SlideShare a Scribd company logo
1 of 13
Download to read offline
Three Dimensional Chaotic System for Color
Image Scrambling Algorithm
S. N. Lagmiri1
, N. Elalami2
, J. Elalami3
1
Information and Production System, Mohammadia School Engineering, Mohamed V University in
Rabat, Morocco
2
LAII, Mohammadia School Engineering, Mohamed V University in Rabat, Morocco
3
LASTIMI, Higher School of Technology of Sale, Mohamed V University in Rabat, Morocco
Abstract ̶ With the development of information security, the traditional image encryption methods have become
outdated. Because of amply using images in the transmission process, it is important to protect the confidential image
data from unauthorized access. This paper presents a new chaos based image encryption algorithm, which can improve
the security during transmission more effectively utilizes the chaotic systems properties, such as pseudo-random
appearance and sensitivity to initial conditions. Based on chaotic theory and decomposition and recombination of pixel
values, this new image scrambling algorithm is able to change the position of pixel, simultaneously scrambling both
position and pixel values. Experimental results show that the new algorithm improves the image security effectively to
avoid unscramble, and it also can restore the image as same as the original one, which reaches to the purposes of image
safe and reliable transmission.
Keywords: Color image, chaotic system, decomposition, image scrambling, recombination
I. INTRODUCTION
Recently, security of multimedia data is receiving more and more attention due to the transmission over
various communication networks. In order to protect personal information, many image encryption algorithms
are designed and proposed such as two-dimensional cellular automata based method [2], Henon chaotic map
[10, 13], Chen's hyperchaotic system [12], Arnold transform [3, 4]. Chaotic functions are blessed with properties
like sensitivity to the initial conditions, and ergodicity which make them very desirable for encryption [1].
Image scrambling is one of the methods for securing the image by scrambling it into a disordered one beyond
recognition, making it hard for those who get the image in unauthorized manner to extract information of the
original image from the scrambled images. Further, image scrambling technology depends on data hiding
technology which provides non-password security algorithm for information hiding. Now, the mainly used three
kind of image scrambling types are scrambling in the space domain, scrambling in the frequency domain, and
scrambling in the color or grey domain. In a great quantity of all kind of image scrambling algorithms, the
image scrambling algorithms based on chaos have attracted more and more attention since they can provide a
high level of security [5, 6, 7, 8].
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 1, January 2018
8 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
This paper focuses on a new image scrambling algorithm which introduces a new chaotic system. Image
scrambling using chaotic properties is an application for providing security to the images from getting into the
hands of unauthorized user. The proposed image scrambling scheme generates the permuting address codes by
sorting the chaotic sequence directly. This paper analyzed that the scrambling performance of the new algorithm
is statistic. The conclusion of this paper indicates that the new algorithm can provide a high level security. The
paper results in good performance of the proposed algorithm that can also be applied in the real-time
applications and digital communications as it is a straightforward mechanism and easy to implement.
The rest of the paper is organized as follows: proposed chaotic system in section 2, image scrambling
algorithm based on chaos theory in section 3, experimental details and results are analyzed in section 4. The
paper is observed by a conclusion in section 5.
II. PROPOSED CHAOTIC SYSTEM
In this section, we describe the new chaotic system used in this work.
2.1. New Chaotic System
Recently, Chen and Lee [9] introduced a new chaotic system, which is described by the following nonlinear
differential equation:
{
̇ = −
̇ = − +
̇ = − +
(1)
� =
Where:
- , and are the state variables and , and are positive constants.
- = .
- � is the system measured output.
When = . , = = , the system (1) is chaotic.
2.2. Lyapunov exponent
By linearizing the Jacobian matrix � round the equilibrium point � and solving the following equation:
|λ� − �| = (2)
Therefore, the new chaotic system (1) has three eigenvalues shown in figure 1.
� = . � = − .99 � = − .999
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 1, January 2018
9 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
Figure 1: Lyapunov exponent of new chaotic system
2.3. Sensitivity to initial conditions
Sensitivity to initial conditions means that each point in a chaotic system is arbitrarily closely approximated
by other points with significantly different future paths, or trajectories. Thus, an arbitrarily small change, or
perturbation, of the current trajectory may lead to significantly different future behavior. The next figure
compares the time series for two litely different initial conditions. The two time series stay close together for
about 2 iterations. But after that, they are pretty much on their own.
(a)
(b)
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 1, January 2018
10 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
(c)
Figure 2: Sensitivity to two initial conditions [-2, 2, 1] and [-1.9, 1.9, 0.9]
