0% found this document useful (0 votes)
4 views2 pages

Abstract Semi

This document presents a chaotic image encryption scheme based on the Logistic Map, addressing the challenges of encrypting multimedia data, particularly images. The algorithm operates in two phases: pixel shuffling to disrupt correlations and pixel value transformation for enhanced security, ensuring that even minor changes lead to significantly different encrypted images. The proposed method is efficient and suitable for real-time applications, contributing to the field of chaotic encryption.

Uploaded by

21ec310
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views2 pages

Abstract Semi

This document presents a chaotic image encryption scheme based on the Logistic Map, addressing the challenges of encrypting multimedia data, particularly images. The algorithm operates in two phases: pixel shuffling to disrupt correlations and pixel value transformation for enhanced security, ensuring that even minor changes lead to significantly different encrypted images. The proposed method is efficient and suitable for real-time applications, contributing to the field of chaotic encryption.

Uploaded by

21ec310
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
You are on page 1/ 2

Chaotic Image Encryption Using Logistic Map

Department of Electronics and Communication Engneering ,Muthoot Institute of Technology and


Science

ABSTRACT
In the rapidly advancing digital era, ensuring the security of multimedia data, particularly
images, has become a paramount concern. Traditional encryption algorithms like AES and DES,
while effective for textual data, often struggle to efficiently handle the unique characteristics of
image data, such as large size and strong pixel correlations. Chaotic systems, known for their
sensitivity to initial conditions, randomness, and complex dynamical behavior, present a
promising alternative for image encryption. This paper explores a chaotic image encryption
scheme based on the Logistic Map, a simple yet powerful chaotic system that exhibits complex
behavior with slight variations in its parameters.

The proposed Logistic Map-based chaotic image encryption algorithm operates in two primary
phases: pixel shuffling and pixel value transformation. The first phase employs the Logistic Map
to generate a pseudo-random sequence that dictates a new arrangement of the pixels within the
image. This shuffling phase is designed to break the strong correlations inherent in natural
images, ensuring that adjacent pixels in the original image no longer have a predictable
relationship in the encrypted image. This disruption of pixel order significantly enhances the
confusion aspect of the encryption, making it difficult for attackers to deduce the structure of the
original image.

Following the shuffling process, the second phase introduces diffusion through pixel value
modification. Here, the Logistic Map is again utilized to produce a chaotic key stream that is
XORed with the pixel values of the shuffled image. This operation ensures that even minor
changes in the original image or the encryption key result in drastically different encrypted
images, thus strengthening the overall security of the system. The chaotic nature of the Logistic
Map ensures that the encryption process is highly sensitive to initial conditions, making it
computationally infeasible for attackers to reverse-engineer the encryption without the correct
key.

In conclusion, the Logistic Map-based chaotic image encryption scheme offers a robust, efficient, and
lightweight solution for securing digital images. Its ability to provide strong encryption while maintaining
computational efficiency makes it well-suited for real-time applications and resource-constrained
environments. This work contributes to the growing field of chaotic encryption by demonstrating the
potential of simple chaotic maps, such as the Logistic Map, to achieve high levels of security in image
encryption.

Keywords:Chaotic Encryption ; Logistic Map ; Pixel Shuffling ; Pixel Value Transformation

Name and Signature of student:Basil Biju


Approved by guide:Name and Signature of guide:Dr.Abhilash Antony

Approved by coguide::Name and Signature of guide:Ms.Divya RS

You might also like