P1151351311

Ashraf Aboshosha
Ashraf AboshoshaDr. Eng., à Computer Science and Engineering
Secure Image Encryption using Two Dimensional
Logistic Map
* Gangadhar Tiwari1, Debashis Nandi2, Abhishek Kumar3, Madhusudhan Mishra4 1,
2Department of Information Technology, NIT Durgapur (W.B.), India 3Department of
Electronics and Electrical Engineering, NITAP, (A.P.), India 4Department of Electronics and
Communication Engineering, NERIST, (A.P.), India
1www.icgst.com
http://www.icgst.com/paper.aspx?pid=P1151351311
Current researches in image encryption techniques suggest using chaotic systems.
But, one-dimensional (1D) chaotic schemes have drawbacks like small key space
and weak security. This paper proposes a novel chaotic image encryption scheme
based on two-dimensional (2D) logistic map. The 2D logistic map has more
complex chaotic behaviors with respect to 1D logistic map like basin structures
and attractors. The proposed scheme is based on permutation-substitution
network and offers good confusion and diffusion properties in stream and block
ciphers both. It encrypts plaintext image into random-like ciphertext image by
generating the pseudorandom sequences from logistic map. The key schedule
algorithm translates a binary encryption key to initial values and system
parameters used in the 2D logistic map. This scheme uses 256 bit long cipher key
for encryption/decryption. Experimental result indicates that the proposed
scheme is secure against known cryptanalytic attacks and offers superior
performance compared to existing chaotic image encryption schemes.
2www.icgst.com
http://www.icgst.com/paper.aspx?pid=P1151351311
Secure Image Encryption using Two Dimensional Logistic Map
Abstract
3www.icgst.com
Mr. Gangadhar Tiwari completed B.Sc.(Mathematics) from Guwahati University,
Guwahati in 2006 and M.Sc.(Information Technology) from Punjab Technical
University,Jalandhar in 2011. Currently, he is pursuing PhD at NIT Durgapur, India.His
research interests include Information Security and Digital Image Processing.
NIT Durgapur
http://www.nitdgp.ac.in/
4www.icgst.com
Dr. Debashis Nandi received his BE degree in Electronics and Communication
Engineering from RE College, Durgapur (University of Burdwan), India, in 1994 and M.
Tech. Degree from Burdwan University on Microwave Engineering in 1997. He
received his PhD degree from IIT, Kharagpur, India on Medical Imaging Technology.
His area of research includes Computer security and cryptography, Secure chaotic
communication, Video coding. He is an Associate Professor in the Department of
Information Technology, NIT, Durgapur, India.
NIT Durgapur
http://www.nitdgp.ac.in/
5www.icgst.com
Mr. Abhishek Kumar received his B.Tech degree in Electrical and Electronics
Engineering from Pondicherry University in 2009 and M.Tech degree in Power System
Engineering from North Eastern Regional Institute of Science and Technology, India in
the 2012.He is currently working as an Assistant Professor with Department of
Electrical & Electronics Engineering, National Institute of Technology, Arunachal
Pradesh, India.
National Institute of Technology, Arunachal
Prades
http://www.nitap.in/
6www.icgst.com
Mr. Madhusudhan Mishra has completed his B.Tech in Electronics and
Communication Engineering from North Eastern Regional Institute of Science and
Technology (NERIST), Nirjuli, Arunachal Pradesh in 2004 and M.Tech in Signal
Processing from IIT Guwahati in 2011. He worked in Sankara Institute of Technology,
Kukas, Jaipur for some years and joined NERIST as Assistant Professor in 2006. His
main interest of research area includes Digital Signal and Image Processing.
National Institute of Technology, Arunachal
Prades
http://www.nitap.in/
7
1 sur 7

Recommandé

P1151442348 par
P1151442348P1151442348
P1151442348Ashraf Aboshosha
338 vues6 diapositives
resume -1- par
resume -1-resume -1-
resume -1-Jini Shajesh
199 vues5 diapositives
Brv vardhan 2013 par
Brv vardhan 2013Brv vardhan 2013
Brv vardhan 2013Anup Pravin
805 vues16 diapositives
IRJET- Deep Learning Techniques for Object Detection par
IRJET-  	  Deep Learning Techniques for Object DetectionIRJET-  	  Deep Learning Techniques for Object Detection
IRJET- Deep Learning Techniques for Object DetectionIRJET Journal
66 vues8 diapositives
Segmentation and recognition of handwritten digit numeral string using a mult... par
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...ijfcstjournal
541 vues7 diapositives
Analysis and Optimization of Quantum circuits par
Analysis and Optimization of Quantum circuitsAnalysis and Optimization of Quantum circuits
Analysis and Optimization of Quantum circuitsVIT-AP University
18 vues1 diapositive

