SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.1, No.5, December 2011
DOI : 10.5121/ijcseit.2011.1507 77
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
Mintu Philip
Department of Computer Engineering, Rajagiri School of Engineering and Technology
mintu.philip@gmail.com
ABSTRACT
The paper proposes a new image encryption scheme based on chaotic encryption. It provides a fast
encryption algorithm based on coupled chaotic map. The image is encrypted using a pseudorandom key
stream generator. The image is partially encrypted by selecting most important components of image. To
obtain most important components of an image, discrete wavelet transform is applied.
KEYWORDS
Chaos Theory, wavelet, logistic map,, image encryption.
1. INTRODUCTION
Chaos theory has been established since 1970s. The distinct properties of chaos, such as
ergodicity, quasi-randomness, sensitivity dependence on initial conditions and system parameters,
have granted chaotic dynamics as a promising alternative for the conventional cryptographic
algorithms.
A new way of image encryption scheme has been proposed which utilizes a chaos-based
cryptographic scheme using the logistic map. A combined image compression and encryption
scheme is proposed. The model is achieved by using discrete wavelet transform and RLE for
compression. Chaos based system is used for encryption. This algorithm encrypts image pixel by
pixel taking consideration the values of previously encrypted pixels. This system is robust against
cryptanalytic attacks. Also a simple implementation of image encryption achieves high
encryption rate on general purpose computer. In mobile bandwidth constraints and power saving
are needed for which the proposed algorithm is suitable.
2. PROPOSED IMAGE ENCRYPTION ALGORITHM
The image is encrypted pixel by pixel using logistic maps. The advantage of logistic map is that it
has a very complex dynamics. Use of two logistic map increases the complexity of algorithm.
Only the first few coefficients are encrypted since energy is concentrated in these values. This
will save the execution time. The algorithm uses a coupled logistic map. It has a pseudorandom
key stream generator that generates a binary stream which used in chaotic encryption. The first
logistic map whose initial parameters are taken from the KEY generated during user
authentication process provides the initial parameters for second logistic map.
Following are the logistic maps:
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.1, No.5, December 2011
78
(3)
(4)
The steps involved in pseudorandom key stream generator are:
1. (5)
(6)
2. Convert real number to binary equivalent .
3. Divide into three parts and XOR the three parts to obtain .
4. Perform above steps for value of ‘i’ starting from 1 to n.
5. Convert to real value .
6. The value is given as initial value µ2 to second logistic map.
7. Above steps are repeated for second logistic map.
8. The final value is multiplied by and is converted to binary, stored in s1.
9. Multiply the value of µ2 by and convert to binary and store in s2.
10. Take first 56 bits of s1 and 5th
to 15th
bits of s2 and combine it to form the key to encrypt.
11. Perform XOR operation of pixels with the key to obtain the cipher.
12. At receiver side perform XOR of cipher with the key to decrypt data.
13. Decompress the data using inverse DWT to obtain the pixels of the image.
14. Write the pixels to a new image file.
The binary sequence generated by pseudorandom key stream generator is XORed with the pixel
values of the image to obtain the cipher image.
3. STATISTICAL ANALYSIS
The encrypted images should possess certain random properties in order to resist the statistical
attack. Statistical analysis is done by calculating the histograms, the correlations of two adjacent
pixels in the encrypted images and the correlation coefficient for several images and its
corresponding encrypted images of an image database. A detail study has been undergone and the
results are summarized as followings. Different images have been tested, and similar results are
obtained. However, due to the page limit, only the results for the Lena. The advantage of partial
encryption is that only very few coefficients are encrypted so that encryption time is reduced.
