0% found this document useful (0 votes)
31 views9 pages

Chapter 1

The document introduces an image encryption scheme using chaotic maps. It discusses how chaotic maps can be used to generate pseudorandom numbers for encryption keys due to their properties of unpredictability and sensitivity. The encryption process typically involves pixel substitution and permutation. The proposed system uses a combination of 3D logistic maps to generate a key matrix for a substitution-permutation network on the input image. This provides high security against various attacks. The scope of the project is to develop an encryption algorithm that can encrypt images without data loss and withstand brute force and statistical attacks by generating a secure 3D logistic key.

Uploaded by

sajalkumar1904
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views9 pages

Chapter 1

The document introduces an image encryption scheme using chaotic maps. It discusses how chaotic maps can be used to generate pseudorandom numbers for encryption keys due to their properties of unpredictability and sensitivity. The encryption process typically involves pixel substitution and permutation. The proposed system uses a combination of 3D logistic maps to generate a key matrix for a substitution-permutation network on the input image. This provides high security against various attacks. The scope of the project is to develop an encryption algorithm that can encrypt images without data loss and withstand brute force and statistical attacks by generating a secure 3D logistic key.

Uploaded by

sajalkumar1904
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

CHAPTER 1

INTRODUCTION

Image encryption is an essential technique for protecting sensitive data from unauthorized
access, especially in the digital era where images are widely shared and stored in various
media. Various encryption techniques have been proposed for securing images, including
symmetric and asymmetric encryption, steganography, and watermarking. However, most of
these methods suffer from security vulnerabilities and computational complexity, making
them unsuitable for practical applications.

Fig 1.1: Image Encryption

Chaotic maps have been recognized as a promising method for image encryption due to their
inherent properties of unpredictability, sensitivity to initial conditions, and pseudo-
randomness. Chaotic maps generate a sequence of seemingly random numbers that can be
used as encryption keys. The encryption process based on chaotic maps typically involves
two phases: a substitution phase and a permutation phase. In the substitution phase, the pixels
of the image are replaced with pseudo-random numbers generated by the chaotic map. In the
permutation phase, the positions of the pixels are shuffled to increase the randomness of the
cipher image.

1
Fig 1.2: Image Decryption

In this paper, we propose a novel image encryption scheme using chaotic maps that employs
a combination of the chaotic logistic map. The proposed scheme utilizes a key matrix
generated by the two chaotic maps to perform a substitution-permutation network on the
input image. The substitution-permutation network involves a series of bitwise operations,
such as XOR and modulo, to scramble the pixel values and their positions. The resulting
cipher image is highly resistant to various attacks, such as brute force, statistical, and
differential attacks.

1.1 SYSTEM ANALYSIS

System analysis for image encryption using chaotic maps involves assessing the
effectiveness, security, and performance of the encryption scheme. It typically includes the
following components:

 Evaluate the characteristics and properties of the chaotic maps used for encryption.
Important factors to consider include the strength of chaos, sensitivity to initial
conditions, ergodicity, and statistical properties.

 Understand the encryption algorithm based on chaotic maps. It should involve a


combination of chaos-based transformations, such as permutation and substitution, to
ensure a high level of confusion and diffusion. Analyze the algorithm's complexity
and computational requirements.

2
 Assess the security of the image encryption system against various attacks, including
statistical attacks, differential attacks, and brute-force attacks. Analyze the key space,
key sensitivity, and resistance to known-plaintext and chosen-plaintext attacks.
Consider factors such as key management, key distribution, and entropy.

 Evaluate the encryption speed and computational efficiency of the system. Measure
the encryption and decryption time for different image sizes and assess the impact on
system performance. Consider the feasibility of real-time encryption for practical
applications.

 Analyze the impact of encryption on image quality. Evaluate the encryption scheme's
ability to preserve essential image features, such as edges, textures, and colors. Assess
the image quality degradation and possible artifacts introduced by the encryption
process.

 Test the resilience of the encryption scheme against various image processing
operations, such as compression, noise addition, cropping, and rotation. Evaluate the
ability of the encryption system to maintain the confidentiality and integrity of the
encrypted image under different scenarios.

 Study the sensitivity of the encryption algorithm to changes in the encryption key.
Assess the impact of key modifications on the decrypted image quality and security.
Evaluate the algorithm's resistance to key-related attacks, such as key guessing and
key space exploration.

 Evaluate the scalability and practicality of the encryption system for real-world
applications. Consider factors such as memory requirements, hardware
implementation feasibility, and integration with existing systems.

System analysis for image encryption using chaotic maps involves a thorough evaluation of
security, performance, and practical aspects to ensure a robust and efficient encryption
solution.

3
1.2 EXISTING SYSTEM

There are several existing systems for image encryption that utilize chaotic maps. Chaotic
maps are mathematical models that exhibit sensitive dependence on initial conditions, making
them useful for generating pseudo-random sequences. These sequences can be used to
encrypt and decrypt images. Here are a few examples of image encryption systems that
incorporate chaotic maps:

 Logistic Map-based Encryption: The logistic map is a well-known chaotic map that
can be used for image encryption. In this approach, the logistic map generates a
chaotic sequence of values, which are used to modify the pixel values of the image.
The chaotic sequence serves as the encryption key, and the modified image can only
be decrypted with the same chaotic sequence.

 Arnold Transform-based Encryption: The Arnold transform is a permutation-based


method that shuffles the positions of pixels in an image. By iterating the Arnold
transform multiple times, a chaotic behavior can be achieved. This transform can be
combined with other encryption techniques, such as substitution or diffusion, to
enhance the security of the encrypted image.

 Lorenz System-based Encryption: The Lorenz system is a set of differential equations


that exhibit chaotic behavior. This system can be utilized for image encryption by
generating chaotic sequences based on the solutions of the Lorenz equations. These
sequences can then be used for encryption operations, such as XORing or permutation
of the image pixels.

 Henon Map-based Encryption: The Henon map is a two-dimensional discrete-time


dynamical system that can be employed for image encryption. The chaotic sequences
generated by the Henon map can be used to scramble the pixel positions or modify the
pixel values of the image, providing encryption and security.

4
1.3 PROPOSED SYSTEM

A proposed system for image encryption using 3D logistic maps can be designed as follows:

1. Key Generation:

- Select initial values (x₀, y₀, z₀) for the 3D logistic maps.
- Define the parameters (a, b, c) for each logistic map. These parameters determine the
behavior of the chaotic sequences generated by the maps.
- Iterate the 3D logistic maps to generate a sufficient number of chaotic sequences. The
number of iterations depends on the desired length of the encryption key.

2. Image Encryption:

- Convert the image into a 3D matrix representation, where each pixel value corresponds
to a point in 3D space.
- For each pixel in the image matrix, perform the following steps:
- Apply the chaotic sequences generated by the 3D logistic maps as encryption keys.
- Perform XOR operation between the pixel value and the corresponding chaotic key
value.
- Update the pixel value in the image matrix with the result of the XOR operation.

3. Image Decryption:

- Repeating the same process as the encryption phase, use the same chaotic sequences
generated by the 3D logistic maps as decryption keys.
- Apply XOR operation between the encrypted pixel value and the corresponding chaotic
key value.
- Update the pixel value in the decrypted image matrix with the result of the XOR
operation.

4. Additional Security Measures:


5
- We have consider incorporating other encryption techniques, such as permutation or
diffusion, along with the 3D logistic maps for enhanced security of our System.

Fig 1.3: Flow chart of Encryption Algorithm

Fig 1.4: Flow chart of Decryption Algorithm

6
1.4 PROJECT SCOPE

The cardinal objective of this project is to develop a state of the art Encryption and
Decryption algorithm to encrypt and decrypt images without losing its original data and
specifications. The other objective of this project to generate a 3D logistic key which can
withstand any type brute force, statistical, and differential attacks. The project scope is
defined within the available resources and timeframe to ensure that the objectives are
achievable. In case of our project first we have went through the old research paper to gather
relevant information regarding our project then we decide on which algorithm we should
work. After that comes the implementation phase in which we implement and develop our
prototype of the system after the succesfull run of our model. Than comes the final phase in
which document the project design, implementation details, and algorithms used. Prepare a
report summarizing the research, methodology, results, and conclusions.

1.5 OVERVIEW

The project is used to perform Image Encryption and Decryption using three dimensional
logistic maps.

The major steps involved in the process of Encryption of image are:

(i) Loading the image


(ii) Generate a 3D key
(iii) Scramble the image
(iv) Encrypt the image using 3D key

The major steps involved in the process of Decryption of image are:

(i) Loading the cipher image


(ii) Load the 3D key
(iii) Decrypt the image using 3D key
(iv) Descramble the image
(v)
The result of these steps is a encrypt and the decrypt images.

7
1.6 OBJECTIVES

To implementing the optimal 3 way of doing image encryption.

● To effectively use the 3D logistic map key(chaotic maps).

● To develop an efficient algorithm that can encrypt any image such as colored
and grayscale images. .

● To encrypt an image which is highly resistant to various attacks, such as brute


force, statistical, and differential attacks.

● To show that the encrypt image are way different than the original image.

1.7 REQUIREMENTS

1.7.1 HARDWARE REQUIREMENT

LAPTOP/PC-64 bit A Keyboard , A Mouse.

1.7.2 SOFTWARE REQUIREMENT

● Python

● Jupyter Notebook

1.7.3 FUNCTIONAL REQUIREMENTS

● The functionality of this project is to encrypt of an image.

● This will provide a solid cryptographic key.

● It also analyze the encrypted image over original image.

● The NCPR and UACI will prove that this project has a good encryption
algorithm that can withstand differential and statistical attacks.

8
1.7.4 NON FUNCTIONAL REQUIREMENTS

Security: The project is programmed using the programming language Python and
python is secure because python provides the best security in comparison to other
programming languages.

Availability: This software is written in the python language so it is easily available


because python is platform independent language.

Performance: the performance of the software is very good because in this software
we can easily add and remove our daily expenses .We can easily keep the record and
when we need these records then we can easily find it by date and category wise.

Portability: Python is a platform independent language that’s why it is portable


easily.

1.8 ADVANTAGE

● Easy to use

 High efficient encryption key

 Original and Decrypted image are similar

● Cost effective

You might also like