Contenu connexe

Tendances

Resume par
ResumeResume
ResumeZaheer Babar
276 vues3 diapositives
Thirunavukkarasu (2) par
Thirunavukkarasu (2)Thirunavukkarasu (2)
Thirunavukkarasu (2)thirunavukkarasu jagadeesan
136 vues3 diapositives
Resume par
ResumeResume
ResumeVikrant kumar
64 vues2 diapositives
Dynamic thresholding on speech segmentation par
Dynamic thresholding on speech segmentationDynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationeSAT Publishing House
317 vues8 diapositives
Dynamic thresholding on speech segmentation par
Dynamic thresholding on speech segmentationDynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationeSAT Journals
156 vues8 diapositives
Invisible water marking within media files using state of-the-art technology par
Invisible water marking within media files using state of-the-art technologyInvisible water marking within media files using state of-the-art technology
Invisible water marking within media files using state of-the-art technologyIAEME Publication
1.4K vues8 diapositives

Tendances(19)

Dynamic thresholding on speech segmentation par eSAT Journals
Dynamic thresholding on speech segmentationDynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentation
eSAT Journals156 vues
Invisible water marking within media files using state of-the-art technology par IAEME Publication
Invisible water marking within media files using state of-the-art technologyInvisible water marking within media files using state of-the-art technology
Invisible water marking within media files using state of-the-art technology
IAEME Publication1.4K vues
IRJET- Intelligent Character Recognition of Handwritten Characters par IRJET Journal
IRJET- Intelligent Character Recognition of Handwritten CharactersIRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten Characters
IRJET Journal23 vues
A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ... par Hadi Santoso
A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ...A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ...
A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ...
Hadi Santoso810 vues
GUI based handwritten digit recognition using CNN par Abhishek Tiwari
GUI based handwritten digit recognition using CNNGUI based handwritten digit recognition using CNN
GUI based handwritten digit recognition using CNN
Abhishek Tiwari662 vues
IRJET-MText Extraction from Images using Convolutional Neural Network par IRJET Journal
IRJET-MText Extraction from Images using Convolutional Neural NetworkIRJET-MText Extraction from Images using Convolutional Neural Network
IRJET-MText Extraction from Images using Convolutional Neural Network
IRJET Journal11 vues
Mining knowledge graphs to map heterogeneous relations between the internet o... par IJECEIAES
Mining knowledge graphs to map heterogeneous relations between the internet o...Mining knowledge graphs to map heterogeneous relations between the internet o...
Mining knowledge graphs to map heterogeneous relations between the internet o...
IJECEIAES30 vues

En vedette

P1111143901 par
P1111143901P1111143901
P1111143901Ashraf Aboshosha
778 vues17 diapositives
Jammer par
JammerJammer
JammerNeelesh Kumar
466 vues13 diapositives
Run time dynamic partial reconfiguration using microblaze soft core processor... par
Run time dynamic partial reconfiguration using microblaze soft core processor...Run time dynamic partial reconfiguration using microblaze soft core processor...
Run time dynamic partial reconfiguration using microblaze soft core processor...eSAT Journals
96 vues4 diapositives
Distribution network reconfiguration for loss reduction and voltage par
Distribution network reconfiguration for loss reduction and voltageDistribution network reconfiguration for loss reduction and voltage
Distribution network reconfiguration for loss reduction and voltageGaddafi Sani
1.5K vues16 diapositives
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics... par
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...Sajid Iqbal
499 vues22 diapositives
Sacolloq par
SacolloqSacolloq
Sacolloqgueste71f7b
457 vues28 diapositives

En vedette(20)