This is helpful in mobile application where bandwidth and power is constrained. It also helps to
increase the security of image since the intruder does not know which all coefficients are
encrypted.
3.1. Difference between the original and the permuted images
NPCR (Number of Pixels Change Rate) is used to test the difference between the original image
P1 and the permuted one C1. NPCR stands for the number of pixel change rate. Then, if D is a
matrix with the same size as images P1 and C1, D (i,j)is determined as follows:
(7)
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.1, No.5, December 2011
79
NPCR is defined by the following formula:
(8)
The NPCR of the new system is found to be 99.42.
3.2. Correlation coefficients of intra and inter - color –components
To quantify the dependence between two images, Pearson’s correlation coefficient is commonly
used. Given by equation, this coefficient is obtained by dividing the covariance between the two
images (eq. 13) by the product of their standard deviations (eq. 12 and eq. 11). E in eq.11 is the
expected value operator. P1 (i, j) and C1 (i, j) are respectively the pixels gray values of the first
and the second images.
(9)
(10)
(11)
Following results for found for various standard images:
Image Correlation coefficient
Lena 0.00099
Pepper 0.002
Cameraman 0.0017
Table 1: correlation coefficient of encrypted image.
3.3. Distribution of two adjacent pixels
Statistical analysis on large amounts of images shows that on average, 8 to 16 adjacent pixels are
correlated.In this section, some simulations are carried out to test the correlation distribution
between two horizontally, vertically and diagonally adjacent pixels, in the original and permuted
images. Fig. 5 shows the correlation distribution of two horizontally, vertically and diagonally
adjacent pixels in the first component of the original image and the encrypted images. Then, we
plot the pixel value on location (x,y+1) over the pixel value on location (x, y), location (x+1,y)
over the pixel value on location (x, y) and location (x+1,y+1) over the pixel value on location (x,
y).
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.1, No.5, December 2011
80
(a) (b)
` (c)
Fig 1: (a) horizontal, (b) vertical and (c) diagonal correlation matrix of original image
(a) (b)
(c)
Fig 2: (a) horizontal, (b) vertical and (c) diagonal correlation matrix of encrypted image
It is clear from Fig 2 that there is negligible correlation between the two adjacent pixels in the
encrypted image.
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.1, No.5, December 2011
81
3.4. Histogram analysis
An image-histogram illustrates how pixels in an image are distributed by graphing the number of
pixels at each color intensity level. We have calculated and analyzed the histograms of the
encrypted image as well as the original colored image.
As we can see, the histogram of the encrypted image is significantly different from that of the
original image. Also the histogram of complete and partially encrypted image are same.
Moreover, one can observe that the coupled map improves the uniformity of the histogram for
encryption method.
(a) (b)
(c)
Fig3: Histogram of (a) original image and (b) encrypted image and (c) partially encrypted image
3.5. Information Entropy analysis
Entropy is a statistical measure of randomness that can be used to characterize the texture of an
image. It is well known that the entropy H(m) of a message source m can be calculated as :
(12)
Where p(mi) represents the probability of message mi.
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.1, No.5, December 2011
82
When an image is encrypted, its entropy should ideally be 8. If it is less than this value, there
exists a certain degree of predictability which threatens its security. The entropy of partially and
complete encrypted images are found to be different by 0.2%.
Image Entropy(original) Entropy(Encrypted)
Lena 6.95 7.7719
Pepper 6.775 7.7
Cameraman 6.775 7.762
Table 2: Information Entropy
The obtained results are very close to the theoretical value. This means that information leakage
in the encryption process is negligible.
3. CONCLUSIONS
