Upload
bput
View
0
Download
0
Embed Size (px)
Citation preview
An Image Encryption & DecryptionApproach Based on Pixel ShufflingUsing 3D Logistic Map & 3D Henon
Map
Project ID: 3005
B.Tech. Project ReportSubmitted in partial fulfillment of the requirements for the
Degree of Bachelor of TechnologyUnder Biju Pattnaik University of Technology
Submitted by
AMIT KUMAR PRADHAN Roll No. # 201014583
ANSHUMAN PANDA Roll No. # 201018214
2013 - 2014
Under the guidance of
Mr. Agyan Kumar Prusty
ABSTRACT
Encryption is mainly used to secure the data that will be
transmitted over networks. There are so many techniques
introduced which are used to protect the confidential image
data from any unauthorized access. Multimedia data contains
different types of data that includes text, audio, video,
graphic, images with the increasing use of multimedia data
over internet, here comes a demand of secure multimedia data.
Most of the encryption algorithm available is generally used
for text data and not suitable for multimedia data. In our
project we have implemented approach for an image encryption
and decryption by 3D logistic and 3D Henon's maps approach
based on Pixel shuffling using chaos theory. We create
combinations between two adjacent pixels; to create linear
independence relationships in the same row. Where, the keys
will be stored in the first column in an encrypted manner by
using a Henon's map with initial condition known as Key1.
After that, we used another key called Key2 for the logistic
map; to change the position of the pixels by shuffling the
pixels position and it’s used for image scrambling.
i
ACKNOWLEDGEMENT
It is our proud privilege to epitomize our deepest sense of
gratitude and indebtedness to our guide, Mr. Agyan Kumar
Prusty for his valuable guidance, keen and sustained interest,
intuitive ideas and persistent endeavor. His inspiring
assistance, laconic reciprocation and affectionate care
enabled me to complete my work smoothly and successfully.
I shall be failing in my duties if, I do not express my
deep sense of gratitude towards Dr. Diptendu Sinha Roy, B-
Tech Project Coordinator, who has been a constant source of
inspiration for me throughout this report.
I acknowledge with immense pleasure the sustained interest,
encouraging attitude and constant inspiration rendered by
Prof. Sangram Mudali, Director, and Prof. Geetika Mudali,
Placement Director of N.I.S.T. His continued drive for better
quality in everything that happens at N.I.S.T. and selfless
inspiration has always helped us to move ahead.
Last but not the least I cannot forget the co-operation myfriends in this endeavor.
Amit kumar pradhan
iii
Anshuman panda
TABLE OF CONTENTS
ABSTRACT.....................................................i
ACKNOWLEDGEMENT.............................................ii
TABLE OF CONTENTS..........................................iii
LIST OF FIGURES..............................................v
LIST OF TABLES..............................................vi
LITERATURE REVIEW..........................................vii
CHAPTER 1....................................................1
INTRODUCTION.................................................1
CHAPTER 2....................................................3
THE LOGISTIC MAP.............................................3
2.1 Logistic map as a random number, generator –.................3
CHAPTER 3....................................................4
HÉNON MAP....................................................4
iv
CHAPTER 4....................................................5
INDEPENDENCE BETWEEN PIXELS..................................5
4.1 Creating Linear Independence Pixels..........................5
PRESENT WORK.................................................9
CHAPTER 5....................................................9
EXPERIMENTAL RESULTS.........................................9
5.1 Keys Space analysis.........................................10
5.2 Information Entropy Analysis................................10
5.3 Key Sensitivity Test........................................10
5.4 Histogram Analysis..........................................11
CHAPTER 6...................................................12
CHAOS THEORY................................................12
CHAPTER 7...................................................13
PSEUDORANDOM NUMBER GENERATOR...............................13
6.1 Why need Pseudorandom Number Generator......................13
CHAPTER 8...................................................14
FUTURE WORK.................................................14
CONCLUSIONS.................................................15
