within media files using state of-the-art technology
IAEME Publication
 
IRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten CharactersIRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten Characters
IRJET Journal
 
A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ...
A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ...A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ...
A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ...
Hadi Santoso
 
CV
CVCV
Cc4301455457
Cc4301455457Cc4301455457
Cc4301455457
IJERA Editor
 
CV
CVCV
Cv
CvCv
GUI based handwritten digit recognition using CNN
GUI based handwritten digit recognition using CNNGUI based handwritten digit recognition using CNN
GUI based handwritten digit recognition using CNN
Abhishek Tiwari
 
IRJET-MText Extraction from Images using Convolutional Neural Network
IRJET-MText Extraction from Images using Convolutional Neural NetworkIRJET-MText Extraction from Images using Convolutional Neural Network
IRJET-MText Extraction from Images using Convolutional Neural Network
IRJET Journal
 
Retrieval of textual and non textual information in
Retrieval of textual and non textual information inRetrieval of textual and non textual information in
Retrieval of textual and non textual information in
eSAT Publishing House
 
Mining knowledge graphs to map heterogeneous relations between the internet o...
Mining knowledge graphs to map heterogeneous relations between the internet o...Mining knowledge graphs to map heterogeneous relations between the internet o...
Mining knowledge graphs to map heterogeneous relations between the internet o...
IJECEIAES
 
G0333946
G0333946G0333946
G0333946
iosrjournals
 
Resume generator2
Resume generator2Resume generator2
Resume generator2
Rishabh Dubey
 
dheeraj_resume_naukri
dheeraj_resume_naukridheeraj_resume_naukri
dheeraj_resume_naukri
Dheeraj Mohanta
 

What's hot (19)

Resume
ResumeResume
Resume
 
Thirunavukkarasu (2)
Thirunavukkarasu (2)Thirunavukkarasu (2)
Thirunavukkarasu (2)
 
Resume
ResumeResume
Resume
 
Dynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationDynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentation
 
Dynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationDynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentation
 
Invisible water marking within media files using state of-the-art technology
Invisible water marking within media files using state of-the-art technologyInvisible water marking within media files using state of-the-art technology
Invisible water marking within media files using state of-the-art technology
 
IRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten CharactersIRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten Characters
 
A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ...
A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ...A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ...
A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ...
 
CV
CVCV
CV
 
Cc4301455457
Cc4301455457Cc4301455457
Cc4301455457
 
CV
CVCV
CV
 
Cv
CvCv
Cv
 
GUI based handwritten digit recognition using CNN
GUI based handwritten digit recognition using CNNGUI based handwritten digit recognition using CNN
GUI based handwritten digit recognition using CNN
 
IRJET-MText Extraction from Images using Convolutional Neural Network
IRJET-MText Extraction from Images using Convolutional Neural NetworkIRJET-MText Extraction from Images using Convolutional Neural Network
IRJET-MText Extraction from Images using Convolutional Neural Network
 
Retrieval of textual and non textual information in
Retrieval of textual and non textual information inRetrieval of textual and non textual information in
Retrieval of textual and non textual information in
 
Mining knowledge graphs to map heterogeneous relations between the internet o...
Mining knowledge graphs to map heterogeneous relations between the internet o...Mining knowledge graphs to map heterogeneous relations between the internet o...
Mining knowledge graphs to map heterogeneous relations between the internet o...
 
