SlideShare a Scribd company logo
Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications
14
A New Approach of Colour Image Encryption Based on Henon
like Chaotic Map
Ramesh Kumar yadava#
, Dr. B. K.singh*, S.K.sinha*, K. K.pandey*
, #
#
Department of computer science and engineering, AISECT University BHOPAL
1
mailramesh28@gmail.com
3
third.author@first-third.edu
*
AISECT UNIVERSITY
Mendua, Bhojpur Raisen Bhopal INDIA
2
skrishna24it@gmail.com
Abstract
In modern era of digital world, exchange of information in form of image often very frequently over
communication channel, the secrecy of multimedia data like images becomes very important, The issue of
secrecy for image resolved In many digital applications such as sensitive visual aids, broadcasting, military
services, rare satellites images and confidential medical images etc. To reduce the processing overhead with the
concern of Real-time data transmission application, to reduce such a huge file processing cost, we needs to
enhance our encryption/decryption techniques. This paper proposed a novel image encryption technique based
on Hannon like chaotic map. Chaos-based image encryption technique is one of the more promising encryption
algorithms that provide very efficient and fast way of image encryption due to its ubiquitous phenomenon in
deterministic nonlinear systems that exhibit extreme sensitivity to initial condition and random like behaviours.
Keywords— Image RGB colour component, image encryption, Henon map, chaotic system.
I. INTRODUCTION
Encryption is a common technique to uphold multimedia image security in storage and transmission over the
network due to some inherent features of image like high data redundancy and bulk data capacity. The
encryption of image differs from that of text. With the development of multimedia technology the transmission
of information as image and video is extensively used in real time data transmission. The digital image is widely
used in our lives to resolve in many applications such as Geoinformation system, military image database,
medical imaging system etc. for secure transmission of data, there is prime concern to provide security to these
multimedia data, resulting in encryption of data. Most of conventional algorithm does not have the efficient
capability for securing multimedia data containing image due to the complexity of algorithm and perfect
correlation between pixel values of image. Several reviews has been proposed on multimedia data protection
such as information hiding which include steganography, anonymity, watermarking. The other is encryption
which includes conventional encryption technique. Last some decade relatively new approach has been
extensively used, namely chaos based selective image encryption which provides relatively sufficient security
and confidentiality. A symmetric block encryption algorithm creates a chaotic map used for permuting and
diffusing multimedia image data. In permutation the pixel of image are replaced by another value and in the
process of diffusion the pixel values are shuffled within the image. This paper proposed a colour image
encryption technique which is very simple in implementation with high level of efficiency, which is based on
Henon chaotic system. Henon map is a discrete time dynamic system which exhibit chaotic behaviour which we
used to produce a uniform distribution of pixels of image. In proposed method we take a bit stream of RGB
component of colour image which is the input for the Encryption algorithm. The rest or this paper is organized as
follows. Section 2 describes the feature of chaos. Section 3 explains Henon map and its implementation. Section
4 present Encryption and decryption algorithm. Section 5 describes the experimental result to show the proof of
robust algorithm. Section 6 shows the simulation analysis of security through Mat Lab. Section 7 concludes the
paper.
II. FEATURE OF CHAOS
Chaos is a ubiquitous phenomenon existing in deterministic nonlinear systems that exhibit sensitivity to initial
conditio and have random like behaviour. Mathematically one dimensional chaos map can be represented as:
Xp+1 = f (Xp), f: I → I, Xo ε I,
Where f is a continuous map on the interval I = [0, 1].
With the following propriety:
1. Sensitive to initial condition this sensitivity property is utilized for the keys of cryptosystems..
Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications
15
2. Topological transitivity which linked to the diffusion feature of cryptosystem.
3. Density of periodic points in I.
Above two properties often used to construct stream cipher and block cipher in chaotic cryptography. Because
the property of sensitivity of initial condition make the encryption very complicated. Sequence is also
sensitive to control parameter. For image encryption chaotic system can be represented by Fig 1. The initial
value of chaotic map takes the original image as input, sequence of bit provided by user mapped as control
parameter. Output chaotic sequence produces the cipher image.
Fig. 1. Basic architecture of chaotic map
Small change in input bit stream produce a huge change in output bit stream after multiple round. Slight change
of user key also produces totally different output sequence of bit stream.
