Chapter 1
Chapter 1
INTRODUCTION
Image encryption is an essential technique for protecting sensitive data from unauthorized
access, especially in the digital era where images are widely shared and stored in various
media. Various encryption techniques have been proposed for securing images, including
symmetric and asymmetric encryption, steganography, and watermarking. However, most of
these methods suffer from security vulnerabilities and computational complexity, making
them unsuitable for practical applications.
Chaotic maps have been recognized as a promising method for image encryption due to their
inherent properties of unpredictability, sensitivity to initial conditions, and pseudo-
randomness. Chaotic maps generate a sequence of seemingly random numbers that can be
used as encryption keys. The encryption process based on chaotic maps typically involves
two phases: a substitution phase and a permutation phase. In the substitution phase, the pixels
of the image are replaced with pseudo-random numbers generated by the chaotic map. In the
permutation phase, the positions of the pixels are shuffled to increase the randomness of the
cipher image.
1
Fig 1.2: Image Decryption
In this paper, we propose a novel image encryption scheme using chaotic maps that employs
a combination of the chaotic logistic map. The proposed scheme utilizes a key matrix
generated by the two chaotic maps to perform a substitution-permutation network on the
input image. The substitution-permutation network involves a series of bitwise operations,
such as XOR and modulo, to scramble the pixel values and their positions. The resulting
cipher image is highly resistant to various attacks, such as brute force, statistical, and
differential attacks.
System analysis for image encryption using chaotic maps involves assessing the
effectiveness, security, and performance of the encryption scheme. It typically includes the
following components:
Evaluate the characteristics and properties of the chaotic maps used for encryption.
Important factors to consider include the strength of chaos, sensitivity to initial
conditions, ergodicity, and statistical properties.
2
Assess the security of the image encryption system against various attacks, including
statistical attacks, differential attacks, and brute-force attacks. Analyze the key space,
key sensitivity, and resistance to known-plaintext and chosen-plaintext attacks.
Consider factors such as key management, key distribution, and entropy.
Evaluate the encryption speed and computational efficiency of the system. Measure
the encryption and decryption time for different image sizes and assess the impact on
system performance. Consider the feasibility of real-time encryption for practical
applications.
Analyze the impact of encryption on image quality. Evaluate the encryption scheme's
ability to preserve essential image features, such as edges, textures, and colors. Assess
the image quality degradation and possible artifacts introduced by the encryption
process.
Test the resilience of the encryption scheme against various image processing
operations, such as compression, noise addition, cropping, and rotation. Evaluate the
ability of the encryption system to maintain the confidentiality and integrity of the
encrypted image under different scenarios.
Study the sensitivity of the encryption algorithm to changes in the encryption key.
Assess the impact of key modifications on the decrypted image quality and security.
Evaluate the algorithm's resistance to key-related attacks, such as key guessing and
key space exploration.
Evaluate the scalability and practicality of the encryption system for real-world
applications. Consider factors such as memory requirements, hardware
implementation feasibility, and integration with existing systems.
System analysis for image encryption using chaotic maps involves a thorough evaluation of
security, performance, and practical aspects to ensure a robust and efficient encryption
solution.
3
1.2 EXISTING SYSTEM
There are several existing systems for image encryption that utilize chaotic maps. Chaotic
maps are mathematical models that exhibit sensitive dependence on initial conditions, making
them useful for generating pseudo-random sequences. These sequences can be used to
encrypt and decrypt images. Here are a few examples of image encryption systems that
incorporate chaotic maps:
Logistic Map-based Encryption: The logistic map is a well-known chaotic map that
can be used for image encryption. In this approach, the logistic map generates a
chaotic sequence of values, which are used to modify the pixel values of the image.
The chaotic sequence serves as the encryption key, and the modified image can only
be decrypted with the same chaotic sequence.
4
1.3 PROPOSED SYSTEM
A proposed system for image encryption using 3D logistic maps can be designed as follows:
1. Key Generation:
- Select initial values (x₀, y₀, z₀) for the 3D logistic maps.
- Define the parameters (a, b, c) for each logistic map. These parameters determine the
behavior of the chaotic sequences generated by the maps.
- Iterate the 3D logistic maps to generate a sufficient number of chaotic sequences. The
number of iterations depends on the desired length of the encryption key.
2. Image Encryption:
- Convert the image into a 3D matrix representation, where each pixel value corresponds
to a point in 3D space.
- For each pixel in the image matrix, perform the following steps:
- Apply the chaotic sequences generated by the 3D logistic maps as encryption keys.
- Perform XOR operation between the pixel value and the corresponding chaotic key
value.
- Update the pixel value in the image matrix with the result of the XOR operation.
3. Image Decryption:
- Repeating the same process as the encryption phase, use the same chaotic sequences
generated by the 3D logistic maps as decryption keys.
- Apply XOR operation between the encrypted pixel value and the corresponding chaotic
key value.
- Update the pixel value in the decrypted image matrix with the result of the XOR
operation.
6
1.4 PROJECT SCOPE
The cardinal objective of this project is to develop a state of the art Encryption and
Decryption algorithm to encrypt and decrypt images without losing its original data and
specifications. The other objective of this project to generate a 3D logistic key which can
withstand any type brute force, statistical, and differential attacks. The project scope is
defined within the available resources and timeframe to ensure that the objectives are
achievable. In case of our project first we have went through the old research paper to gather
relevant information regarding our project then we decide on which algorithm we should
work. After that comes the implementation phase in which we implement and develop our
prototype of the system after the succesfull run of our model. Than comes the final phase in
which document the project design, implementation details, and algorithms used. Prepare a
report summarizing the research, methodology, results, and conclusions.
1.5 OVERVIEW
The project is used to perform Image Encryption and Decryption using three dimensional
logistic maps.
7
1.6 OBJECTIVES
● To develop an efficient algorithm that can encrypt any image such as colored
and grayscale images. .
● To show that the encrypt image are way different than the original image.
1.7 REQUIREMENTS
● Python
● Jupyter Notebook
● The NCPR and UACI will prove that this project has a good encryption
algorithm that can withstand differential and statistical attacks.
8
1.7.4 NON FUNCTIONAL REQUIREMENTS
Security: The project is programmed using the programming language Python and
python is secure because python provides the best security in comparison to other
programming languages.
Performance: the performance of the software is very good because in this software
we can easily add and remove our daily expenses .We can easily keep the record and
when we need these records then we can easily find it by date and category wise.
1.8 ADVANTAGE
● Easy to use
● Cost effective