The proposed algorithm was found to be very fast and secured which can be applied for real time
applications which have bandwidth and power constraints. This is because it requires less time to
encrypt and decrypt image since they are partially encrypted. This will also help to improve
security since the intruder does not know which all coefficients are partially encrypted.
Application of chaos theory helps to achieve complex dynamics. The encryption scheme can be
extended to videos.
REFERENCES
[1] Y.B. Mao, G. Chen, S.G. Lian, “A novel fast image Encryption scheme based on the 3D chaotic
baker map,” Int. J. Bifurcate Chaos, vol. 14, pp. 3613–3624, 2004.
[2] H. Gao, Y. Zhang, S. Liang, and D. Li, “A new chaotic algorithm for image encryption,” Chaos,
Solutions &Fractals, vol. 29, no. 2, pp. 393–399, 2006.
[3] Su Su Maung, and Myitnt Myint Sein, “A Fast Encryption Scheme Based on Chaotic Maps”,
GMSARN International Conference on Sustainable Development: Issues and Prospects for the GMS,
2008.
[4] Musheer Ahmad and M. Shamsher Alam, “A New Algorithm of Encryption and Decryption of
Images Using Chaotic Mapping”, Musheer Ahmad et al /International Journal on Computer Science
and Engineering, Vol.2(1), 2009, 46-50.
[5] Fengjian Wang, Yongping Zhang and Tianjie Cao “Research of chaotic block cipher algorithm based
on Logistic map”, 2009 Second International Conference on Intelligent Computation Technology and
Automation, 2009: 678 – 681.
[6] Jui-Cheng Yen, and Jiun-In Guo, “A New Chaotic Key-Based Design for Image Encryption and
Decryption”, IEEE International Symposium on ISCAS 2000, Geneva, pp. IV-49-IV-52, May. 2000.
[7] Po-Han Lee,Soo-Chang Pei and Yih-Yuh Chen, “Generating Chaotic Stream Ciphers Using Chaotic
Systems”, Chinese Journal Of Physics Vol. 41 , No. 6, 2003.
[8] Socek, D., Shujun Li, Magliveras, S.S. and Furht, B, “Short Paper: Enhanced 1-D Chaotic Key-
Based Algorithm for Image Encryption”, First International Conference on Security and Privacy for
Emerging Areas in Communications Networks, 2005:406-407.
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.1, No.5, December 2011
83
[9] Deergha Rao and K. Gangadhar, “Modified Chaotic Key-Based Algorithm for Image Encryption and
Its VLSI Realization”, International Conference on Digital Signal Processing, 2007.
[10] H.E.H. Ahmed, H.M. Kalash, and O.S.F. Allah, “An Efficient Chaos-Based Feedback Stream Cipher
(ECBFSC) for Image Encryption and Decryption", presented at Informatica (Slovenia), 2007,
pp.121-129.
[11] Shubo Liu, Jing Sun, Zhengquan Xu “An Improved Image Encryption Algorithm based on Chaotic
System”, journal of computers, vol. 4, no. 11, 2009, pp.1091-1100.
[12] Abir Awad, Abdelhakim Saadane, “Efficient Chaotic Permutations for Image Encryption
Algorithms”, Proceedings of the World Congress on Engineering Vol I, 2010.
[13] Ai-hongZhu, Lia Li, “Improving for Chaotic Image Encryption Algorithm Based on Logistic Map”,
2nd Conference on Environmental Science and Information Application Technology, 2010.
[14] G. Chen, Y. Mao, C.K. Chui, “A symmetric image encryption based on 3D chaotic maps”, Chaos
Solutions Fractals, vol. 21, pp. 749–761, 2004.
[15] S. E. Borujeni, M. Eshghi1, “Chaotic Image Encryption Design Using Tompkins-Paige Algorithm”,
Hindawi Publishing Corporation, Mathematical Problems in Engineering, Article ID 762652, 22
pages, 2009.
[16] Mazleena Salleh, Subariah Ibrahim, Ismail Fauzi Isnin, “Image encryption algorithm based on chaotic
mapping”, Journal Teknologi, 2003, pp: 1–12.
[17] Shubo Liu, Jing Sun, Zhengquan Xu, “An Improved Image Encryption Algorithm based on chaotic
system”, Journal of Computers, vol. 4, no. 11, November 2009, pp: 1091-1100.
[18] Noura, H. El Assad, S. Vladeanu, C, “Design of a fast and robust chaos-based crypto-system for
image encryption”, 8th International Conference on Communications (COMM), 2010, pp: 423 – 426.
Author
Mintu Philip is currently working as a faculty in Department of Computer Science at
Rajagiri School of Engineering and Technology. She received B.Tech degree in Computer
Science from Rajagiri School of Engineering and Technology, Kerala on April 2008. She
completed M.tech in Computer Science with Specialization in Data Security under
CUSAT, Kerala on 2011.