III. HENON CHAOTIC MAP
The map was introduced by Michel Henon as a simplified model of the Poincare section of the Lorenz model.
For the canonical map, an initial point of the plane will either approach a set of points known as the Henon
strange attractor, or diverge to infinity. Two dimensional Henon map takes a point (Xn, Yn) in the plane and
maps it to a new point:
Xn+1 = Yn + 1 – aX
2
n
Yn+1 = bXn where a > 0 and |b| < 1, n = 0, 1, 2…
Henon Map depends on two parameter a and b. these parameter values determine the chaotic behaviour of map.
The
Most representative form of Henon map for canonical constant values a = 1.4 and b = 0.3 as we can see in Fig. 2.
In which The Henon map reflects as chaotic attractor. The propose colour image encryption is based on Henon
chaotic map, Henon like mapping used sin function which include a frequency control parameter w for
maintaining their chaotic behaviour . The Henon like mapping equation which used in our present image
encryption technique is a mathematical concept, where time dependency of any point determines by the fixed
prescribed rule in geometrical space. In our proposed encryption technique we used Henon like chaotic map
mathematically defined as
Xn+2 = 1 – aX
2
n+1 + bsin (wxn)
Which contain frequency control parameter w to control the Henon like chaotic signal. Encrypted Henon chaotic
signal looks like distortion to unauthorized users ignoring to decrypt it, due to some specific characteristic such
as nonperiodicity, ergodicity, randomicity.
Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications
16
Fig. 2. Chaotic nature of the Henon map
IV.ENCRYPTION AND DECRYPTION ALGORITHM
The proposed encryption algorithm is based on Henon like mapping. Our algorithm is based on fully layered
encryption technique to provide higher level of confidentiality. We used colour image for the encryption
process in our proposed technique we can also used same technique for Gray scale image. We perform the colour
transformation to separate the RGB colour in its component matrix. For Gray scale image there is no need of
colour transformation. Then we select any one of the component (RGB) matrix for encryption to reduce the
computational overhead. The encryption process perform in the study can be seen in Fig. 3.
(1) Encryption process:
Step 1. The Henon like chaotic system is converted in to one-dimensional chaotic map. One dimensional Henon
chaotic map mathematically is defined as:
Xn+2 = 1 - aX
2
n+1 + bsin (wxn)…………….(1)
Step 2. Transform the colour image in to its (RGB) 3 pieces of component matrix.
Step 3. One dimensional Henon chaotic map obtain in (1) takes R component of colour image to generate the
random bit stream.
Step 4. The bit vales obtained in previous step is bit XOR with the original pixel values of R component of
original transform matrix.
Step 5. The vector result of G and B component of transform colour image with the matrix after bit XOR
obtained from the previous stage produce the cipher image.
Deterministic behaviour of chaotic map able us to reproduce the original image by providing the secret key
component such as initial condition, system parameter, and number of iteration.
(2) Decryption process:
Step 1. The Henon like chaotic system is converted into one-dimensional chaotic map. One dimensional Henon
chaotic map mathematically defined as
Xn+2 = 1 – X
2
n+1 + b sin(wXn) which is same as during encryption process.
Step 2. Perform colour transformation so that the colour image component RGB has been separated as in
encryption process.
Step 3. Select the secret key and parameter as used in encryption with the Henon chaotic map function same as
(1). This process generates the transform matrix of pixel values of R component of image.
Step 4. The XOR operation is computed bit- by- bit between the transform matrix of pixel values of R
component of image and the bit values of the R component of cipher image as (2).
Step 5. Vector of the decryption result is returned as the value of RGB using the image transformation to
produce the original image.
Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications
17
Fig. 3. Encryption process
V. EXPERIMENTAL RESULT
The experimental analysis of proposed technique is based on Histogram analysis through Mat Lab. Histogram
analysis show the distribution of pixel values between plane image and cipher image, if Histogram of plane
image and cipher image has significant diversity then we can say cipher image does not give any clue to perform
brute force or cryptanalysis attack on the encryption algorithm. We take Lena plane image with the size 256*256
as shown in Fig 4. The histogram of this plane image is shown in Fig. 5. We use frequency parameter w and X0,
X1 as the keys. Using X0 = 0.011, X1 = 0.021 and w = 08071982, the encrypted image is shown in Fig. 6 and
corresponding histogram of encrypted image is shown Fig. 7. Chaos system is reversible in nature after
Decryption we get back the original Lena image as shown in Fig. 7. Proposed technique is based on single
channel encryption. We encrypt only R component of the plane image and leave other G and B component as
such after combining these component we get the cipher image. Fig. 7 shows the Histogram of ‘Original R
component and Fig. 8 shown the Histogram of corresponding encrypted R component.
Fig. 4. Original Plane Lena image
Plane
image
Transformasi
image
G
R
B
Chaosbased
encryption-n
G
R
B
BitXOR
G
R
B
Cipher
image
Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications
18
Fig. 5. Histogram of Plane Lena image
Fig. 6. Encrypted Lena Image
VI.SIMULATION ANALYSIS OF SECURITY
To determine the proposed technique is robust, we use to perform analysis and testing of the encryption
algorithm sues different parameter, like Histogram analysis is used to decide the colour distribution between the
plane image and cipher image. Both the Histogram gives the significant difference to decide the robustness of
encrypted algorithm.
Fig. 4. Represent the Histogram of original lena image and Fig. 5. Represent the histogram of corresponding
encrypted image. Both Histograms has significant difference which shows there is no possibility of brute-force
attack. Similarly from the Fig. and Fig. shows the Histogram of original R channel and encrypted R channel,
both the Histogram shows the significant amount of difference due to their pixel distribution. In our proposed
algorithm we used w and the initial value X0,X1 as a secret key. Henon like chaotic system is very sensitive to
initial condition and parameter. The experimental result demonstrates the encryption algorithm is very sensitive
to the secret key. In our experiment if we change the secret
Fig. 7. Decrypted Lena Image
Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications
19
Fig. 8. Histogram of original R component
Fig. 9. Histogram of Encrypted R component
Key X0 from X0= 0.001 to X0= 0.0000000001 the resultant encrypted image become entirely changed form
original image. We take the different value of secret key for calculating the correlation coefficient between plane
image and cipher image and also find the Entropy of encrypted image for different key value, and then we find
the average correlation coefficient 0.000014 and average entropy 7.85200. The average Calculation of
correlation and entropy determine the quality of encrypted image. The higher value of entropy and lower
correlation between pixel values of encrypted image determine the safe encryption algorithm. The average result
of correlation coefficient and Entropy shows the guarantees of security of proposed scheme under any
cryptanalysis.
VII. CONCLUSION
this paper proposed a new colour image encryption algorithm based on Henon like chaotic map. The encryption
process applied on any RGB channel. The selected channel goes through the one dimensional Henon like chaotic
map to produce the random bit stream. This random bit stream bit XOR with the original pixel value of selected
channel to produce the encrypted image. The proposed scheme has multi-dimensional large key space to resist
the all possible type of brut-force attack. Several Experiments were carried out with numerical analysis, to shows
the robustness of proposed scheme. In the future work we intend to make our system to achieve more flexible,
reliable and higher level of quality performance in real time system.
ACKNOWLEDGEMENT
The study taken up during perusing M.Tech (computer science & Engineering) in partially supported by IT
infrastructure development project, Department of Information Technology, Govt of India.
REFERENCES
1. Chen Wei-bin, Zhang Xin, Image Encryption Algorithm Based on Henon chaotic System, International
Conference on image Analysis and Signal Processing, 2009, pp. 94-97.
2. Li Chuanmu, Hong Lianxi, A New Image encryption scheme based on Hyper chaotic Sequence, IEEE
International Workshop on Ant counterfeiting, Security, Identification, IEEE 2007, pp. 237-240.
3. Long Min, Huang Lu, Design and Analysis of a novel Chaotic Image Encryption. International conference
on Computer Modeling and Simulation(ICCMS’ 10), Vol 1,2010.pp. 517-520.
4. S. Behnia, A. Akhshani, H. Mahmodi and A. Akhavan, A novel Algorithm for image Encryption based on
Mixture of Chaotic Maps, Chaos, Solutions and Fractals, Vol. 35, 2008, pp. 408-419.