REFERENCE...................................................16
APPENDIX....................................................17
Henon_Map (Rendom Number).......................................17
Logistic_map....................................................19
v
LIST OF FIGURES
FIGURE 2.1 BIFURCATION DIAGRAM OF THE LOGISTIC MAP........................2FIGURE 3.1 THE STRANGE ATTRACTOR OF HENON MAP.............................3FIGURE 4.1: ENCRYPTION WITH BYTE SEQUENCE.................................6FIGURE 4.2 PROPOSED ENCRYPTION ALGORITHMS.................................7FIGURE 5.1 ENCRYPTION BY HENON CHAOTIC SYSTEM AND SHUFFLING PIXEL POSITION8FIGURE 5.2 DECRYPTION BY HENON CHAOTIC SYSTEM AND LOGISTIC FUNCTION.......9FIGURE 5.4: HISTOGRAM ANALYSIS: (A) HISTOGRAM OF ORIGINAL IMAGE; (B)
HISTOGRAM OF SHUFFLED IMAGE; (C) HISTOGRAM OF CIPHER IMAGE; (D) HISTOGRAM OF DECRYPTED IMAGE.........................................10
FIGURE 5.1 A PLOT OF THE LORENZ ATTRACTOR FOR VALUES R = 28, Σ = 10, B = 8/3..................................................................11
FIGURE 8.1 THE BIFURCATION DIAGRAM OF THE SECOND PROPOSED LOGISTIC MAP (A) VERSUS A FOR DIFFERENT VALUES OF.....................................13
vi
α = (0.1, 0.4, 0.7, 1.0, 100) and (b) versus a for different values λ = (1.5, 2.5, 4.0)......................................................13
LIST OF TABLES
TABLE.1: ORIGINAL IMAGE 5 X 5.............................................4TABLE.2: X-OR THE ADJACENT PIXELS........................................5TABLE.3: ENCRYPTING THE FIRST COLUMN......................................5Table.4: Example of the shuffling approach................................8
vii
LITERATURE REVIEWCryptography is standard field of encryption that could be
help for secure data form adversary. It encompasses many
viii
problems like encryption, authentication, and key distribution
to name a few. The field of modern cryptography provides a
theoretical foundation based on which one can understand what
exactly these problems are, how to evaluate protocols that
purport to solve them and how to build protocols in whose
security one can have confidence SSL (Secure Sockets Layer) is
a cryptographic protocol serving to encrypt the connection
between the hosting server that stores information and the web
client (the browser of the visitor of the website). This
encrypted connection provides secure access to personal and
business information which should not be available to third
parties. SSL is a technology already used by millions of
websites through which they provide protection for online
transactions with their customers.
Digital images are widely used in various applications, that
include military, legal and medical systems and these
applications need to control access to images and provide the
means to verify integrity of images. So, depend upon critical
situation we can secure the particular image before send to
destination and an image could be encrypt by different type of
method.
The logistic map is one of the simplest and thus more widely
used chaotic maps. Introduced first in 1845 by Verhulst as a
model for the population growth of a species it is expressed
as a recurrence equation.
We will study the dynamics of the 3D Hénon map and prove
Theorem 2. The dynamics can be complex, especially when |B| is
ix
close to one, essentially because when |B| = 1 the map has,
for certain values of the parameters, fixed points with three
multipliers are on the unit circle.
In recent years there is a tremendous boom in chaos-based
cryptography research, there are still some limitations that
prevent its wider application. Emphasizing, a big drawback is
its relatively slow speed.
x
CHAPTER 1
INTRODUCTION
Data Encryption is one of the important fields of the
cryptograph, so before sending the information to another side
the user needs to make his data unreadable by using any
encrypting methods e.g: encrypting the E-mail password. On
another hand, image is one of the most important information
that used in new applications like video streaming websites,
phones and satellites. Moreover, protecting the image is not
like protecting the data since the image needs special rules
to encrypt it. Until now, various data encryption algorithms
have been used over the internet; to protect the data
transmissions between the users such as: RSA, IDEA or DES. If
we apply those methods on the image, we need a long of time to
encrypt and decrypt the image and some of them may not be
useful to encrypt the data in a real time communication.
Furthermore, the chaos theory was firstly used in the computer
system by Edward Lorenz 1963.