Contenu connexe

Tendances

A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Journals
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageijctet
 
Chaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey StudyChaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey StudyjournalBEEI
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESIJCSEIT Journal
 
A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...ijsptm
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSIJNSA Journal
 
A new image steganography algorithm based
A new image steganography algorithm basedA new image steganography algorithm based
A new image steganography algorithm basedIJNSA Journal
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
 
Vol 1 No 1 - May 2013
Vol 1 No 1 - May 2013Vol 1 No 1 - May 2013
Vol 1 No 1 - May 2013ijcsbi
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Publishing House
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...ijait
 
An ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingAn ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingeSAT Publishing House
 

Tendances (17)

A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
Chaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey StudyChaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey Study
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 
A new image steganography algorithm based
A new image steganography algorithm basedA new image steganography algorithm based
A new image steganography algorithm based
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
Vol 1 No 1 - May 2013
Vol 1 No 1 - May 2013Vol 1 No 1 - May 2013
Vol 1 No 1 - May 2013
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
50120140501016
5012014050101650120140501016
50120140501016
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
 
An ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingAn ideal steganographic scheme in networks using
An ideal steganographic scheme in networks using
 

Similaire à AN ENHANCED CHAOTIC IMAGE ENCRYPTION

Three Dimensional Chaotic System for Color Image Scrambling Algorithm
Three Dimensional Chaotic System for Color Image Scrambling AlgorithmThree Dimensional Chaotic System for Color Image Scrambling Algorithm
Three Dimensional Chaotic System for Color Image Scrambling AlgorithmIJCSIS Research Publications
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...Editor IJMTER
 
Selective image encryption using
Selective image encryption usingSelective image encryption using
Selective image encryption usingcsandit
 
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHERSELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHERcscpconf
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplicationijcsit
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsTELKOMNIKA JOURNAL
 
An Uncompressed Image Encryption Algorithm Based on DNA Sequences
An Uncompressed Image Encryption Algorithm Based on DNA Sequences An Uncompressed Image Encryption Algorithm Based on DNA Sequences
An Uncompressed Image Encryption Algorithm Based on DNA Sequences cscpconf
 
Ax31139148
Ax31139148Ax31139148
Ax31139148IJMER
 
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...IJECEIAES
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature mapsAlexander Decker
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
 
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET Journal
 
Secure Image Transfer in The Domain Transform DFT
Secure Image Transfer in The Domain Transform DFTSecure Image Transfer in The Domain Transform DFT
Secure Image Transfer in The Domain Transform DFTijcisjournal
 

Similaire à AN ENHANCED CHAOTIC IMAGE ENCRYPTION (20)

Three Dimensional Chaotic System for Color Image Scrambling Algorithm
Three Dimensional Chaotic System for Color Image Scrambling AlgorithmThree Dimensional Chaotic System for Color Image Scrambling Algorithm
Three Dimensional Chaotic System for Color Image Scrambling Algorithm
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
 
Selective image encryption using
Selective image encryption usingSelective image encryption using
Selective image encryption using
 
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHERSELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systems
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
 
An Uncompressed Image Encryption Algorithm Based on DNA Sequences
An Uncompressed Image Encryption Algorithm Based on DNA Sequences An Uncompressed Image Encryption Algorithm Based on DNA Sequences
An Uncompressed Image Encryption Algorithm Based on DNA Sequences
 
Ax31139148
Ax31139148Ax31139148
Ax31139148
 
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
 
T01022103108
T01022103108T01022103108
T01022103108
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
 
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Secure Image Transfer in The Domain Transform DFT
Secure Image Transfer in The Domain Transform DFTSecure Image Transfer in The Domain Transform DFT
Secure Image Transfer in The Domain Transform DFT
 

Dernier

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 

Dernier (20)

Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 

AN ENHANCED CHAOTIC IMAGE ENCRYPTION

  • 1. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.1, No.5, December 2011 DOI : 10.5121/ijcseit.2011.1507 77 AN ENHANCED CHAOTIC IMAGE ENCRYPTION Mintu Philip Department of Computer Engineering, Rajagiri School of Engineering and Technology mintu.philip@gmail.com ABSTRACT The paper proposes a new image encryption scheme based on chaotic encryption. It provides a fast encryption algorithm based on coupled chaotic map. The image is encrypted using a pseudorandom key stream generator. The image is partially encrypted by selecting most important components of image. To obtain most important components of an image, discrete wavelet transform is applied. KEYWORDS Chaos Theory, wavelet, logistic map,, image encryption. 1. INTRODUCTION Chaos theory has been established since 1970s. The distinct properties of chaos, such as ergodicity, quasi-randomness, sensitivity dependence on initial conditions and system parameters, have granted chaotic dynamics as a promising alternative for the conventional cryptographic algorithms. A new way of image encryption scheme has been proposed which utilizes a chaos-based cryptographic scheme using the logistic map. A combined image compression and encryption scheme is proposed. The model is achieved by using discrete wavelet transform and RLE for compression. Chaos based system is used for encryption. This algorithm encrypts image pixel by pixel taking consideration the values of previously encrypted pixels. This system is robust against cryptanalytic attacks. Also a simple implementation of image encryption achieves high encryption rate on general purpose computer. In mobile bandwidth constraints and power saving are needed for which the proposed algorithm is suitable. 2. PROPOSED IMAGE ENCRYPTION ALGORITHM The image is encrypted pixel by pixel using logistic maps. The advantage of logistic map is that it has a very complex dynamics. Use of two logistic map increases the complexity of algorithm. Only the first few coefficients are encrypted since energy is concentrated in these values. This will save the execution time. The algorithm uses a coupled logistic map. It has a pseudorandom key stream generator that generates a binary stream which used in chaotic encryption. The first logistic map whose initial parameters are taken from the KEY generated during user authentication process provides the initial parameters for second logistic map. Following are the logistic maps:
  • 2. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.1, No.5, December 2011 78 (3) (4) The steps involved in pseudorandom key stream generator are: 1. (5) (6) 2. Convert real number to binary equivalent . 3. Divide into three parts and XOR the three parts to obtain . 4. Perform above steps for value of ‘i’ starting from 1 to n. 5. Convert to real value . 6. The value is given as initial value µ2 to second logistic map. 7. Above steps are repeated for second logistic map. 8. The final value is multiplied by and is converted to binary, stored in s1. 9. Multiply the value of µ2 by and convert to binary and store in s2. 10. Take first 56 bits of s1 and 5th to 15th bits of s2 and combine it to form the key to encrypt. 11. Perform XOR operation of pixels with the key to obtain the cipher. 12. At receiver side perform XOR of cipher with the key to decrypt data. 13. Decompress the data using inverse DWT to obtain the pixels of the image. 14. Write the pixels to a new image file. The binary sequence generated by pseudorandom key stream generator is XORed with the pixel values of the image to obtain the cipher image. 3. STATISTICAL ANALYSIS The encrypted images should possess certain random properties in order to resist the statistical attack. Statistical analysis is done by calculating the histograms, the correlations of two adjacent pixels in the encrypted images and the correlation coefficient for several images and its corresponding encrypted images of an image database. A detail study has been undergone and the results are summarized as followings. Different images have been tested, and similar results are obtained. However, due to the page limit, only the results for the Lena. The advantage of partial encryption is that only very few coefficients are encrypted so that encryption time is reduced. This is helpful in mobile application where bandwidth and power is constrained. It also helps to increase the security of image since the intruder does not know which all coefficients are encrypted. 3.1. Difference between the original and the permuted images NPCR (Number of Pixels Change Rate) is used to test the difference between the original image P1 and the permuted one C1. NPCR stands for the number of pixel change rate. Then, if D is a matrix with the same size as images P1 and C1, D (i,j)is determined as follows: (7)
  • 3. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.1, No.5, December 2011 79 NPCR is defined by the following formula: (8) The NPCR of the new system is found to be 99.42. 3.2. Correlation coefficients of intra and inter - color –components To quantify the dependence between two images, Pearson’s correlation coefficient is commonly used. Given by equation, this coefficient is obtained by dividing the covariance between the two images (eq. 13) by the product of their standard deviations (eq. 12 and eq. 11). E in eq.11 is the expected value operator. P1 (i, j) and C1 (i, j) are respectively the pixels gray values of the first and the second images. (9) (10) (11) Following results for found for various standard images: Image Correlation coefficient Lena 0.00099 Pepper 0.002 Cameraman 0.0017 Table 1: correlation coefficient of encrypted image. 3.3. Distribution of two adjacent pixels Statistical analysis on large amounts of images shows that on average, 8 to 16 adjacent pixels are correlated.In this section, some simulations are carried out to test the correlation distribution between two horizontally, vertically and diagonally adjacent pixels, in the original and permuted images. Fig. 5 shows the correlation distribution of two horizontally, vertically and diagonally adjacent pixels in the first component of the original image and the encrypted images. Then, we plot the pixel value on location (x,y+1) over the pixel value on location (x, y), location (x+1,y) over the pixel value on location (x, y) and location (x+1,y+1) over the pixel value on location (x, y).
  • 4. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.1, No.5, December 2011 80 (a) (b) ` (c) Fig 1: (a) horizontal, (b) vertical and (c) diagonal correlation matrix of original image (a) (b) (c) Fig 2: (a) horizontal, (b) vertical and (c) diagonal correlation matrix of encrypted image It is clear from Fig 2 that there is negligible correlation between the two adjacent pixels in the encrypted image.
  • 5. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.1, No.5, December 2011 81 3.4. Histogram analysis An image-histogram illustrates how pixels in an image are distributed by graphing the number of pixels at each color intensity level. We have calculated and analyzed the histograms of the encrypted image as well as the original colored image. As we can see, the histogram of the encrypted image is significantly different from that of the original image. Also the histogram of complete and partially encrypted image are same. Moreover, one can observe that the coupled map improves the uniformity of the histogram for encryption method. (a) (b) (c) Fig3: Histogram of (a) original image and (b) encrypted image and (c) partially encrypted image 3.5. Information Entropy analysis Entropy is a statistical measure of randomness that can be used to characterize the texture of an image. It is well known that the entropy H(m) of a message source m can be calculated as : (12) Where p(mi) represents the probability of message mi.
  • 6. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.1, No.5, December 2011 82 When an image is encrypted, its entropy should ideally be 8. If it is less than this value, there exists a certain degree of predictability which threatens its security. The entropy of partially and complete encrypted images are found to be different by 0.2%. Image Entropy(original) Entropy(Encrypted) Lena 6.95 7.7719 Pepper 6.775 7.7 Cameraman 6.775 7.762 Table 2: Information Entropy The obtained results are very close to the theoretical value. This means that information leakage in the encryption process is negligible. 3. CONCLUSIONS The proposed algorithm was found to be very fast and secured which can be applied for real time applications which have bandwidth and power constraints. This is because it requires less time to encrypt and decrypt image since they are partially encrypted. This will also help to improve security since the intruder does not know which all coefficients are partially encrypted. Application of chaos theory helps to achieve complex dynamics. The encryption scheme can be extended to videos. REFERENCES [1] Y.B. Mao, G. Chen, S.G. Lian, “A novel fast image Encryption scheme based on the 3D chaotic baker map,” Int. J. Bifurcate Chaos, vol. 14, pp. 3613–3624, 2004. [2] H. Gao, Y. Zhang, S. Liang, and D. Li, “A new chaotic algorithm for image encryption,” Chaos, Solutions &Fractals, vol. 29, no. 2, pp. 393–399, 2006. [3] Su Su Maung, and Myitnt Myint Sein, “A Fast Encryption Scheme Based on Chaotic Maps”, GMSARN International Conference on Sustainable Development: Issues and Prospects for the GMS, 2008. [4] Musheer Ahmad and M. Shamsher Alam, “A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping”, Musheer Ahmad et al /International Journal on Computer Science and Engineering, Vol.2(1), 2009, 46-50. [5] Fengjian Wang, Yongping Zhang and Tianjie Cao “Research of chaotic block cipher algorithm based on Logistic map”, 2009 Second International Conference on Intelligent Computation Technology and Automation, 2009: 678 – 681. [6] Jui-Cheng Yen, and Jiun-In Guo, “A New Chaotic Key-Based Design for Image Encryption and Decryption”, IEEE International Symposium on ISCAS 2000, Geneva, pp. IV-49-IV-52, May. 2000. [7] Po-Han Lee,Soo-Chang Pei and Yih-Yuh Chen, “Generating Chaotic Stream Ciphers Using Chaotic Systems”, Chinese Journal Of Physics Vol. 41 , No. 6, 2003. [8] Socek, D., Shujun Li, Magliveras, S.S. and Furht, B, “Short Paper: Enhanced 1-D Chaotic Key- Based Algorithm for Image Encryption”, First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005:406-407.
  • 7. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.1, No.5, December 2011 83 [9] Deergha Rao and K. Gangadhar, “Modified Chaotic Key-Based Algorithm for Image Encryption and Its VLSI Realization”, International Conference on Digital Signal Processing, 2007. [10] H.E.H. Ahmed, H.M. Kalash, and O.S.F. Allah, “An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption", presented at Informatica (Slovenia), 2007, pp.121-129. [11] Shubo Liu, Jing Sun, Zhengquan Xu “An Improved Image Encryption Algorithm based on Chaotic System”, journal of computers, vol. 4, no. 11, 2009, pp.1091-1100. [12] Abir Awad, Abdelhakim Saadane, “Efficient Chaotic Permutations for Image Encryption Algorithms”, Proceedings of the World Congress on Engineering Vol I, 2010. [13] Ai-hongZhu, Lia Li, “Improving for Chaotic Image Encryption Algorithm Based on Logistic Map”, 2nd Conference on Environmental Science and Information Application Technology, 2010. [14] G. Chen, Y. Mao, C.K. Chui, “A symmetric image encryption based on 3D chaotic maps”, Chaos Solutions Fractals, vol. 21, pp. 749–761, 2004. [15] S. E. Borujeni, M. Eshghi1, “Chaotic Image Encryption Design Using Tompkins-Paige Algorithm”, Hindawi Publishing Corporation, Mathematical Problems in Engineering, Article ID 762652, 22 pages, 2009. [16] Mazleena Salleh, Subariah Ibrahim, Ismail Fauzi Isnin, “Image encryption algorithm based on chaotic mapping”, Journal Teknologi, 2003, pp: 1–12. [17] Shubo Liu, Jing Sun, Zhengquan Xu, “An Improved Image Encryption Algorithm based on chaotic system”, Journal of Computers, vol. 4, no. 11, November 2009, pp: 1091-1100. [18] Noura, H. El Assad, S. Vladeanu, C, “Design of a fast and robust chaos-based crypto-system for image encryption”, 8th International Conference on Communications (COMM), 2010, pp: 423 – 426. Author Mintu Philip is currently working as a faculty in Department of Computer Science at Rajagiri School of Engineering and Technology. She received B.Tech degree in Computer Science from Rajagiri School of Engineering and Technology, Kerala on April 2008. She completed M.tech in Computer Science with Specialization in Data Security under CUSAT, Kerala on 2011.