Journal of Information Engineering and Applications www.iiste.org
ISSN 2224-5782 (print) ISSN 2225-0506 (online)
Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications
20
5. Kocarev L, Chaos-based Cryptography, a brief overview. IEEE Circ Syst2001,1.6-21.
6. D. Xiao, X. Liao and P. Wei, Analysis and Improvement of a Chaos-Based Image Encryption Algorithm,
“Chaos Solution & Fractials, Vol.pp.40,2007.
7. Y. Wanga, K.W. Wanga, X. F. Liao and G. R. Chen, A New Chaos-Based Fast Image Encryption
Algorithm, Applied Soft Computing, Vol. 11, No. 1, 2011, pp. 514-522.
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
CALL FOR PAPERS
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/Journals/
The IISTE editorial team promises to the review and publish all the qualified
submissions in a fast manner. All the journals articles are available online to the
readers all over the world without financial, legal, or technical barriers other than
those inseparable from gaining access to the internet itself. Printed version of the
journals is also available upon request of readers and authors.
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

More Related Content

PDF
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
PDF
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
PDF
Journal_ICACT
PDF
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
PDF
Chaos Image Encryption using Pixel shuffling
PDF
Encryption-Decryption RGB Color Image Using Matrix Multiplication
PDF
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
PDF
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
Journal_ICACT
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
Chaos Image Encryption using Pixel shuffling
Encryption-Decryption RGB Color Image Using Matrix Multiplication
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...

What's hot (18)

PDF
T01022103108
PPS
Visual Cryptography in Meaningful Shares
PDF
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
PDF
3 e.balamurugan 14-17
PDF
A robust combination of dwt and chaotic function for image watermarking
PDF
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
PDF
Cecimg an ste cryptographic approach for data security in image
PDF
11.secure compressed image transmission using self organizing feature maps
PDF
Image Steganography Techniques
PDF
A new partial image encryption method for document images using variance base...
PPTX
Visual Cryptography
PDF
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
PDF
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region
PDF
A Survey of Image Based Steganography
PDF
A Secure Color Image Steganography in Transform Domain
PDF
Kk3517971799
PDF
Visual cryptography scheme for color images
PDF
Ew4301904907
T01022103108
Visual Cryptography in Meaningful Shares
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
3 e.balamurugan 14-17
A robust combination of dwt and chaotic function for image watermarking
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Cecimg an ste cryptographic approach for data security in image
11.secure compressed image transmission using self organizing feature maps
Image Steganography Techniques
A new partial image encryption method for document images using variance base...
Visual Cryptography
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region
A Survey of Image Based Steganography
A Secure Color Image Steganography in Transform Domain
Kk3517971799
Visual cryptography scheme for color images
Ew4301904907
Ad

Viewers also liked (11)

PDF
Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...
PDF
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
PPT
DOCX
An encryption scheme using chaotic map and
PPT
P1151351311
PDF
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
PPT
Chaos Analysis
PPTX
Performance evluvation of chaotic encryption technique
PPTX
Image Encryption in java ppt.
PDF
Chaos Theory: An Introduction
PPTX
Image encryption and decryption
Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
An encryption scheme using chaotic map and
P1151351311
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
Chaos Analysis
Performance evluvation of chaotic encryption technique
Image Encryption in java ppt.
Chaos Theory: An Introduction
Image encryption and decryption
Ad

Similar to A new approach of colour image encryption based on henon like chaotic map (20)

PDF
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
PDF
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
PDF
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
PDF
IRJET- An Image Cryptography using Henon Map and Arnold Cat Map
PDF
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
PDF
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
PDF
A new block cipher for image encryption based on multi chaotic systems
PDF
Ijcatr04021016
PDF
Enhancement and Analysis of Chaotic Image Encryption Algorithms
PDF
Pg3426762678
PDF
A New Chaos Based Image Encryption and Decryption using a Hash Function
PDF
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
PDF
03. Swarm Key Optimization for Chaos Based Image Encryption.pdf
PDF
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
PDF
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
PDF
Color Image Encryption and Decryption Using Multiple Chaotic Maps
PDF
B070306010
PDF
Secure image hiding in speech signal by steganography-mining and encryption
PDF
Chaotic systems with pseudorandom number generate to protect the transmitted...