The deterministic behavior of the chaos system,
initial sensitivity, parameter sensitivity and
unpredictability are the main reasons that bring chaos on the
image encryption. Many researchers try to solve this problem
by using different chaos systems, like they used a hybrid
method for image encryption by applying multi-chaotic systems;
to increase the key space and make system’s breaking very
difficult. Where, the calculations and the executions time to
1
encrypt the image are very large. Therefore, in they used
Rossler chaotic system to encrypt the image by applying
changes in the pixels value and their position to increase the
uncertainty in the cipher image. The one time pads with the
logistic map (as a chaotic function) are used in to encrypt
the image and increase the size of the encrypted keys. Where,
in an improved DES and the logistic map are used to encrypt
the image. Others, like proposed new modifications to the
Advanced Encryption Standard (MAES) to increase the security
level by using a chaotic system.
Edward Lopez derived a Chaos theory which is a
part of mathematical physics. A chaotic system based on
confusion and diffusion was developed in 1989 Chaotic systems
are sensitive, non-liner, deterministic and easy to
reconstruct after filling in the image. Henon map is one of
the chaotic maps used for generating Pseudo-random sequence
required for encryption. Henon chaotic map discovered in 1978
is used as a symmetric key stream cipher cryptographic system.
It is mathematical in nature.
Two dimensional discrete-time nonlinear dynamical Henon
chaotic map generates pseudo-random binary sequence.
Chaos-based data encryption algorithm for images
and videos are proposed by using three chaotic systems to
encrypt the image and to enhance the encryption properties. On
another hand, Electrocardiogram signals of the persons are
used to generate the encryption keys; to encrypt the data by
extracting their features by using Honen map as a chaotic
2
system. There are many problems in applying chaos on the image
encryption, such as: the existing number of invalid and weak
keys and the keys are not sensitive to the initial conditions.
A linear independence between adjacent pixels and
to use a logistic map in the image shuffling and henon map in
the image encryption, which makes the cryptosystem very
efficient and robust.
3
CHAPTER 2
THE LOGISTIC MAP
2.1 Logistic map as a random number, generator –
For the largest value of the control parameter, the
logistic map is able to generate an infinite chaotic sequence
of numbers. Here we describe a simple method for obtaining a
random number generator based on this property of the logistic
map. Comparing to usual congruential random generators, which
are periodic, the logistic random number generator is
infinite, a periodic and not correlated. A periodic random
number generator is a valuable tool for computer simulation
methods.
The logistic map depends on a parameter λ ∈ R. It is
defined on the interval [0, 1] as Lλ(x) = λx(1 − x). The graph
for λ = 4 is shown on the left. Increasing λ from λ = 0 λ = 4
this map undergoes a series of period-doubling bifurcations in
much the same way as what we have seen for the Rössler system.
4
Figure 2.1 Bifurcation diagram of the logistic map
CHAPTER 3
HÉNON MAP
The Hénon map is a discrete-time dynamical system. It is one
of the most studied examples of dynamical systems that exhibit
chaotic behavior. The Hénon map takes a point (xn, yn) in the
plane and maps it to a new point
Xn+1 = Yn+1-aX2n (1)
Yn+1=bX n(2)
5
The map depends on two parameters, a and b, which for the
canonical Hénon map have values of a = 1.4 and b = 0.3. For
the canonical values the Hénon map is chaotic. For other
values of a and b the map may be chaotic, intermittent, or
converge to a periodic orbit. An overview of the type of
behavior of the map at different parameter values may be
obtained from its orbit diagram.
The map was introduced by Michel Hénon as a simplified
model of the Poincaré section of the Lorenz model. For the
canonical map, an initial point of the plane will either
approach a set of points known as the Hénon strange attractor,
or diverge to infinity.
The Hénon attractor is a fractal, smooth in one direction and
a Cantor set in another. Numerical estimates yield a
correlation dimension of 1.25 ± 0.02 and a Hausdorff dimension
of 1.261 ± 0.003 for the attractor of the canonical map.
It is known that for parameter ranges α∈[1.16,1.41] and
β∈[0.2,0.3] map generates chaotic behaviour i.e. sensitive
dependence on initial
conditions.