Run time dynamic partial reconfiguration using microblaze soft core processor... par eSAT Journals
Run time dynamic partial reconfiguration using microblaze soft core processor...Run time dynamic partial reconfiguration using microblaze soft core processor...
Run time dynamic partial reconfiguration using microblaze soft core processor...
eSAT Journals96 vues
Distribution network reconfiguration for loss reduction and voltage par Gaddafi Sani
Distribution network reconfiguration for loss reduction and voltageDistribution network reconfiguration for loss reduction and voltage
Distribution network reconfiguration for loss reduction and voltage
Gaddafi Sani1.5K vues
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics... par Sajid Iqbal
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
Sajid Iqbal499 vues
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос par Project KRIT
М.Г.Гоман (2000) – Динамика нелинейных систем и хаосМ.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
Project KRIT928 vues
VOLTAGE SAG AND SWELL ALLEVIATION IN DISTRIBUTION NETWORK USING CUSTOM POWER... par Gaddafi Sani
 VOLTAGE SAG AND SWELL ALLEVIATION IN DISTRIBUTION NETWORK USING CUSTOM POWER... VOLTAGE SAG AND SWELL ALLEVIATION IN DISTRIBUTION NETWORK USING CUSTOM POWER...
VOLTAGE SAG AND SWELL ALLEVIATION IN DISTRIBUTION NETWORK USING CUSTOM POWER...
Gaddafi Sani2.9K vues
Performance evluvation of chaotic encryption technique par Ancy Mariam Babu
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
Ancy Mariam Babu2.2K vues
OPTIMAL PLACEMENT OF DISTRIBUTED GENERATION par Jitendra Bhadoriya
OPTIMAL PLACEMENT OF DISTRIBUTED GENERATION OPTIMAL PLACEMENT OF DISTRIBUTED GENERATION
OPTIMAL PLACEMENT OF DISTRIBUTED GENERATION
Jitendra Bhadoriya10.2K vues
Image encryption and decryption par Aashish R
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
Aashish R64.5K vues
Chaos Theory: An Introduction par Antha Ceorote
Chaos Theory: An IntroductionChaos Theory: An Introduction
Chaos Theory: An Introduction
Antha Ceorote49.9K vues
Διερεύνηση της Γεωμετρικής Σκέψης των Αποφοίτων του Δημοτικού par Christos Skarkos
Διερεύνηση της Γεωμετρικής Σκέψης των Αποφοίτων του ΔημοτικούΔιερεύνηση της Γεωμετρικής Σκέψης των Αποφοίτων του Δημοτικού
Διερεύνηση της Γεωμετρικής Σκέψης των Αποφοίτων του Δημοτικού
Christos Skarkos317 vues

Similaire à P1151351311

P1151345302 par
P1151345302P1151345302
P1151345302Ashraf Aboshosha
474 vues7 diapositives
June 2022: Top 10 Read Articles in Signal & Image Processing par
June 2022: Top 10 Read Articles in Signal & Image   ProcessingJune 2022: Top 10 Read Articles in Signal & Image   Processing
June 2022: Top 10 Read Articles in Signal & Image Processingsipij
5 vues31 diapositives
April 2022: Top Read Articles in Signal & Image Processing par
April 2022: Top Read Articles in Signal & Image ProcessingApril 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image Processingsipij
37 vues31 diapositives
May 2022: Top Read Articles in Signal & Image Processing par
May 2022: Top Read Articles in Signal & Image ProcessingMay 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image Processingsipij
39 vues31 diapositives
July 2022: Top 10 Read Articles in Signal & Image Processing par
July 2022: Top 10 Read Articles in Signal & Image ProcessingJuly 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image Processingsipij
3 vues31 diapositives
January 2023: Top 10 Read Articles in Signal &Image Processing par
January 2023: Top 10 Read Articles in Signal &Image Processing	January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing sipij
7 vues31 diapositives

Similaire à P1151351311(20)

June 2022: Top 10 Read Articles in Signal & Image Processing par sipij
June 2022: Top 10 Read Articles in Signal & Image   ProcessingJune 2022: Top 10 Read Articles in Signal & Image   Processing
June 2022: Top 10 Read Articles in Signal & Image Processing
sipij5 vues
April 2022: Top Read Articles in Signal & Image Processing par sipij
April 2022: Top Read Articles in Signal & Image ProcessingApril 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image Processing
sipij37 vues
May 2022: Top Read Articles in Signal & Image Processing par sipij
May 2022: Top Read Articles in Signal & Image ProcessingMay 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image Processing
sipij39 vues
July 2022: Top 10 Read Articles in Signal & Image Processing par sipij
July 2022: Top 10 Read Articles in Signal & Image ProcessingJuly 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image Processing
sipij3 vues
January 2023: Top 10 Read Articles in Signal &Image Processing par sipij
January 2023: Top 10 Read Articles in Signal &Image Processing	January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing
sipij7 vues
August 2022: Top 10 Read Articles in Signal & Image Processing par sipij
August 2022: Top 10 Read Articles in Signal & Image ProcessingAugust 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image Processing
sipij2 vues
April 2023: Top 10 Read Articles in Signal & Image Processing par sipij
April 2023: Top 10 Read Articles in Signal & Image ProcessingApril 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image Processing
sipij9 vues
September 2022: Top 10 Read Articles in Signal & Image Processing par sipij
September 2022: Top 10 Read Articles in Signal & Image ProcessingSeptember 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image Processing
sipij3 vues
October 2022: Top 10 Read Articles in Signal & Image Processing par sipij
October 2022: Top 10 Read Articles in Signal & Image ProcessingOctober 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image Processing
sipij3 vues
Two level data security using steganography and 2 d cellular automata par eSAT Publishing House
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automata
A novel technique of visual cryptography for maintaining the security of visu... par IAEME Publication
A novel technique of visual cryptography for maintaining the security of visu...A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu... par IAEME Publication
A novel technique of visual cryptography for maintaining the security of visu...A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...
Optimized image processing and clustering to mitigate security threats in mob... par TELKOMNIKA JOURNAL
Optimized image processing and clustering to mitigate security threats in mob...Optimized image processing and clustering to mitigate security threats in mob...
Optimized image processing and clustering to mitigate security threats in mob...
Lightweight digital imaging and communications in medicine image encryption f... par TELKOMNIKA JOURNAL
Lightweight digital imaging and communications in medicine image encryption f...Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...
An ideal steganographic scheme in networks using twisted payload par eSAT Journals
An ideal steganographic scheme in networks using twisted payloadAn ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payload
eSAT Journals100 vues
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN... par Editor IJMTER
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
Editor IJMTER742 vues

Plus de Ashraf Aboshosha

P1121352313 par
P1121352313P1121352313
P1121352313Ashraf Aboshosha
501 vues4 diapositives
P1121340296 par
P1121340296P1121340296
P1121340296Ashraf Aboshosha
423 vues7 diapositives
P1121340294 par
P1121340294P1121340294
P1121340294Ashraf Aboshosha
332 vues7 diapositives
P1121327289 par
P1121327289P1121327289
P1121327289Ashraf Aboshosha
404 vues7 diapositives
P1151442347 par
P1151442347P1151442347
P1151442347Ashraf Aboshosha
339 vues7 diapositives
P1151439345 par
P1151439345P1151439345
P1151439345Ashraf Aboshosha
409 vues7 diapositives

Dernier

REACTJS.pdf par
REACTJS.pdfREACTJS.pdf
REACTJS.pdfArthyR3
35 vues16 diapositives
802.11 Computer Networks par
802.11 Computer Networks802.11 Computer Networks
802.11 Computer NetworksTusharChoudhary72015
13 vues33 diapositives
sam_software_eng_cv.pdf par
sam_software_eng_cv.pdfsam_software_eng_cv.pdf
sam_software_eng_cv.pdfsammyigbinovia
9 vues5 diapositives
Pitchbook Repowerlab.pdf par
Pitchbook Repowerlab.pdfPitchbook Repowerlab.pdf
Pitchbook Repowerlab.pdfVictoriaGaleano
5 vues12 diapositives
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth par
BCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for GrowthBCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for Growth
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for GrowthInnomantra
10 vues4 diapositives
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) par
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Tsuyoshi Horigome
39 vues16 diapositives

Dernier(20)

REACTJS.pdf par ArthyR3
REACTJS.pdfREACTJS.pdf
REACTJS.pdf
ArthyR335 vues
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth par Innomantra
BCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for GrowthBCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for Growth
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth
Innomantra 10 vues
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) par Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
fakenews_DBDA_Mar23.pptx par deepmitra8
fakenews_DBDA_Mar23.pptxfakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptx
deepmitra816 vues
_MAKRIADI-FOTEINI_diploma thesis.pptx par fotinimakriadi
_MAKRIADI-FOTEINI_diploma thesis.pptx_MAKRIADI-FOTEINI_diploma thesis.pptx
_MAKRIADI-FOTEINI_diploma thesis.pptx
fotinimakriadi10 vues
Design of machine elements-UNIT 3.pptx par gopinathcreddy
Design of machine elements-UNIT 3.pptxDesign of machine elements-UNIT 3.pptx
Design of machine elements-UNIT 3.pptx
gopinathcreddy34 vues
SUMIT SQL PROJECT SUPERSTORE 1.pptx par Sumit Jadhav
SUMIT SQL PROJECT SUPERSTORE 1.pptxSUMIT SQL PROJECT SUPERSTORE 1.pptx
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav 22 vues
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx par lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang78165 vues
Ansari: Practical experiences with an LLM-based Islamic Assistant par M Waleed Kadous
Ansari: Practical experiences with an LLM-based Islamic AssistantAnsari: Practical experiences with an LLM-based Islamic Assistant
Ansari: Practical experiences with an LLM-based Islamic Assistant
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... par csegroupvn
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn6 vues
MongoDB.pdf par ArthyR3
MongoDB.pdfMongoDB.pdf
MongoDB.pdf
ArthyR349 vues
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf par AlhamduKure
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdfASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
AlhamduKure6 vues
Design_Discover_Develop_Campaign.pptx par ShivanshSeth6
Design_Discover_Develop_Campaign.pptxDesign_Discover_Develop_Campaign.pptx
Design_Discover_Develop_Campaign.pptx
ShivanshSeth645 vues