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IRJET- An Image Cryptography using Henon Map and Arnold Cat Map
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
IMAGE ENCRYPTION BASED ON DIFFUSION AND MULTIPLE CHAOTIC MAPS
A new block cipher for image encryption based on multi chaotic systems
Ijcatr04021016
Enhancement and Analysis of Chaotic Image Encryption Algorithms
Pg3426762678
A New Chaos Based Image Encryption and Decryption using a Hash Function
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
03. Swarm Key Optimization for Chaos Based Image Encryption.pdf
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
Color Image Encryption and Decryption Using Multiple Chaotic Maps
B070306010
Secure image hiding in speech signal by steganography-mining and encryption
Chaotic systems with pseudorandom number generate to protect the transmitted...

More from Alexander Decker (20)

PDF
Abnormalities of hormones and inflammatory cytokines in women affected with p...
PDF
A validation of the adverse childhood experiences scale in
PDF
A usability evaluation framework for b2 c e commerce websites
PDF
A universal model for managing the marketing executives in nigerian banks
PDF
A unique common fixed point theorems in generalized d
PDF
A trends of salmonella and antibiotic resistance
PDF
A transformational generative approach towards understanding al-istifham
PDF
A time series analysis of the determinants of savings in namibia
PDF
A therapy for physical and mental fitness of school children
PDF
A theory of efficiency for managing the marketing executives in nigerian banks
PDF
A systematic evaluation of link budget for
PDF
A synthetic review of contraceptive supplies in punjab
PDF
A synthesis of taylor’s and fayol’s management approaches for managing market...
PDF
A survey paper on sequence pattern mining with incremental
PDF
A survey on live virtual machine migrations and its techniques
PDF
A survey on data mining and analysis in hadoop and mongo db
PDF
A survey on challenges to the media cloud
PDF
A survey of provenance leveraged
PDF
A survey of private equity investments in kenya
PDF
A study to measures the financial health of
Abnormalities of hormones and inflammatory cytokines in women affected with p...
A validation of the adverse childhood experiences scale in
A usability evaluation framework for b2 c e commerce websites
A universal model for managing the marketing executives in nigerian banks
A unique common fixed point theorems in generalized d
A trends of salmonella and antibiotic resistance
A transformational generative approach towards understanding al-istifham
A time series analysis of the determinants of savings in namibia
A therapy for physical and mental fitness of school children
A theory of efficiency for managing the marketing executives in nigerian banks
A systematic evaluation of link budget for
A synthetic review of contraceptive supplies in punjab
A synthesis of taylor’s and fayol’s management approaches for managing market...
A survey paper on sequence pattern mining with incremental
A survey on live virtual machine migrations and its techniques
A survey on data mining and analysis in hadoop and mongo db
A survey on challenges to the media cloud
A survey of provenance leveraged
A survey of private equity investments in kenya
A study to measures the financial health of

Recently uploaded (20)

PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Approach and Philosophy of On baking technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Electronic commerce courselecture one. Pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Spectroscopy.pptx food analysis technology
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Cloud computing and distributed systems.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
KodekX | Application Modernization Development
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Approach and Philosophy of On baking technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Unlocking AI with Model Context Protocol (MCP)
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Programs and apps: productivity, graphics, security and other tools
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Electronic commerce courselecture one. Pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Spectral efficient network and resource selection model in 5G networks
Spectroscopy.pptx food analysis technology
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Cloud computing and distributed systems.