6
Figure 3.2 The strange attractor of Henon Map
CHAPTER 4
INDEPENDENCE BETWEEN PIXELS
4.1 Creating Linear Independence Pixels
The linear independence between two variables a and b
can be written as a relationship that combined a and b without
describing a and b. To do that, many methods can be used such
as a mathematical combination that describes the system or by
using XORing operation between two variables. In this paper,
we apply the XORing between neighbors’ pixels to create a
linear independence relationship. Our approach is described as
follow:
1- XOR the adjacent pixels in the same row.
2- Store the result of the XORing in the second
adjacent pixel to the current one. The second XOR will
use the previous one to apply the XOR to its value.
3- After repeating 1-2 for all rows in the image the
first column consists of the keys; to solve the created
relations between the adjacent pixels.
4- To encrypt the keys in the first column, we apply the
logistic map and create N-keys (N number of rows); to
hide the keys in the image.
For Example: assume the image 5 x 5, as shown in Table.1 our system is applied in the following steps:
7
Table.1: Original Image 5 x 5
1- XORing the adjacent pixels: XOR 11, 12 and store the
result in pixel 2, then XOR the result of the previous
XORing with 13 and store the result in pixel 3
….etc. Until the XORing for all of the adjacent pixels
are completed in the same row. Then, repeat the process
to each row, the results will be as follows:
Table.2: X-OR the adjacent Pixels
11
7 10
4 11
9 7 12
1 10
17
1 19
5 16
25
3 24
4 17
36
6 37
1 36
11
12
13
14
15
9 14
11
13
11
17
16
18
22
21
25
26
27
28
21
36
34
35
36
37
8
2- The first column will contain the key linear independencerelations. we a map in the first column and XOR generatedkeys (described in point B), keys in the image.
Table.3: Encrypting the first column
20
7 10
4 11
32
7 12
1 10
10
1 19
4 17
43
3 24
4 17
50
6 37
1 36
1- Encrypting the keys:
To encrypt the first column that contains the keys that
solved the linear independence relationships between the
adjacent pixels. We scale the output to be in the range [0
255] which we called it Pixel Key(PK) as in the following
steps:
Step 1: choose the initial value of (X1,Y1) for Henon map.This value works as an initial secret symmetric key for Henonmap.
Step 2: Henon map work as a key stream generator forcryptosystem. The size of sequence depends upon the size ofimage. If the image size is m×n then the number of henonsequence will be 8×m×n obtained by equation (1).
9
Step 3: Experimental analysis conclude that cut-off point,0.3992, has been determined so that the sequence is balanced.The decimal values are then converted into binary valuesdepending upon this threshold value, as given in equation (3)where Z is a binary sequence.
Zi = (3)
Step 4: Henon sequence is then reduced by combining each
consecutive 8 bits into one decimal value.
Figure 4.1: Encryption with Byte Sequence
2-Shuffling the pixels position:
To increase the randomization in the encrypted image, we
shuffled the pixels position to new position by using the
0 if Xi <= 0.3992
1 if Xi => 0.3992
10
logistic map in equation 1. In the following steps, the
shuffled approach will be described:
1- Choice the initial conditions of the logistic map.
2- Transfer the M x N image to (MN) x 1 vector image.
3- Generate the chaotic sequence MN x 1 called C, shuffle the
encrypted image by sorting the C vector so we get S shuffled
vector.
4- Transfer the Vector S to M x N matrix image. The shuffling
approach is shown in the Table 4, where, E (Encrypted image
from the step 1, C (chaotic sequences), S (shuffled) Matrices.
Table.4: Example of the shuffling approach
E 1 2 3 4 5 6 7 8 9 10
C .64 .96 .06 .87 .18 .38 .60 .44 .04 .91
S 9 3 5 6 8 7 1 4 10 2
11
Henon Map
Figure 4.2 Proposed Encryption Algorithms
3 -Decryption of Encrypted Image
Since, the chaotic system behavior is deterministic so
reconstruction of image using the same key (X1, Y1) at
decryption end gives the shuffled image. This shuffled image
is further arranged in an order exactly opposite of the way
done for encryption. Finally, the original image is obtained
at receiver’s end. Where, the decryption process is done in
the reverse order of the encryption process.