P1151351311

  • 1. Secure Image Encryption using Two Dimensional Logistic Map * Gangadhar Tiwari1, Debashis Nandi2, Abhishek Kumar3, Madhusudhan Mishra4 1, 2Department of Information Technology, NIT Durgapur (W.B.), India 3Department of Electronics and Electrical Engineering, NITAP, (A.P.), India 4Department of Electronics and Communication Engineering, NERIST, (A.P.), India 1www.icgst.com http://www.icgst.com/paper.aspx?pid=P1151351311
  • 2. Current researches in image encryption techniques suggest using chaotic systems. But, one-dimensional (1D) chaotic schemes have drawbacks like small key space and weak security. This paper proposes a novel chaotic image encryption scheme based on two-dimensional (2D) logistic map. The 2D logistic map has more complex chaotic behaviors with respect to 1D logistic map like basin structures and attractors. The proposed scheme is based on permutation-substitution network and offers good confusion and diffusion properties in stream and block ciphers both. It encrypts plaintext image into random-like ciphertext image by generating the pseudorandom sequences from logistic map. The key schedule algorithm translates a binary encryption key to initial values and system parameters used in the 2D logistic map. This scheme uses 256 bit long cipher key for encryption/decryption. Experimental result indicates that the proposed scheme is secure against known cryptanalytic attacks and offers superior performance compared to existing chaotic image encryption schemes. 2www.icgst.com http://www.icgst.com/paper.aspx?pid=P1151351311 Secure Image Encryption using Two Dimensional Logistic Map Abstract
  • 3. 3www.icgst.com Mr. Gangadhar Tiwari completed B.Sc.(Mathematics) from Guwahati University, Guwahati in 2006 and M.Sc.(Information Technology) from Punjab Technical University,Jalandhar in 2011. Currently, he is pursuing PhD at NIT Durgapur, India.His research interests include Information Security and Digital Image Processing. NIT Durgapur http://www.nitdgp.ac.in/
  • 4. 4www.icgst.com Dr. Debashis Nandi received his BE degree in Electronics and Communication Engineering from RE College, Durgapur (University of Burdwan), India, in 1994 and M. Tech. Degree from Burdwan University on Microwave Engineering in 1997. He received his PhD degree from IIT, Kharagpur, India on Medical Imaging Technology. His area of research includes Computer security and cryptography, Secure chaotic communication, Video coding. He is an Associate Professor in the Department of Information Technology, NIT, Durgapur, India. NIT Durgapur http://www.nitdgp.ac.in/
  • 5. 5www.icgst.com Mr. Abhishek Kumar received his B.Tech degree in Electrical and Electronics Engineering from Pondicherry University in 2009 and M.Tech degree in Power System Engineering from North Eastern Regional Institute of Science and Technology, India in the 2012.He is currently working as an Assistant Professor with Department of Electrical & Electronics Engineering, National Institute of Technology, Arunachal Pradesh, India. National Institute of Technology, Arunachal Prades http://www.nitap.in/
  • 6. 6www.icgst.com Mr. Madhusudhan Mishra has completed his B.Tech in Electronics and Communication Engineering from North Eastern Regional Institute of Science and Technology (NERIST), Nirjuli, Arunachal Pradesh in 2004 and M.Tech in Signal Processing from IIT Guwahati in 2011. He worked in Sankara Institute of Technology, Kukas, Jaipur for some years and joined NERIST as Assistant Professor in 2006. His main interest of research area includes Digital Signal and Image Processing. National Institute of Technology, Arunachal Prades http://www.nitap.in/
  • 7. 7