Diabetes mellitus diagnosis method based random forest with bat algorithm
KodekX | Application Modernization Development
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
20250228 LYD VKU AI Blended-Learning.pptx

A new approach of colour image encryption based on henon like chaotic map

  • 1. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications 14 A New Approach of Colour Image Encryption Based on Henon like Chaotic Map Ramesh Kumar yadava# , Dr. B. K.singh*, S.K.sinha*, K. K.pandey* , # # Department of computer science and engineering, AISECT University BHOPAL 1 mailramesh28@gmail.com 3 third.author@first-third.edu * AISECT UNIVERSITY Mendua, Bhojpur Raisen Bhopal INDIA 2 skrishna24it@gmail.com Abstract In modern era of digital world, exchange of information in form of image often very frequently over communication channel, the secrecy of multimedia data like images becomes very important, The issue of secrecy for image resolved In many digital applications such as sensitive visual aids, broadcasting, military services, rare satellites images and confidential medical images etc. To reduce the processing overhead with the concern of Real-time data transmission application, to reduce such a huge file processing cost, we needs to enhance our encryption/decryption techniques. This paper proposed a novel image encryption technique based on Hannon like chaotic map. Chaos-based image encryption technique is one of the more promising encryption algorithms that provide very efficient and fast way of image encryption due to its ubiquitous phenomenon in deterministic nonlinear systems that exhibit extreme sensitivity to initial condition and random like behaviours. Keywords— Image RGB colour component, image encryption, Henon map, chaotic system. I. INTRODUCTION Encryption is a common technique to uphold multimedia image security in storage and transmission over the network due to some inherent features of image like high data redundancy and bulk data capacity. The encryption of image differs from that of text. With the development of multimedia technology the transmission of information as image and video is extensively used in real time data transmission. The digital image is widely used in our lives to resolve in many applications such as Geoinformation system, military image database, medical imaging system etc. for secure transmission of data, there is prime concern to provide security to these multimedia data, resulting in encryption of data. Most of conventional algorithm does not have the efficient capability for securing multimedia data containing image due to the complexity of algorithm and perfect correlation between pixel values of image. Several reviews has been proposed on multimedia data protection such as information hiding which include steganography, anonymity, watermarking. The other is encryption which includes conventional encryption technique. Last some decade relatively new approach has been extensively used, namely chaos based selective image encryption which provides relatively sufficient security and confidentiality. A symmetric block encryption algorithm creates a chaotic map used for permuting and diffusing multimedia image data. In permutation the pixel of image are replaced by another value and in the process of diffusion the pixel values are shuffled within the image. This paper proposed a colour image encryption technique which is very simple in implementation with high level of efficiency, which is based on Henon chaotic system. Henon map is a discrete time dynamic system which exhibit chaotic behaviour which we used to produce a uniform distribution of pixels of image. In proposed method we take a bit stream of RGB component of colour image which is the input for the Encryption algorithm. The rest or this paper is organized as follows. Section 2 describes the feature of chaos. Section 3 explains Henon map and its implementation. Section 4 present Encryption and decryption algorithm. Section 5 describes the experimental result to show the proof of robust algorithm. Section 6 shows the simulation analysis of security through Mat Lab. Section 7 concludes the paper. II. FEATURE OF CHAOS Chaos is a ubiquitous phenomenon existing in deterministic nonlinear systems that exhibit sensitivity to initial conditio and have random like behaviour. Mathematically one dimensional chaos map can be represented as: Xp+1 = f (Xp), f: I → I, Xo ε I, Where f is a continuous map on the interval I = [0, 1]. With the following propriety: 1. Sensitive to initial condition this sensitivity property is utilized for the keys of cryptosystems..
  • 2. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications 15 2. Topological transitivity which linked to the diffusion feature of cryptosystem. 3. Density of periodic points in I. Above two properties often used to construct stream cipher and block cipher in chaotic cryptography. Because the property of sensitivity of initial condition make the encryption very complicated. Sequence is also sensitive to control parameter. For image encryption chaotic system can be represented by Fig 1. The initial value of chaotic map takes the original image as input, sequence of bit provided by user mapped as control parameter. Output chaotic sequence produces the cipher image. Fig. 1. Basic architecture of chaotic map Small change in input bit stream produce a huge change in output bit stream after multiple round. Slight change of user key also produces totally different output sequence of bit stream. III. HENON CHAOTIC MAP The map was introduced by Michel Henon as a simplified model of the Poincare section of the Lorenz model. For the canonical map, an initial point of the plane will either approach a set of points known as the Henon strange attractor, or diverge to infinity. Two dimensional Henon map takes a point (Xn, Yn) in the plane and maps it to a new point: Xn+1 = Yn + 1 – aX 2 n Yn+1 = bXn where a > 0 and |b| < 1, n = 0, 1, 2… Henon Map depends on two parameter a and b. these parameter values determine the chaotic behaviour of map. The Most representative form of Henon map for canonical constant values a = 1.4 and b = 0.3 as we can see in Fig. 2. In which The Henon map reflects as chaotic attractor. The propose colour image encryption is based on Henon chaotic map, Henon like mapping used sin function which include a frequency control parameter w for maintaining their chaotic behaviour . The Henon like mapping equation which used in our present image encryption technique is a mathematical concept, where time dependency of any point determines by the fixed prescribed rule in geometrical space. In our proposed encryption technique we used Henon like chaotic map mathematically defined as Xn+2 = 1 – aX 2 n+1 + bsin (wxn) Which contain frequency control parameter w to control the Henon like chaotic signal. Encrypted Henon chaotic signal looks like distortion to unauthorized users ignoring to decrypt it, due to some specific characteristic such as nonperiodicity, ergodicity, randomicity.