G0333946
G0333946G0333946
G0333946
 
Resume generator2
Resume generator2Resume generator2
Resume generator2
 
dheeraj_resume_naukri
dheeraj_resume_naukridheeraj_resume_naukri
dheeraj_resume_naukri
 

Viewers also liked

P1111143901
P1111143901P1111143901
P1111143901
Ashraf Aboshosha
 
Jammer
JammerJammer
Run time dynamic partial reconfiguration using microblaze soft core processor...
Run time dynamic partial reconfiguration using microblaze soft core processor...Run time dynamic partial reconfiguration using microblaze soft core processor...
Run time dynamic partial reconfiguration using microblaze soft core processor...
eSAT Journals
 
Distribution network reconfiguration for loss reduction and voltage
Distribution network reconfiguration for loss reduction and voltageDistribution network reconfiguration for loss reduction and voltage
Distribution network reconfiguration for loss reduction and voltage
Gaddafi Sani
 
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
Sajid Iqbal
 
Sacolloq
SacolloqSacolloq
Sacolloq
gueste71f7b
 
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаосМ.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
Project KRIT
 
Logistic map
Logistic mapLogistic map
Logistic map
Narendra Kumar
 
VOLTAGE SAG AND SWELL ALLEVIATION IN DISTRIBUTION NETWORK USING CUSTOM POWER...
 VOLTAGE SAG AND SWELL ALLEVIATION IN DISTRIBUTION NETWORK USING CUSTOM POWER... VOLTAGE SAG AND SWELL ALLEVIATION IN DISTRIBUTION NETWORK USING CUSTOM POWER...
VOLTAGE SAG AND SWELL ALLEVIATION IN DISTRIBUTION NETWORK USING CUSTOM POWER...
Gaddafi Sani
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
Ancy Mariam Babu
 
OPTIMAL PLACEMENT OF DISTRIBUTED GENERATION
OPTIMAL PLACEMENT OF DISTRIBUTED GENERATION OPTIMAL PLACEMENT OF DISTRIBUTED GENERATION
OPTIMAL PLACEMENT OF DISTRIBUTED GENERATION
Jitendra Bhadoriya
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on Matlab
Muhammad Saif Ul Islam
 
Chaos Theory
Chaos TheoryChaos Theory
Chaos Theory
Camila Valbuena
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
Pradeep Vishwakarma
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
Aashish R
 
Chaos Theory: An Introduction
Chaos Theory: An IntroductionChaos Theory: An Introduction
Chaos Theory: An Introduction
Antha Ceorote
 
SOS
SOS SOS
Διερεύνηση της Γεωμετρικής Σκέψης των Αποφοίτων του Δημοτικού
Διερεύνηση της Γεωμετρικής Σκέψης των Αποφοίτων του ΔημοτικούΔιερεύνηση της Γεωμετρικής Σκέψης των Αποφοίτων του Δημοτικού
Διερεύνηση της Γεωμετρικής Σκέψης των Αποφοίτων του Δημοτικού
Christos Skarkos
 

Viewers also liked (20)

P1111143901
P1111143901P1111143901
P1111143901
 
Jammer
JammerJammer
Jammer
 
Run time dynamic partial reconfiguration using microblaze soft core processor...
Run time dynamic partial reconfiguration using microblaze soft core processor...Run time dynamic partial reconfiguration using microblaze soft core processor...
Run time dynamic partial reconfiguration using microblaze soft core processor...
 
Distribution network reconfiguration for loss reduction and voltage
Distribution network reconfiguration for loss reduction and voltageDistribution network reconfiguration for loss reduction and voltage
Distribution network reconfiguration for loss reduction and voltage
 
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
 
Sacolloq
SacolloqSacolloq
Sacolloq
 
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаосМ.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
 
Logistic map
Logistic mapLogistic map
Logistic map
 
VOLTAGE SAG AND SWELL ALLEVIATION IN DISTRIBUTION NETWORK USING CUSTOM POWER...
 VOLTAGE SAG AND SWELL ALLEVIATION IN DISTRIBUTION NETWORK USING CUSTOM POWER... VOLTAGE SAG AND SWELL ALLEVIATION IN DISTRIBUTION NETWORK USING CUSTOM POWER...
VOLTAGE SAG AND SWELL ALLEVIATION IN DISTRIBUTION NETWORK USING CUSTOM POWER...
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
 
OPTIMAL PLACEMENT OF DISTRIBUTED GENERATION
OPTIMAL PLACEMENT OF DISTRIBUTED GENERATION OPTIMAL PLACEMENT OF DISTRIBUTED GENERATION
OPTIMAL PLACEMENT OF DISTRIBUTED GENERATION
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on Matlab
 
Chaos Theory
Chaos TheoryChaos Theory
Chaos Theory
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Chaos Theory: An Introduction
Chaos Theory: An IntroductionChaos Theory: An Introduction
Chaos Theory: An Introduction
 
SOS
SOS SOS
SOS
 
Διερεύνηση της Γεωμετρικής Σκέψης των Αποφοίτων του Δημοτικού
Διερεύνηση της Γεωμετρικής Σκέψης των Αποφοίτων του ΔημοτικούΔιερεύνηση της Γεωμετρικής Σκέψης των Αποφοίτων του Δημοτικού
Διερεύνηση της Γεωμετρικής Σκέψης των Αποφοίτων του Δημοτικού
 
presentatie Bremmer OG
presentatie Bremmer OGpresentatie Bremmer OG
presentatie Bremmer OG
 
Parkour
ParkourParkour
Parkour
 

Similar to P1151351311

P1151345302
P1151345302P1151345302
P1151345302
Ashraf Aboshosha
 
June 2022: Top 10 Read Articles in Signal & Image Processing
June 2022: Top 10 Read Articles in Signal & Image   ProcessingJune 2022: Top 10 Read Articles in Signal & Image   Processing
June 2022: Top 10 Read Articles in Signal & Image Processing
sipij
 
April 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image ProcessingApril 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image Processing
sipij
 
May 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image ProcessingMay 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image Processing
sipij
 
July 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image ProcessingJuly 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image Processing
sipij
 
January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing	January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing
sipij
 
August 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image ProcessingAugust 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image Processing
sipij
 
April 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image ProcessingApril 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image Processing
sipij
 
September 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image ProcessingSeptember 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image Processing
sipij
 
October 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image ProcessingOctober 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image Processing
sipij
 
Pratibha
PratibhaPratibha
Pratibha
Pratibha Arun
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automata
eSAT Publishing House
 
A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...
IAEME Publication
 
A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...
IAEME Publication
 
Optimized image processing and clustering to mitigate security threats in mob...
Optimized image processing and clustering to mitigate security threats in mob...Optimized image processing and clustering to mitigate security threats in mob...
Optimized image processing and clustering to mitigate security threats in mob...
TELKOMNIKA JOURNAL
 
Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...
TELKOMNIKA JOURNAL
 
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
IJECEIAES
 
An ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingAn ideal steganographic scheme in networks using
An ideal steganographic scheme in networks using
eSAT Publishing House
 
An ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadAn ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payload
eSAT Journals
 
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
Editor IJMTER
 

Similar to P1151351311 (20)

P1151345302
P1151345302P1151345302
P1151345302
 
June 2022: Top 10 Read Articles in Signal & Image Processing
June 2022: Top 10 Read Articles in Signal & Image   ProcessingJune 2022: Top 10 Read Articles in Signal & Image   Processing
June 2022: Top 10 Read Articles in Signal & Image Processing
 
April 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image ProcessingApril 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image Processing
 
May 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image ProcessingMay 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image Processing
 
July 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image ProcessingJuly 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image Processing
 
January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing	January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing
 
August 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image ProcessingAugust 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image Processing
 
April 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image ProcessingApril 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image Processing
 
September 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image ProcessingSeptember 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image Processing
 
October 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image ProcessingOctober 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image Processing
 
Pratibha
PratibhaPratibha
Pratibha
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automata
 
A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...
 
A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...
 
Optimized image processing and clustering to mitigate security threats in mob...
Optimized image processing and clustering to mitigate security threats in mob...Optimized image processing and clustering to mitigate security threats in mob...
Optimized image processing and clustering to mitigate security threats in mob...
 
Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...
 
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
 
An ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingAn ideal steganographic scheme in networks using
An ideal steganographic scheme in networks using
 
An ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadAn ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payload
 
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
 

More from Ashraf Aboshosha

P1121352313
P1121352313P1121352313
P1121352313
Ashraf Aboshosha
 
P1121340296
P1121340296P1121340296
P1121340296
Ashraf Aboshosha
 
P1121340294
P1121340294P1121340294
P1121340294
Ashraf Aboshosha
 
P1121327289
P1121327289P1121327289
P1121327289
Ashraf Aboshosha
 
P1151442347
P1151442347P1151442347
P1151442347
Ashraf Aboshosha
 
P1151439345
P1151439345P1151439345
P1151439345
Ashraf Aboshosha
 
P1151424332
P1151424332P1151424332
P1151424332
Ashraf Aboshosha
 
P1151423331
P1151423331P1151423331
P1151423331
Ashraf Aboshosha
 
P1151420328
P1151420328P1151420328
P1151420328
Ashraf Aboshosha
 
P1151418327
P1151418327P1151418327
P1151418327
Ashraf Aboshosha
 
P1151404314
P1151404314P1151404314
P1151404314
Ashraf Aboshosha
 
P1111351312
P1111351312P1111351312
P1111351312
Ashraf Aboshosha
 
P1111444352
P1111444352P1111444352
P1111444352
Ashraf Aboshosha
 
P1111440346
P1111440346P1111440346
P1111440346
Ashraf Aboshosha
 
P1111431335
P1111431335P1111431335
P1111431335
Ashraf Aboshosha
 
P1111410320
P1111410320P1111410320
P1111410320
Ashraf Aboshosha
 
P1111410321
P1111410321P1111410321
P1111410321
Ashraf Aboshosha
 
P1111350310
P1111350310P1111350310
P1111350310
Ashraf Aboshosha
 
P1111348307
P1111348307P1111348307
P1111348307
Ashraf Aboshosha
 
P1111343299
P1111343299P1111343299
P1111343299
Ashraf Aboshosha
 

More from Ashraf Aboshosha (20)

P1121352313
P1121352313P1121352313
P1121352313
 
P1121340296
P1121340296P1121340296
P1121340296
 
P1121340294
P1121340294P1121340294
P1121340294
 
P1121327289
P1121327289P1121327289
P1121327289
 
P1151442347
P1151442347P1151442347
P1151442347
 
P1151439345
P1151439345P1151439345
P1151439345
 
P1151424332
P1151424332P1151424332
P1151424332
 
P1151423331
P1151423331P1151423331
P1151423331
 
P1151420328
P1151420328P1151420328
P1151420328
 
P1151418327
P1151418327P1151418327
P1151418327
 
P1151404314
P1151404314P1151404314
P1151404314
 
P1111351312
P1111351312P1111351312
P1111351312
 
P1111444352
P1111444352P1111444352
P1111444352
 
P1111440346
P1111440346P1111440346
P1111440346
 
P1111431335
P1111431335P1111431335
P1111431335
 
P1111410320
P1111410320P1111410320
P1111410320
 
P1111410321
P1111410321P1111410321
P1111410321
 
P1111350310
P1111350310P1111350310
P1111350310
 
P1111348307
P1111348307P1111348307
P1111348307
 
P1111343299
P1111343299P1111343299
P1111343299
 

Recently uploaded

Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
Prakhyath Rai
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
mahaffeycheryld
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
Addu25809
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
sydezfe
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
Kamal Acharya
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
b0754201
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
CVCSOfficial
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Height and depth gauge linear metrology.pdf
Height and depth gauge linear metrology.pdfHeight and depth gauge linear metrology.pdf
Height and depth gauge linear metrology.pdf
q30122000
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 

Recently uploaded (20)

Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
 
TIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptxTIME TABLE MANAGEMENT SYSTEM testing.pptx
TIME TABLE MANAGEMENT SYSTEM testing.pptx
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Height and depth gauge linear metrology.pdf
Height and depth gauge linear metrology.pdfHeight and depth gauge linear metrology.pdf
Height and depth gauge linear metrology.pdf
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 

P1151351311

  • 1. Secure Image Encryption using Two Dimensional Logistic Map * Gangadhar Tiwari1, Debashis Nandi2, Abhishek Kumar3, Madhusudhan Mishra4 1, 2Department of Information Technology, NIT Durgapur (W.B.), India 3Department of Electronics and Electrical Engineering, NITAP, (A.P.), India 4Department of Electronics and Communication Engineering, NERIST, (A.P.), India 1www.icgst.com http://www.icgst.com/paper.aspx?pid=P1151351311
  • 2. Current researches in image encryption techniques suggest using chaotic systems. But, one-dimensional (1D) chaotic schemes have drawbacks like small key space and weak security. This paper proposes a novel chaotic image encryption scheme based on two-dimensional (2D) logistic map. The 2D logistic map has more complex chaotic behaviors with respect to 1D logistic map like basin structures and attractors. The proposed scheme is based on permutation-substitution network and offers good confusion and diffusion properties in stream and block ciphers both. It encrypts plaintext image into random-like ciphertext image by generating the pseudorandom sequences from logistic map. The key schedule algorithm translates a binary encryption key to initial values and system parameters used in the 2D logistic map. This scheme uses 256 bit long cipher key for encryption/decryption. Experimental result indicates that the proposed scheme is secure against known cryptanalytic attacks and offers superior performance compared to existing chaotic image encryption schemes. 2www.icgst.com http://www.icgst.com/paper.aspx?pid=P1151351311 Secure Image Encryption using Two Dimensional Logistic Map Abstract
  • 3. 3www.icgst.com Mr. Gangadhar Tiwari completed B.Sc.(Mathematics) from Guwahati University, Guwahati in 2006 and M.Sc.(Information Technology) from Punjab Technical University,Jalandhar in 2011. Currently, he is pursuing PhD at NIT Durgapur, India.His research interests include Information Security and Digital Image Processing. NIT Durgapur http://www.nitdgp.ac.in/
  • 4. 4www.icgst.com Dr. Debashis Nandi received his BE degree in Electronics and Communication Engineering from RE College, Durgapur (University of Burdwan), India, in 1994 and M. Tech. Degree from Burdwan University on Microwave Engineering in 1997. He received his PhD degree from IIT, Kharagpur, India on Medical Imaging Technology. His area of research includes Computer security and cryptography, Secure chaotic communication, Video coding. He is an Associate Professor in the Department of Information Technology, NIT, Durgapur, India. NIT Durgapur http://www.nitdgp.ac.in/
  • 5. 5www.icgst.com Mr. Abhishek Kumar received his B.Tech degree in Electrical and Electronics Engineering from Pondicherry University in 2009 and M.Tech degree in Power System Engineering from North Eastern Regional Institute of Science and Technology, India in the 2012.He is currently working as an Assistant Professor with Department of Electrical & Electronics Engineering, National Institute of Technology, Arunachal Pradesh, India. National Institute of Technology, Arunachal Prades http://www.nitap.in/
  • 6. 6www.icgst.com Mr. Madhusudhan Mishra has completed his B.Tech in Electronics and Communication Engineering from North Eastern Regional Institute of Science and Technology (NERIST), Nirjuli, Arunachal Pradesh in 2004 and M.Tech in Signal Processing from IIT Guwahati in 2011. He worked in Sankara Institute of Technology, Kukas, Jaipur for some years and joined NERIST as Assistant Professor in 2006. His main interest of research area includes Digital Signal and Image Processing. National Institute of Technology, Arunachal Prades http://www.nitap.in/
  • 7. 7