(a): (b): (c):
III. IMAGE SCRAMBLING ALGORITHM BASED ON CHAOS THEORY
3.1. Proposed algorithm
The proposed chaotic system is now used in the design of color image encryption algorithm. The proposed
images encryption algorithm input is an original image whilst the output is a scrambled one. Figure 3 illustrate
the proposed algorithm scheme.
Figure 3: Principle of chaotic scrambling algorithm for color image
Original
Image
Scrambled color
Image
Red
Component
Green
Component
Blue
Component
R- Key
G- Key
B-Key
lx
ly
lz
Scrambled Red
component
Scrambled Green
component
Scrambled Blue
component
RGB three-color
separation block
RGB three-color
combination block
Chaotic
Generator Key
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 1, January 2018
11 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
IV. EXPERIMENTAL DETAILS AND RESULTS
A good quality scrambled algorithm should be strong against all types of attack. Some experiments are given
in this section to demonstrate the efficiency of the proposed technique. In this section, the proposed technique is
applied on two color images "Gallery" and "Alice", of resolution of " 256*256". We analyze the results by
calculating histogram and correlation coefficient, to test the performance of the proposed technique. The next
figures show the results of scrambled algorithm.
Figure 4: "Alice" image corresponding for different step of the scrambling process
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 1, January 2018
12 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
Figure 5: "Gallery" image corresponding for different step of the scrambling process
4.1. Statistical analysis
In order to resist attacks, the scrambled images should possess certain random properties. To prove the
robustness of the proposed algorithm, a statistical analysis has been performed by calculating the histograms and
the correlation coefficients for the original image and the scrambled image. For the two images that have been
tested, it has been determined that their quality is good.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 1, January 2018
13 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
4.1.1. Histogram Analysis
An image histogram is a commonly used method of analysis in image processing. The advantage of a
histogram is that it shows the shape of the distribution for a large set of data. Thus, an image histogram
illustrates how pixels in an image are distributed by plotting the number of pixels at each color intensity level. It
is important to ensure that the encrypted and original images do not have any statistical similarities.
The experimental results of the original image and its corresponding scrambled image and their histograms
are shown in Fig. 6. The histogram of each original image illustrates how the pixels are distributed by graphing
the number of pixels at every color of RGB [14]. It is clear that the histogram of the scrambled image is
different from the respective histograms of the original image.
(a) (b)
Figure 6: "Alice" image histogram in three channels RGB
(a): Original (b): Scrambled
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 1, January 2018
14 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
(a) (b)
Figure 7: "Gallery" image histogram in three channels RGB
(a): Original (b): Scrambled
4.2. Correlation of two adjacent pixels
In addition to the histogram analysis, we have also analyzed the correlation between two vertically adjacent
pixels, two horizontally adjacent pixels and two diagonally adjacent pixels in plain image and cipher image
respectively.
A correlation is a statistical measure of security that expresses a degree of relationship between two adjacent
pixels in an image or a degree of association between two adjacent pixels in an image. The aim of correlation
measures is to keep the amount of redundant information available in the scrambled image as low as possible
[11, 15].
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 1, January 2018
15 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
Equation (3) is used to study the correlation between two adjacent pixels in the horizontal, vertical, diagonal
and anti-diagonal orientations:
� =
∑ ( �× �)−∑ �×∑ �
�
�=
�
�=
�
�=
√ ∑ �
�
�= − ∑ �
�
�= × ∑ �
�
�= − ∑ �
�
�=
(3)
where and are the intensity values of two adjacent pixels in the image and is the number of adjacent
pixels selected from the image to calculate the correlation. Results for the correlation coefficients of two
adjacent pixels are shown in tables 1and 2.
In the experiments results, 3000 pairs of two adjacent pixels are randomly selected. Fig. 8 shows the
distribution of two adjacent pixels in the original image and the encrypted-image. There is very good correlation
between adjacent pixels in the image data [16, 17], while there is only a small correlation between adjacent
pixels in the scrambled image.
(a) (b)
Figure 8: Horizontal, vertical and diagonal correlation of original and scrambled "Alice" image
(a): Original image (b): Scrambled image
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 1, January 2018
16 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
(b) (b)
Figure 9: Horizontal, vertical and diagonal correlation of original and scrambled "Gallery" image
(a): Original image (b): Scrambled image
Table I
Correlation coefficient corresponding to original and scrambled images
Direction Horizontal Vertical Diagonal
Alice image
Original 0.9759 0.9855 0.9677
Scrambled 0.5632 0.5656 0.5612
Gallery image
Original 0.9878 0.9777 0.9679
Scrambled 0.3977 0.3921 0.3832
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 1, January 2018