  • 3. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications 16 Fig. 2. Chaotic nature of the Henon map IV.ENCRYPTION AND DECRYPTION ALGORITHM The proposed encryption algorithm is based on Henon like mapping. Our algorithm is based on fully layered encryption technique to provide higher level of confidentiality. We used colour image for the encryption process in our proposed technique we can also used same technique for Gray scale image. We perform the colour transformation to separate the RGB colour in its component matrix. For Gray scale image there is no need of colour transformation. Then we select any one of the component (RGB) matrix for encryption to reduce the computational overhead. The encryption process perform in the study can be seen in Fig. 3. (1) Encryption process: Step 1. The Henon like chaotic system is converted in to one-dimensional chaotic map. One dimensional Henon chaotic map mathematically is defined as: Xn+2 = 1 - aX 2 n+1 + bsin (wxn)…………….(1) Step 2. Transform the colour image in to its (RGB) 3 pieces of component matrix. Step 3. One dimensional Henon chaotic map obtain in (1) takes R component of colour image to generate the random bit stream. Step 4. The bit vales obtained in previous step is bit XOR with the original pixel values of R component of original transform matrix. Step 5. The vector result of G and B component of transform colour image with the matrix after bit XOR obtained from the previous stage produce the cipher image. Deterministic behaviour of chaotic map able us to reproduce the original image by providing the secret key component such as initial condition, system parameter, and number of iteration. (2) Decryption process: Step 1. The Henon like chaotic system is converted into one-dimensional chaotic map. One dimensional Henon chaotic map mathematically defined as Xn+2 = 1 – X 2 n+1 + b sin(wXn) which is same as during encryption process. Step 2. Perform colour transformation so that the colour image component RGB has been separated as in encryption process. Step 3. Select the secret key and parameter as used in encryption with the Henon chaotic map function same as (1). This process generates the transform matrix of pixel values of R component of image. Step 4. The XOR operation is computed bit- by- bit between the transform matrix of pixel values of R component of image and the bit values of the R component of cipher image as (2). Step 5. Vector of the decryption result is returned as the value of RGB using the image transformation to produce the original image.