12
PRESENT WORK
CHAPTER 5
EXPERIMENTAL RESULTS
In this section, experimental results of the proposed image
encryption algorithm are illustrated to appreciate the
efficiency of existing algorithm. The MATLAB 7.6 software was
used for implementing this code. The initial parameters for
Henon map are chosen as a = 1.4 and b = 0.3 to make the system
chaotic. Secret symmetric key for encryption is a combination
of X1=0.01 and Y1=0.02. Lena image with a size 256 x 256 are
used in our experimental. In Fig.2 (a –b) shows the Lena image
and cipher image respectively. With input keys Key1= 2 x10-14
and Key2=1 x10-14 for an images. It is clear that the cipher
images are totally different from the plain-text images.
13
(a)
(b)
(c)
(a)
(b)
(c)Figure 5.1 Encryption by Henon Chaotic System and Shuffling pixel position
(A) Original Image; (B) Shuffled Image; (C) Cipher Image
Figure 5.2 Decryption by Henon Chaotic System and Logistic function
(A) Cipher Image; (B) Shuffled Image after Decryption; (C)
Original Image
5.1 Keys Space analysis
For Key1 and Key2 serve as encryption keys, the space of the
keys is at least 1030, so it’s large enough to resist the brute
force attacks.
14
5.2 Information Entropy Analysis
Information entropy is defined by the degree of uncertainties
in the encryption system. It is used to calculate the
Effectiveness of image encryption algorithm. Statistical
measure of randomness to characterize the texture of the input
image is termed as entropy. It is calculated as given in
equation (5).
H= -sum (p.*log2 (p)) (5)
Ideal entropy of an encrypted image should be equal to 8,
which corresponds to a random source. Practically, ideal
information entropy cannot be achieved. It is always less than
the ideal value. The values calculated in Table 1 are very
close to the ideal value.
5.3 Key Sensitivity Test
For secure encryption, the key should be sensitive with large
space key size to resist all kind of brute force attack.
Randomness is the key point of Henon map. To test the
sensitivity of the key involved, a minute variation was done
in original secret key by changing it from x(1)=0.01 and
y(1)=0.02 to x’(1)=0.010001 and y’(1)=0.020001. As a result,
it was not possible to obtain the original image at receiver’s
end.
15
5.4 Histogram Analysis
The histogram of an image is graphical representation of pixel
intensity values. There are 256 different possible intensities
for a gray image, so in graphical representation of the
histogram will display 256 intensities and the distribution of
pixels amongst those intensity values.
Figure 5.4: Histogram Analysis: (A) Histogram of Original Image; (B)Histogram of Shuffled Image; (C) Histogram of Cipher Image; (D) Histogram
of Decrypted Image
It is analyzed from Figure 5.4, that the distribution of gray
scale values is uniform in cipher image, and significantly
different from histograms of original image. In the original
image some gray scale values do not exist in the range of 0 to
A
C
16
255 but in encrypted image gray-scale values exist uniformly
in the range 0 to 255. Therefore, it is proved that the
encrypted image does not help intruders to employ statistical
attack on encryption procedure.
CHAPTER 6
CHAOS THEORY
Chaos theory is a field of study in mathematics, with
applications in several disciplines
including meteorology, physics,
engineering, economics and biology. Chaos theory studies the
behavior of dynamical systems that are highly sensitive to
initial conditions, an effect which is popularly referred to
as the butterfly effect. Small differences in initial
conditions (such as those due to rounding errors in numerical
computation) yield widely diverging outcomes for such
dynamical systems, rendering long-term prediction impossible
in general. This happens even though these systems
are deterministic, meaning that their future behavior is fully
determined by their initial conditions, with
no random elements involved. In other words, the deterministic
nature of these systems does not make them predictable. This
17
behavior is known as deterministic chaos, or simply chaos. This
was summarized by Edward Lorenz as follows:
Figure 5.1 A plot of the Lorenz attractor for values r = 28, σ = 10, b =8/3
CHAPTER 7
PSEUDORANDOM NUMBER GENERATOR
A pseudorandom number generator (PRNG), also known as a
deterministic random bit generator (DRBG), is an algorithm for
generating a sequence of numbers that approximates the
properties of random numbers. The sequence is not truly random
in that it is completely determined by a relatively small set
18
of initial values, called the PRNG's state, which includes a
truly random seed. Although sequences that are closer to truly
random can be generated using hardware random number
generators, pseudorandom numbers are important in practice for
their speed in number generation and their reproducibility,
and they are thus central in applications such as simulations
(e.g., of physical systems with the Monte Carlo method), in
cryptography, and in procedural generation. Good statistical
properties are a central requirement for the output of a PRNG,
and common classes of suitable algorithms include linear
congruential generators, lagged Fibonacci generators, and
linear feedback shift registers. Cryptographic applications
require the output to also be unpredictable, and more
elaborate designs, which do not inherit the linearity of
simpler solutions, are needed. More recent instances of PRNGs
with strong randomness guarantees are based on computational
hardness assumptions, and include the Blum Blum Shub, Fortuna,
and Mersenne Twister algorithms.
6.1 Why need Pseudorandom Number Generator
This stretching-and-folding does not just produce a
gradual divergence of the sequences of iterates, but an
exponential divergence (see Lyapunov exponents), evidenced
also by the complexity and unpredictability of the chaotic
logistic map. In fact, exponential divergence of sequences of
iterates explains the connection between chaos and
unpredictability: a small error in the supposed initial state
of the system will tend to correspond to a large error later
19
in its evolution. Hence, predictions about future states
become progressively (indeed, exponentially) worse when there
are even very small errors in our knowledge of the initial
state. This quality of unpredictability and apparent
randomness led the logistic map equation to be used as a
Pseudo-random number generator in early computers.
CHAPTER 8
FUTURE WORK
Due to time consistency we couldn’t able to do that. So, ourfuture job is using 3D Logistic and 3D Henon map image encryptand decrypt by chaotic function.
Those types of technique are use in later and implementthrough 3D logistic and 3D henon map we secure our image of
different kind of attacks. Let’ s look e.g.
Figure 8.1 the bifurcation diagram of the second proposed logistic map (a)versus A for different values of
α = (0.1, 0.4, 0.7, 1.0, 100) and (b) versus a for different values λ =(1.5, 2.5, 4.0)
20
Three-dimensional Henon maps have not been as widely studied
as one– and two-dimensional maps, though in recent years there
has been a considerable increase in their study. One of
important reasons for this fact is that multi-dimensional
dynamical systems (the dimension of the phase space is at
least four for flows and three for maps) can exhibit
complicated dynamics that is decidedly distinct from lower-
dimensional cases. In particular they can possess a new
variety of strange attractor called a wild-hyperbolic
attractor
CONCLUSIONS
We applied to a plain image and results thus obtained
competitive to other level of security of images. Eavesdrop
cannot cryptanalysis the cipher image. Here, the security
relies on secret keys along with the image encryption
technique. Chaos is known for randomness, so it could be
highly secured. Confusion has been done by pixel of the image
by XORing the adjacent pixels form actual position to a new
position and create linear independence between them.
Diffusion has been done through Logistic sequence generated
and key encrypted through Henon map. So both the processes of
21
increasing confusion and diffusion resulted in increasing the
security of cryptosystem. Logistic map is a very simple but
widely used classic chaotic map, so it’s used for encrypt
whole matrix with increase confusion process of an image
pixel. The Hénon map of the second kind large scale, wild-
hyperbolic attractor, so it’s use encrypt for first column of
an image pixel. Those kinds of technique are securing our
image from adversary and protect different kind of attack.
22
REFERENCE
[1] A. C. Weave and M. W. Condry, “Distributing internet
services to the network’s edge,” IEEE Trans. Industrial
Electronics, vol. 50, pp. 404-411, 2003.
[2] T. H. Chen, G. Horng, and W. B. Lee, “A publicly
verifiable copyright-proving scheme resistant malicious
attacks,” IEEE Trans. Industrial Electronics, vol. 52, pp.
327-334, 2005.
[3] R. Brown and LO. Chua, “Clarifying chaos: examples and
counterexamples,” Int. J. Bifurcat Chaos, vol. 6, pp.219-242,
1996.
[4] J. Fridrich, “Symmetric ciphers based on two-dimensional
chaotic map,” Int. J. Bifurcat Chaos, vol. 8, pp.1259-1284,
1996.
[5] Hazem Mohammad Al-Najjar, “Digital Image Encryption
Algorithm Based on a Linear Independence Scheme and the
Logistic Map” Technical College of Arar, Department of
Computer Technical and Vocational Training Corporation Arar,
KSA.
[6] Image encryption using henon chaotic map with byte
sequencen. s. raghava & ashish kumar Department of Information
Technology, Delhi Technological University, New Delhi, India.
[7] S.V.Gonchenko, J.D.Meiss and I.I.Ovsyannikov, “Chaotic
dynamics of three-dimensional
hénon maps that originate from a homoclinic bifurcation,”
DOI: 10.1070/RD2006v011n02ABEH000345, Received October 3,
2005; accepted November 12, 2005.
23
[8] Yun Cao,Runhe Qiu and Yuzhe Fu, “Color image encryption
based on hyper-chaos,” Information and Technology Department,
Donghua University Shanghai, China, pp. IEEE, 2009.
[9] Rakesh S, Ajitkumar A Kaller, Shadakshari B C and Annappa
B, “Multilevel image encryption,” Department of Computer
Science and Engineering, National Institute of Technology
Karnataka, Surathkal, {rakeshsmysore, ajitkaller,
shadsbellekere}@gmail.com,[email protected].
[10] Pawan N. Khade and Prof. Manish Narnaware, “3D chaotic
functions for image encryption,” IJCSI International Journal
of Computer Science Issues, Vol. 9, Issue 3, No 1, May 2012
APPENDIX
Henon_Map (Rendom Number)
ans =
Columns 1 through 21
0 1 -1 1 -1 0 0 0 0 1 -2 -1 0 0 1 -1 0 -1 0 -1 0
Columns 22 through 42
-1 1 -1 0 0 0 0 0 1 -1 0 0 0 0 1 -2 -1 0 0 0 -1
24
Columns 43 through 63
1 -2 -1 -1 0 0 0 1 -1 1 -1 0 0 0 0 1 -1 1 -1 0 -1
Columns 64 through 84
1 -2 -1 0 0 0 0 -1 1 -2 -1 -1 0 0 0 0 1 -1 1 -1 0
Columns 85 through 105
-1 1 -2 -1 0 0 0 0 0 1 -2 -1 0 0 0 0 1 -2 -1 0 0
Columns 106 through 126
0 -1 1 -2 -1 -1 0 0 1 -1 0 0 1 -1 0 0 0 0 0 1 -1
Columns 127 through 147
0 0 0 0 1 -1 0 0 0 0 0 0 1 -1 0 0 0 0 0 0 0
Columns 148 through 168
1 -1 0 0 0 -1 1 -2 -1 0 0 0 1 -1 0 -1 1 -1 0 -1 1
Columns 169 through 189
-2 -1 0 0 0 -1 1 -2 -1 -1 0 0 1 -1 0 0 1 -1 1 -1 0
25
Columns 190 through 210
0 1 -1 0 -1 0 -1 1 -1 0 -1 1 -2 -1 0 0 0 0 0 0 -1
Columns 211 through 231
1 -2 -1 -1 0 0 0 0 0 1 -1 0 0 0 1 -1 1 -1 0 -1 1
Columns 232 through 252
-2 -1 0 0 0 0 -1 1 -2 -1 -1 0 0 0 0 0 0 0 1 -1 1
Columns 253 through 256
-2 -1 0 0
26
Logistic_map
Random Number
Columns 49249 through 49260
0.4612 0.9940 0.0240 0.0936 0.3393 0.8967
0.3706 0.9330 0.2500 0.7501 0.7499 0.7503
Columns 49261 through 49272
0.7495 0.7510 0.7480 0.7541 0.7418 0.7661
0.7167 0.8122 0.6102 0.9514 0.1850 0.6030
Columns 49273 through 49284
0.9576 0.1625 0.5444 0.9921 0.0313 0.1213
0.4263 0.9783 0.0850 0.3109 0.8570 0.4901
Columns 49285 through 49296
0.9996 0.0016 0.0062 0.0246 0.0962 0.3476
0.9071 0.3369 0.8936 0.3802 0.9426 0.2164
Columns 49297 through 49308
0.6783 0.8729 0.4438 0.9874 0.0498 0.1894
0.6140 0.9480 0.1972 0.6332 0.9290 0.2639
Columns 49309 through 49320
27
0.7769 0.6932 0.8507 0.5080 0.9997 0.0010 0.0041
0.0165 0.0647 0.2422 0.7342 0.7806
Columns 49321 through 49332
0.6850 0.8631 0.4726 0.9970 0.0119 0.0472
0.1800 0.5903 0.9674 0.1262 0.4412 0.9862
Columns 49333 through 49344
0.0546 0.2063 0.6550 0.9039 0.3474 0.9068
0.3380 0.8950 0.3759 0.9384 0.2311 0.7109
Columns 49345 through 49356
0.8221 0.5849 0.9711 0.1121 0.3981 0.9585
0.1591 0.5351 0.9951 0.0197 0.0771 0.2846
Columns 49357 through 49368
0.8144 0.6045 0.9563 0.1672 0.5568 0.9871
0.0510 0.1937 0.6247 0.9378 0.2335 0.7159
Columns 49369 through 49380
0.8136 0.6066 0.9545 0.1737 0.5741 0.9780
0.0859 0.3141 0.8618 0.4764 0.9978 0.0089
Columns 49381 through 49392
0.0354 0.1364 0.4712 0.9967 0.0132 0.0520
0.1973 0.6335 0.9287 0.2649 0.7789 0.6889
28
Columns 49393 through 49404
0.8572 0.4896 0.9996 0.0017 0.0069 0.0274
0.1066 0.3810 0.9433 0.2138 0.6723 0.8812
Columns 49405 through 49416
0.4186 0.9735 0.1031 0.3700 0.9324 0.2522
0.7544 0.7412 0.7673 0.7141 0.8166 0.5990
Columns 49417 through 49428
0.9608 0.1508 0.5123 0.9994 0.0024 0.0096
0.0381 0.1464 0.5000 1.0000 0.0000 0.0000
Columns 49429 through 49440
0.0000 0.0000 0.0000 0.0000 0.0001 0.0006
0.0023 0.0094 0.0371 0.1429 0.4900 0.9996
Columns 49441 through 49452
0.0016 0.0064 0.0255 0.0993 0.3578 0.9191
0.2974 0.8359 0.5488 0.9905 0.0377 0.1451
Columns 49453 through 49464
0.4963 0.9999 0.0002 0.0009 0.0035 0.0138
0.0544 0.2059 0.6540 0.9052 0.3434 0.9019
29
Columns 49465 through 49476
0.3540 0.9147 0.3121 0.8588 0.4851 0.9991
0.0036 0.0142 0.0559 0.2110 0.6659 0.8899
Columns 49477 through 49488
0.3919 0.9532 0.1783 0.5860 0.9704 0.1149
0.4069 0.9653 0.1339 0.4639 0.9948 0.0208
Columns 49489 through 49500
0.0813 0.2989 0.8382 0.5426 0.9928 0.0288
0.1118 0.3971 0.9576 0.1624 0.5440 0.9922
Columns 49501 through 49512
0.0308 0.1194 0.4206 0.9748 0.0983 0.3546
0.9155 0.3095 0.8548 0.4964 0.9999 0.0002
Columns 49513 through 49524
0.0008 0.0033 0.0132 0.0522 0.1980 0.6352
0.9269 0.2711 0.7904 0.6627 0.8941 0.3787
Columns 49561 through 49572
0.9921 0.0315 0.1221 0.4287 0.9797 0.0797
0.2933 0.8291 0.5668 0.9822 0.0701 0.2608
30