17 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
Table II
Correlation coefficient corresponding to original and recovered images
Direction Horizontal Vertical Diagonal
Alice image
Original 0.9759 0.9855 0.9677
Renew 0.9759 0.9855 0.9677
Gallery image
Original 0.9878 0.9777 0.9679
Renew 0.9674 0.9665 0.9290
4.3. PSNR
Peak Signal to Noise Ratio (PSNR) criterion is used to test the unobservable factor. This measure indicates
the degree of similarity between the watermark images and a watermark images. PSNR is expressed
mathematically in the following form:
[ ] = log
55
� ��,��
(4)
where EQM is the mean square error between the two images ( original , recovered .
� , = ∑ ∑ , − ,
−
=
−
=
To recover the two images, we apply the inverse of the proposed algorithm in figure 2. The result is shown in
figure 10.
Figure 10: "Alice" and "Gallery" recovered image
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 1, January 2018
18 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
PSNR high means: Mean square error between the original image and reconstructed image is very low. It
implies that the image been properly restored. In the other way, the restored image quality is better; in our case,
the values of PSNR are as follow:
PSNR (Alice) = Inf
PSNR (Gallery) = 51.75
The result is much closed with the correlation coefficient.
- For "Alice", the correlation coefficient for the original and renew image are identical. The PSNR equal to
INF, that means the renew image is identical to original image.
- For "Gallery", the correlation coefficient for the renew image is at 40% of the original image, that justify
the corresponding PSNR value.
V. CONCLUSION
In this paper, a new image scrambling algorithm, by using image scrambling to encrypt the image to improve
the security of image. The new algorithm based on chaotic system and decomposition and recombination of
pixel values is able to scramble pixel positions and pixel values of images. Analysis of the statistical information
of scrambled images in the experimental tests shows that the present algorithm provides reasonable security.
Owing to the strong irregularity of the sorting transformation that improves the effect of the scrambling. The
experimental results show that the algorithm is effective to scramble the image and can provide high security. It
simulates scrambling under Matlab 7 to confirm it.
REFERENCES
[1] Pawan N. Khade and Prof. Manish Narnaware, “3D Chaotic Functions for Image Encryption,” IJCSI International Journal of
Computer Science Issues, Vol. 9, Issue 3, No 1, May 2012, pp: 323- 328.
[2] P. Ping, Z. J. Wang, and F. Xu, “A two-dimensional cellular automata based method for multiple image”, International Conference on
Computer Science & Service System, vol. 112, pp. 101-104, 2014.
[3] F. Chen, K. W. Wong, X. Liao, and T. Xiang, “Period distribution of generalized discrete Arnold cat map”, Theoretical Computer
Science, vol. 552, no. 4, pp. 13-25, 2014.
[4] L. Chen, D. Zhao, and F. Ge, “Mage encryption based on singular value decomposition and Arnold transform in fractional domain”,
Optics Communications, vol. 219, no. 6, pp. 98-103, 2013.
[5] Zhu Liehuang, Li Wenzhuo, Liao Lejian and Li Hong. “A Novel Image Scrambling Algorithm for Digital Watermarking Based on
Chaotic Sequences” [J]. International Journal of Computer Science and Network Security, 6(8B): 125-130, 2006.
[6] Matthews R. “On the derivation of a ‘chaotic’ encryption algorithm [J]”. Cryptogia, 1989, 13:29-42.
[7] Scharinger J. Fast encryption of image data using chaotic Kolmogorov flow [J]. J. Electronic Imaging, 1998, 7(2): 318-325.
[8] Yu X Y, Zhang J, Ren H E, Xu G S and Luo X Y. “Chaotic Image Scrambling Algorithm Based ob S-DES [J]”. Journal of Physics:
Conference Series, 2006, 48: 349-353.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 1, January 2018
19 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
[9] S.N. Lagmiri, M. Amghar and N. Sbiti, “Synchronization between a new chaotic system and Rössler system by a high gain observer”,
IEEEXplore, May ,2015.
[10] J. Khan, J. Ahmad, and S. O. Hwang, “An efficient image encryption scheme based on: Henon map, skew tent map and s-box,”
International Conference on Modeling, Simulation and Applied Optimization, vol. 10, pp. 1- 6, 2015.
[11] Burger, W. and M. Burge, Digital image processing: “an algorithmic introduction using Java”. 2008: Springer-Verlag New York Inc.
[12] D. L, “Color image encryption algorithm based on chua's circuit and chen's hyper-chaotic system,” Journal of Information &
Computational Science, vol. 12, pp. 1021-1028, 2015.
[13] S. Liu, J. Sun, and Z. Xu, “An improved image encryption algorithm based on chaotic system”, Journal of Computers, vol. 4, no. 11,
pp. 1091- 1100, 2009.
[14] Abderrahim, N.W., F.Z. Benmansour, and O. Seddiki, “Integration of chaotic sequences uniformly distributed in a new image
encryption algorithm.” 2012.
[15] Jolfaei, A. and A. Mirghadri, “Survey: image encryption using Salsa20”. International Journal of Computer Science Issues, 2010. 7(5):
pp. 213-220.
[16] 17. H. El-din. H. Ahmed, H.M.K., O. S. Farag Allah, “Encryption quality analysis of the RC5 block cipher algorithm for digital
images”. Optical Engineering, 2006. 45( 10).
[17] 18. Ibrahim S I Abuhaiba and M.A.S. Hassan, Image Encryption Using Differential Evolution Approach in Frequency Domain. Signal
& Image Processing : An International Journal(SIPIJ), 2011. 2, No.1: p. 51-69.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 1, January 2018
20 https://sites.google.com/site/ijcsis/
ISSN 1947-5500

More Related Content

What's hot

IEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsIEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsVijay Karan
 
A Novel GA-SVM Model For Vehicles And Pedestrial Classification In Videos
A Novel GA-SVM Model For Vehicles And Pedestrial Classification In VideosA Novel GA-SVM Model For Vehicles And Pedestrial Classification In Videos
A Novel GA-SVM Model For Vehicles And Pedestrial Classification In Videosijtsrd
 
Balancing Compression and Encryption of Satellite Imagery
Balancing Compression and Encryption of Satellite Imagery Balancing Compression and Encryption of Satellite Imagery
Balancing Compression and Encryption of Satellite Imagery IJECEIAES
 
A fuzzy clustering algorithm for high dimensional streaming data
A fuzzy clustering algorithm for high dimensional streaming dataA fuzzy clustering algorithm for high dimensional streaming data
A fuzzy clustering algorithm for high dimensional streaming dataAlexander Decker
 
IRJET - A Survey Paper on Efficient Object Detection and Matching using F...
IRJET -  	  A Survey Paper on Efficient Object Detection and Matching using F...IRJET -  	  A Survey Paper on Efficient Object Detection and Matching using F...
IRJET - A Survey Paper on Efficient Object Detection and Matching using F...IRJET Journal
 
[Paper Review] MisGAN: Learning from Incomplete Data with Generative Adversar...
[Paper Review] MisGAN: Learning from Incomplete Data with Generative Adversar...[Paper Review] MisGAN: Learning from Incomplete Data with Generative Adversar...
[Paper Review] MisGAN: Learning from Incomplete Data with Generative Adversar...Jihoo Kim
 
Fast Feature Pyramids for Object Detection
Fast Feature Pyramids for Object DetectionFast Feature Pyramids for Object Detection
Fast Feature Pyramids for Object Detectionsuthi
 
Satellite Image Classification with Deep Learning Survey
Satellite Image Classification with Deep Learning SurveySatellite Image Classification with Deep Learning Survey
Satellite Image Classification with Deep Learning Surveyijtsrd
 
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...ijcsit
 
Finding similarities between structured documents as a crucial stage for gene...
Finding similarities between structured documents as a crucial stage for gene...Finding similarities between structured documents as a crucial stage for gene...
Finding similarities between structured documents as a crucial stage for gene...Alexander Decker
 
Text Recognition using Convolutional Neural Network: A Review
Text Recognition using Convolutional Neural Network: A ReviewText Recognition using Convolutional Neural Network: A Review
Text Recognition using Convolutional Neural Network: A ReviewIRJET Journal
 
TRANSFER LEARNING BASED IMAGE VISUALIZATION USING CNN
TRANSFER LEARNING BASED IMAGE VISUALIZATION USING CNNTRANSFER LEARNING BASED IMAGE VISUALIZATION USING CNN
TRANSFER LEARNING BASED IMAGE VISUALIZATION USING CNNijaia
 
Strategy for Foreground Movement Identification Adaptive to Background Variat...
Strategy for Foreground Movement Identification Adaptive to Background Variat...Strategy for Foreground Movement Identification Adaptive to Background Variat...
Strategy for Foreground Movement Identification Adaptive to Background Variat...IJECEIAES
 
Comparison Between Clustering Algorithms for Microarray Data Analysis
Comparison Between Clustering Algorithms for Microarray Data AnalysisComparison Between Clustering Algorithms for Microarray Data Analysis
Comparison Between Clustering Algorithms for Microarray Data AnalysisIOSR Journals
 

What's hot (19)

IEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsIEEE 2014 Matlab Projects
IEEE 2014 Matlab Projects
 
A Novel GA-SVM Model For Vehicles And Pedestrial Classification In Videos
A Novel GA-SVM Model For Vehicles And Pedestrial Classification In VideosA Novel GA-SVM Model For Vehicles And Pedestrial Classification In Videos
A Novel GA-SVM Model For Vehicles And Pedestrial Classification In Videos
 
Balancing Compression and Encryption of Satellite Imagery
Balancing Compression and Encryption of Satellite Imagery Balancing Compression and Encryption of Satellite Imagery
Balancing Compression and Encryption of Satellite Imagery
 
A fuzzy clustering algorithm for high dimensional streaming data
A fuzzy clustering algorithm for high dimensional streaming dataA fuzzy clustering algorithm for high dimensional streaming data
A fuzzy clustering algorithm for high dimensional streaming data
 
IRJET - A Survey Paper on Efficient Object Detection and Matching using F...
IRJET -  	  A Survey Paper on Efficient Object Detection and Matching using F...IRJET -  	  A Survey Paper on Efficient Object Detection and Matching using F...
IRJET - A Survey Paper on Efficient Object Detection and Matching using F...
 
[Paper Review] MisGAN: Learning from Incomplete Data with Generative Adversar...
[Paper Review] MisGAN: Learning from Incomplete Data with Generative Adversar...[Paper Review] MisGAN: Learning from Incomplete Data with Generative Adversar...
[Paper Review] MisGAN: Learning from Incomplete Data with Generative Adversar...
 
Fast Feature Pyramids for Object Detection
Fast Feature Pyramids for Object DetectionFast Feature Pyramids for Object Detection
Fast Feature Pyramids for Object Detection
 
Satellite Image Classification with Deep Learning Survey
Satellite Image Classification with Deep Learning SurveySatellite Image Classification with Deep Learning Survey
Satellite Image Classification with Deep Learning Survey
 
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...
 
Fuzzy In Remote Classification
Fuzzy In Remote ClassificationFuzzy In Remote Classification
Fuzzy In Remote Classification
 
Finding similarities between structured documents as a crucial stage for gene...
Finding similarities between structured documents as a crucial stage for gene...Finding similarities between structured documents as a crucial stage for gene...
Finding similarities between structured documents as a crucial stage for gene...
 
ClusterPaperDaggett
ClusterPaperDaggettClusterPaperDaggett
ClusterPaperDaggett
 
Text Recognition using Convolutional Neural Network: A Review
Text Recognition using Convolutional Neural Network: A ReviewText Recognition using Convolutional Neural Network: A Review
Text Recognition using Convolutional Neural Network: A Review
 
X36141145
X36141145X36141145
X36141145
 
50120130406033
5012013040603350120130406033
50120130406033
 
TRANSFER LEARNING BASED IMAGE VISUALIZATION USING CNN
TRANSFER LEARNING BASED IMAGE VISUALIZATION USING CNNTRANSFER LEARNING BASED IMAGE VISUALIZATION USING CNN
TRANSFER LEARNING BASED IMAGE VISUALIZATION USING CNN
 
Kk3517971799
Kk3517971799Kk3517971799
Kk3517971799
 
Strategy for Foreground Movement Identification Adaptive to Background Variat...
Strategy for Foreground Movement Identification Adaptive to Background Variat...Strategy for Foreground Movement Identification Adaptive to Background Variat...
Strategy for Foreground Movement Identification Adaptive to Background Variat...
 
Comparison Between Clustering Algorithms for Microarray Data Analysis
Comparison Between Clustering Algorithms for Microarray Data AnalysisComparison Between Clustering Algorithms for Microarray Data Analysis
Comparison Between Clustering Algorithms for Microarray Data Analysis
 

Similar to Three Dimensional Chaotic System for Color Image Scrambling Algorithm

A new four-dimensional hyper-chaotic system for image encryption
A new four-dimensional hyper-chaotic system for image encryption A new four-dimensional hyper-chaotic system for image encryption
A new four-dimensional hyper-chaotic system for image encryption IJECEIAES
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONijcseit
 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsTELKOMNIKA JOURNAL
 
Chaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey StudyChaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey StudyjournalBEEI
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
New Technique for Image Encryption Based on Choas and Change of MSB
New Technique for Image Encryption Based on Choas and Change of MSBNew Technique for Image Encryption Based on Choas and Change of MSB
New Technique for Image Encryption Based on Choas and Change of MSBEditor IJCATR
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplicationijcsit
 
Field-programmable gate array design of image encryption and decryption usin...
Field-programmable gate array design of image encryption and  decryption usin...Field-programmable gate array design of image encryption and  decryption usin...
Field-programmable gate array design of image encryption and decryption usin...IJECEIAES
 
Medical image encryption using multi chaotic maps
Medical image encryption using multi chaotic mapsMedical image encryption using multi chaotic maps
Medical image encryption using multi chaotic mapsTELKOMNIKA JOURNAL
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionIRJET Journal
 
K-Means Clustering in Moving Objects Extraction with Selective Background
K-Means Clustering in Moving Objects Extraction with Selective BackgroundK-Means Clustering in Moving Objects Extraction with Selective Background
K-Means Clustering in Moving Objects Extraction with Selective BackgroundIJCSIS Research Publications
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET Journal
 
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET Journal
 
IMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSET
IMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSETIMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSET
IMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSETIJCSEA Journal
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling cscpconf
 
Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...Akash Rawat
 

Similar to Three Dimensional Chaotic System for Color Image Scrambling Algorithm (20)

A new four-dimensional hyper-chaotic system for image encryption
A new four-dimensional hyper-chaotic system for image encryption A new four-dimensional hyper-chaotic system for image encryption
A new four-dimensional hyper-chaotic system for image encryption
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systems
 
Chaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey StudyChaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey Study
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
New Technique for Image Encryption Based on Choas and Change of MSB
New Technique for Image Encryption Based on Choas and Change of MSBNew Technique for Image Encryption Based on Choas and Change of MSB
New Technique for Image Encryption Based on Choas and Change of MSB
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
 
5 1-10
5 1-105 1-10
5 1-10
 
Field-programmable gate array design of image encryption and decryption usin...
Field-programmable gate array design of image encryption and  decryption usin...Field-programmable gate array design of image encryption and  decryption usin...
Field-programmable gate array design of image encryption and decryption usin...
 
Medical image encryption using multi chaotic maps
Medical image encryption using multi chaotic mapsMedical image encryption using multi chaotic maps
Medical image encryption using multi chaotic maps
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
 
K-Means Clustering in Moving Objects Extraction with Selective Background
K-Means Clustering in Moving Objects Extraction with Selective BackgroundK-Means Clustering in Moving Objects Extraction with Selective Background
K-Means Clustering in Moving Objects Extraction with Selective Background
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
 
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
 
IMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSET
IMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSETIMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSET
IMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSET
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
 
Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

Three Dimensional Chaotic System for Color Image Scrambling Algorithm

  • 1. Three Dimensional Chaotic System for Color Image Scrambling Algorithm S. N. Lagmiri1 , N. Elalami2 , J. Elalami3 1 Information and Production System, Mohammadia School Engineering, Mohamed V University in Rabat, Morocco 2 LAII, Mohammadia School Engineering, Mohamed V University in Rabat, Morocco 3 LASTIMI, Higher School of Technology of Sale, Mohamed V University in Rabat, Morocco Abstract ̶ With the development of information security, the traditional image encryption methods have become outdated. Because of amply using images in the transmission process, it is important to protect the confidential image data from unauthorized access. This paper presents a new chaos based image encryption algorithm, which can improve the security during transmission more effectively utilizes the chaotic systems properties, such as pseudo-random appearance and sensitivity to initial conditions. Based on chaotic theory and decomposition and recombination of pixel values, this new image scrambling algorithm is able to change the position of pixel, simultaneously scrambling both position and pixel values. Experimental results show that the new algorithm improves the image security effectively to avoid unscramble, and it also can restore the image as same as the original one, which reaches to the purposes of image safe and reliable transmission. Keywords: Color image, chaotic system, decomposition, image scrambling, recombination I. INTRODUCTION Recently, security of multimedia data is receiving more and more attention due to the transmission over various communication networks. In order to protect personal information, many image encryption algorithms are designed and proposed such as two-dimensional cellular automata based method [2], Henon chaotic map [10, 13], Chen's hyperchaotic system [12], Arnold transform [3, 4]. Chaotic functions are blessed with properties like sensitivity to the initial conditions, and ergodicity which make them very desirable for encryption [1]. Image scrambling is one of the methods for securing the image by scrambling it into a disordered one beyond recognition, making it hard for those who get the image in unauthorized manner to extract information of the original image from the scrambled images. Further, image scrambling technology depends on data hiding technology which provides non-password security algorithm for information hiding. Now, the mainly used three kind of image scrambling types are scrambling in the space domain, scrambling in the frequency domain, and scrambling in the color or grey domain. In a great quantity of all kind of image scrambling algorithms, the image scrambling algorithms based on chaos have attracted more and more attention since they can provide a high level of security [5, 6, 7, 8]. International Journal of Computer Science and Information Security (IJCSIS), Vol. 16, No. 1, January 2018 8 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 2. This paper focuses on a new image scrambling algorithm which introduces a new chaotic system. Image scrambling using chaotic properties is an application for providing security to the images from getting into the hands of unauthorized user. The proposed image scrambling scheme generates the permuting address codes by sorting the chaotic sequence directly. This paper analyzed that the scrambling performance of the new algorithm is statistic. The conclusion of this paper indicates that the new algorithm can provide a high level security. The paper results in good performance of the proposed algorithm that can also be applied in the real-time applications and digital communications as it is a straightforward mechanism and easy to implement. The rest of the paper is organized as follows: proposed chaotic system in section 2, image scrambling algorithm based on chaos theory in section 3, experimental details and results are analyzed in section 4. The paper is observed by a conclusion in section 5. II. PROPOSED CHAOTIC SYSTEM In this section, we describe the new chaotic system used in this work. 2.1. New Chaotic System Recently, Chen and Lee [9] introduced a new chaotic system, which is described by the following nonlinear differential equation: { ̇ = − ̇ = − + ̇ = − + (1) � = Where: - , and are the state variables and , and are positive constants. - = . - � is the system measured output. When = . , = = , the system (1) is chaotic. 2.2. Lyapunov exponent By linearizing the Jacobian matrix � round the equilibrium point � and solving the following equation: |λ� − �| = (2) Therefore, the new chaotic system (1) has three eigenvalues shown in figure 1. � = . � = − .99 � = − .999 International Journal of Computer Science and Information Security (IJCSIS), Vol. 16, No. 1, January 2018 9 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 3. Figure 1: Lyapunov exponent of new chaotic system 2.3. Sensitivity to initial conditions Sensitivity to initial conditions means that each point in a chaotic system is arbitrarily closely approximated by other points with significantly different future paths, or trajectories. Thus, an arbitrarily small change, or perturbation, of the current trajectory may lead to significantly different future behavior. The next figure compares the time series for two litely different initial conditions. The two time series stay close together for about 2 iterations. But after that, they are pretty much on their own. (a) (b) International Journal of Computer Science and Information Security (IJCSIS), Vol. 16, No. 1, January 2018 10 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 4. (c) Figure 2: Sensitivity to two initial conditions [-2, 2, 1] and [-1.9, 1.9, 0.9] (a): (b): (c): III. IMAGE SCRAMBLING ALGORITHM BASED ON CHAOS THEORY 3.1. Proposed algorithm The proposed chaotic system is now used in the design of color image encryption algorithm. The proposed images encryption algorithm input is an original image whilst the output is a scrambled one. Figure 3 illustrate the proposed algorithm scheme. Figure 3: Principle of chaotic scrambling algorithm for color image Original Image Scrambled color Image Red Component Green Component Blue Component R- Key G- Key B-Key lx ly lz Scrambled Red component Scrambled Green component Scrambled Blue component RGB three-color separation block RGB three-color combination block Chaotic Generator Key International Journal of Computer Science and Information Security (IJCSIS), Vol. 16, No. 1, January 2018 11 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 5. IV. EXPERIMENTAL DETAILS AND RESULTS A good quality scrambled algorithm should be strong against all types of attack. Some experiments are given in this section to demonstrate the efficiency of the proposed technique. In this section, the proposed technique is applied on two color images "Gallery" and "Alice", of resolution of " 256*256". We analyze the results by calculating histogram and correlation coefficient, to test the performance of the proposed technique. The next figures show the results of scrambled algorithm. Figure 4: "Alice" image corresponding for different step of the scrambling process International Journal of Computer Science and Information Security (IJCSIS), Vol. 16, No. 1, January 2018 12 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 6. Figure 5: "Gallery" image corresponding for different step of the scrambling process 4.1. Statistical analysis In order to resist attacks, the scrambled images should possess certain random properties. To prove the robustness of the proposed algorithm, a statistical analysis has been performed by calculating the histograms and the correlation coefficients for the original image and the scrambled image. For the two images that have been tested, it has been determined that their quality is good. International Journal of Computer Science and Information Security (IJCSIS), Vol. 16, No. 1, January 2018 13 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 7. 4.1.1. Histogram Analysis An image histogram is a commonly used method of analysis in image processing. The advantage of a histogram is that it shows the shape of the distribution for a large set of data. Thus, an image histogram illustrates how pixels in an image are distributed by plotting the number of pixels at each color intensity level. It is important to ensure that the encrypted and original images do not have any statistical similarities. The experimental results of the original image and its corresponding scrambled image and their histograms are shown in Fig. 6. The histogram of each original image illustrates how the pixels are distributed by graphing the number of pixels at every color of RGB [14]. It is clear that the histogram of the scrambled image is different from the respective histograms of the original image. (a) (b) Figure 6: "Alice" image histogram in three channels RGB (a): Original (b): Scrambled International Journal of Computer Science and Information Security (IJCSIS), Vol. 16, No. 1, January 2018 14 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 8. (a) (b) Figure 7: "Gallery" image histogram in three channels RGB (a): Original (b): Scrambled 4.2. Correlation of two adjacent pixels In addition to the histogram analysis, we have also analyzed the correlation between two vertically adjacent pixels, two horizontally adjacent pixels and two diagonally adjacent pixels in plain image and cipher image respectively. A correlation is a statistical measure of security that expresses a degree of relationship between two adjacent pixels in an image or a degree of association between two adjacent pixels in an image. The aim of correlation measures is to keep the amount of redundant information available in the scrambled image as low as possible [11, 15]. International Journal of Computer Science and Information Security (IJCSIS), Vol. 16, No. 1, January 2018 15 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 9. Equation (3) is used to study the correlation between two adjacent pixels in the horizontal, vertical, diagonal and anti-diagonal orientations: � = ∑ ( �× �)−∑ �×∑ � � �= � �= � �= √ ∑ � � �= − ∑ � � �= × ∑ � � �= − ∑ � � �= (3) where and are the intensity values of two adjacent pixels in the image and is the number of adjacent pixels selected from the image to calculate the correlation. Results for the correlation coefficients of two adjacent pixels are shown in tables 1and 2. In the experiments results, 3000 pairs of two adjacent pixels are randomly selected. Fig. 8 shows the distribution of two adjacent pixels in the original image and the encrypted-image. There is very good correlation between adjacent pixels in the image data [16, 17], while there is only a small correlation between adjacent pixels in the scrambled image. (a) (b) Figure 8: Horizontal, vertical and diagonal correlation of original and scrambled "Alice" image (a): Original image (b): Scrambled image International Journal of Computer Science and Information Security (IJCSIS), Vol. 16, No. 1, January 2018 16 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 10. (b) (b) Figure 9: Horizontal, vertical and diagonal correlation of original and scrambled "Gallery" image (a): Original image (b): Scrambled image Table I Correlation coefficient corresponding to original and scrambled images Direction Horizontal Vertical Diagonal Alice image Original 0.9759 0.9855 0.9677 Scrambled 0.5632 0.5656 0.5612 Gallery image Original 0.9878 0.9777 0.9679 Scrambled 0.3977 0.3921 0.3832 International Journal of Computer Science and Information Security (IJCSIS), Vol. 16, No. 1, January 2018 17 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 11. Table II Correlation coefficient corresponding to original and recovered images Direction Horizontal Vertical Diagonal Alice image Original 0.9759 0.9855 0.9677 Renew 0.9759 0.9855 0.9677 Gallery image Original 0.9878 0.9777 0.9679 Renew 0.9674 0.9665 0.9290 4.3. PSNR Peak Signal to Noise Ratio (PSNR) criterion is used to test the unobservable factor. This measure indicates the degree of similarity between the watermark images and a watermark images. PSNR is expressed mathematically in the following form: [ ] = log 55 � ��,�� (4) where EQM is the mean square error between the two images ( original , recovered . � , = ∑ ∑ , − , − = − = To recover the two images, we apply the inverse of the proposed algorithm in figure 2. The result is shown in figure 10. Figure 10: "Alice" and "Gallery" recovered image International Journal of Computer Science and Information Security (IJCSIS), Vol. 16, No. 1, January 2018 18 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 12. PSNR high means: Mean square error between the original image and reconstructed image is very low. It implies that the image been properly restored. In the other way, the restored image quality is better; in our case, the values of PSNR are as follow: PSNR (Alice) = Inf PSNR (Gallery) = 51.75 The result is much closed with the correlation coefficient. - For "Alice", the correlation coefficient for the original and renew image are identical. The PSNR equal to INF, that means the renew image is identical to original image. - For "Gallery", the correlation coefficient for the renew image is at 40% of the original image, that justify the corresponding PSNR value. V. CONCLUSION In this paper, a new image scrambling algorithm, by using image scrambling to encrypt the image to improve the security of image. The new algorithm based on chaotic system and decomposition and recombination of pixel values is able to scramble pixel positions and pixel values of images. Analysis of the statistical information of scrambled images in the experimental tests shows that the present algorithm provides reasonable security. Owing to the strong irregularity of the sorting transformation that improves the effect of the scrambling. The experimental results show that the algorithm is effective to scramble the image and can provide high security. It simulates scrambling under Matlab 7 to confirm it. REFERENCES [1] Pawan N. Khade and Prof. Manish Narnaware, “3D Chaotic Functions for Image Encryption,” IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 3, No 1, May 2012, pp: 323- 328. [2] P. Ping, Z. J. Wang, and F. Xu, “A two-dimensional cellular automata based method for multiple image”, International Conference on Computer Science & Service System, vol. 112, pp. 101-104, 2014. [3] F. Chen, K. W. Wong, X. Liao, and T. Xiang, “Period distribution of generalized discrete Arnold cat map”, Theoretical Computer Science, vol. 552, no. 4, pp. 13-25, 2014. [4] L. Chen, D. Zhao, and F. Ge, “Mage encryption based on singular value decomposition and Arnold transform in fractional domain”, Optics Communications, vol. 219, no. 6, pp. 98-103, 2013. [5] Zhu Liehuang, Li Wenzhuo, Liao Lejian and Li Hong. “A Novel Image Scrambling Algorithm for Digital Watermarking Based on Chaotic Sequences” [J]. International Journal of Computer Science and Network Security, 6(8B): 125-130, 2006. [6] Matthews R. “On the derivation of a ‘chaotic’ encryption algorithm [J]”. Cryptogia, 1989, 13:29-42. [7] Scharinger J. Fast encryption of image data using chaotic Kolmogorov flow [J]. J. Electronic Imaging, 1998, 7(2): 318-325. [8] Yu X Y, Zhang J, Ren H E, Xu G S and Luo X Y. “Chaotic Image Scrambling Algorithm Based ob S-DES [J]”. Journal of Physics: Conference Series, 2006, 48: 349-353. International Journal of Computer Science and Information Security (IJCSIS), Vol. 16, No. 1, January 2018 19 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 13. [9] S.N. Lagmiri, M. Amghar and N. Sbiti, “Synchronization between a new chaotic system and Rössler system by a high gain observer”, IEEEXplore, May ,2015. [10] J. Khan, J. Ahmad, and S. O. Hwang, “An efficient image encryption scheme based on: Henon map, skew tent map and s-box,” International Conference on Modeling, Simulation and Applied Optimization, vol. 10, pp. 1- 6, 2015. [11] Burger, W. and M. Burge, Digital image processing: “an algorithmic introduction using Java”. 2008: Springer-Verlag New York Inc. [12] D. L, “Color image encryption algorithm based on chua's circuit and chen's hyper-chaotic system,” Journal of Information & Computational Science, vol. 12, pp. 1021-1028, 2015. [13] S. Liu, J. Sun, and Z. Xu, “An improved image encryption algorithm based on chaotic system”, Journal of Computers, vol. 4, no. 11, pp. 1091- 1100, 2009. [14] Abderrahim, N.W., F.Z. Benmansour, and O. Seddiki, “Integration of chaotic sequences uniformly distributed in a new image encryption algorithm.” 2012. [15] Jolfaei, A. and A. Mirghadri, “Survey: image encryption using Salsa20”. International Journal of Computer Science Issues, 2010. 7(5): pp. 213-220. [16] 17. H. El-din. H. Ahmed, H.M.K., O. S. Farag Allah, “Encryption quality analysis of the RC5 block cipher algorithm for digital images”. Optical Engineering, 2006. 45( 10). [17] 18. Ibrahim S I Abuhaiba and M.A.S. Hassan, Image Encryption Using Differential Evolution Approach in Frequency Domain. Signal & Image Processing : An International Journal(SIPIJ), 2011. 2, No.1: p. 51-69. International Journal of Computer Science and Information Security (IJCSIS), Vol. 16, No. 1, January 2018 20 https://sites.google.com/site/ijcsis/ ISSN 1947-5500