  • 4. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications 17 Fig. 3. Encryption process V. EXPERIMENTAL RESULT The experimental analysis of proposed technique is based on Histogram analysis through Mat Lab. Histogram analysis show the distribution of pixel values between plane image and cipher image, if Histogram of plane image and cipher image has significant diversity then we can say cipher image does not give any clue to perform brute force or cryptanalysis attack on the encryption algorithm. We take Lena plane image with the size 256*256 as shown in Fig 4. The histogram of this plane image is shown in Fig. 5. We use frequency parameter w and X0, X1 as the keys. Using X0 = 0.011, X1 = 0.021 and w = 08071982, the encrypted image is shown in Fig. 6 and corresponding histogram of encrypted image is shown Fig. 7. Chaos system is reversible in nature after Decryption we get back the original Lena image as shown in Fig. 7. Proposed technique is based on single channel encryption. We encrypt only R component of the plane image and leave other G and B component as such after combining these component we get the cipher image. Fig. 7 shows the Histogram of ‘Original R component and Fig. 8 shown the Histogram of corresponding encrypted R component. Fig. 4. Original Plane Lena image Plane image Transformasi image G R B Chaosbased encryption-n G R B BitXOR G R B Cipher image
  • 5. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications 18 Fig. 5. Histogram of Plane Lena image Fig. 6. Encrypted Lena Image VI.SIMULATION ANALYSIS OF SECURITY To determine the proposed technique is robust, we use to perform analysis and testing of the encryption algorithm sues different parameter, like Histogram analysis is used to decide the colour distribution between the plane image and cipher image. Both the Histogram gives the significant difference to decide the robustness of encrypted algorithm. Fig. 4. Represent the Histogram of original lena image and Fig. 5. Represent the histogram of corresponding encrypted image. Both Histograms has significant difference which shows there is no possibility of brute-force attack. Similarly from the Fig. and Fig. shows the Histogram of original R channel and encrypted R channel, both the Histogram shows the significant amount of difference due to their pixel distribution. In our proposed algorithm we used w and the initial value X0,X1 as a secret key. Henon like chaotic system is very sensitive to initial condition and parameter. The experimental result demonstrates the encryption algorithm is very sensitive to the secret key. In our experiment if we change the secret Fig. 7. Decrypted Lena Image
  • 6. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications 19 Fig. 8. Histogram of original R component Fig. 9. Histogram of Encrypted R component Key X0 from X0= 0.001 to X0= 0.0000000001 the resultant encrypted image become entirely changed form original image. We take the different value of secret key for calculating the correlation coefficient between plane image and cipher image and also find the Entropy of encrypted image for different key value, and then we find the average correlation coefficient 0.000014 and average entropy 7.85200. The average Calculation of correlation and entropy determine the quality of encrypted image. The higher value of entropy and lower correlation between pixel values of encrypted image determine the safe encryption algorithm. The average result of correlation coefficient and Entropy shows the guarantees of security of proposed scheme under any cryptanalysis. VII. CONCLUSION this paper proposed a new colour image encryption algorithm based on Henon like chaotic map. The encryption process applied on any RGB channel. The selected channel goes through the one dimensional Henon like chaotic map to produce the random bit stream. This random bit stream bit XOR with the original pixel value of selected channel to produce the encrypted image. The proposed scheme has multi-dimensional large key space to resist the all possible type of brut-force attack. Several Experiments were carried out with numerical analysis, to shows the robustness of proposed scheme. In the future work we intend to make our system to achieve more flexible, reliable and higher level of quality performance in real time system. ACKNOWLEDGEMENT The study taken up during perusing M.Tech (computer science & Engineering) in partially supported by IT infrastructure development project, Department of Information Technology, Govt of India. REFERENCES 1. Chen Wei-bin, Zhang Xin, Image Encryption Algorithm Based on Henon chaotic System, International Conference on image Analysis and Signal Processing, 2009, pp. 94-97. 2. Li Chuanmu, Hong Lianxi, A New Image encryption scheme based on Hyper chaotic Sequence, IEEE International Workshop on Ant counterfeiting, Security, Identification, IEEE 2007, pp. 237-240. 3. Long Min, Huang Lu, Design and Analysis of a novel Chaotic Image Encryption. International conference on Computer Modeling and Simulation(ICCMS’ 10), Vol 1,2010.pp. 517-520. 4. S. Behnia, A. Akhshani, H. Mahmodi and A. Akhavan, A novel Algorithm for image Encryption based on Mixture of Chaotic Maps, Chaos, Solutions and Fractals, Vol. 35, 2008, pp. 408-419.
  • 7. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.6, 2013- Selected from International Conference on Recent Trends in Applied Sciences with Engineering Applications 20 5. Kocarev L, Chaos-based Cryptography, a brief overview. IEEE Circ Syst2001,1.6-21. 6. D. Xiao, X. Liao and P. Wei, Analysis and Improvement of a Chaos-Based Image Encryption Algorithm, “Chaos Solution & Fractials, Vol.pp.40,2007. 7. Y. Wanga, K.W. Wanga, X. F. Liao and G. R. Chen, A New Chaos-Based Fast Image Encryption Algorithm, Applied Soft Computing, Vol. 11, No. 1, 2011, pp. 514-522.
  • 8. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org CALL FOR PAPERS The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. There’s no deadline for submission. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/Journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar