SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Secure Image Encryption using Two Dimensional
Logistic Map
* Gangadhar Tiwari1, Debashis Nandi2, Abhishek Kumar3, Madhusudhan Mishra4 1,
2Department of Information Technology, NIT Durgapur (W.B.), India 3Department of
Electronics and Electrical Engineering, NITAP, (A.P.), India 4Department of Electronics and
Communication Engineering, NERIST, (A.P.), India
1www.icgst.com
http://www.icgst.com/paper.aspx?pid=P1151351311
Current researches in image encryption techniques suggest using chaotic systems.
But, one-dimensional (1D) chaotic schemes have drawbacks like small key space
and weak security. This paper proposes a novel chaotic image encryption scheme
based on two-dimensional (2D) logistic map. The 2D logistic map has more
complex chaotic behaviors with respect to 1D logistic map like basin structures
and attractors. The proposed scheme is based on permutation-substitution
network and offers good confusion and diffusion properties in stream and block
ciphers both. It encrypts plaintext image into random-like ciphertext image by
generating the pseudorandom sequences from logistic map. The key schedule
algorithm translates a binary encryption key to initial values and system
parameters used in the 2D logistic map. This scheme uses 256 bit long cipher key
for encryption/decryption. Experimental result indicates that the proposed
scheme is secure against known cryptanalytic attacks and offers superior
performance compared to existing chaotic image encryption schemes.
2www.icgst.com
http://www.icgst.com/paper.aspx?pid=P1151351311
Secure Image Encryption using Two Dimensional Logistic Map
Abstract
3www.icgst.com
Mr. Gangadhar Tiwari completed B.Sc.(Mathematics) from Guwahati University,
Guwahati in 2006 and M.Sc.(Information Technology) from Punjab Technical
University,Jalandhar in 2011. Currently, he is pursuing PhD at NIT Durgapur, India.His
research interests include Information Security and Digital Image Processing.
NIT Durgapur
http://www.nitdgp.ac.in/
4www.icgst.com
Dr. Debashis Nandi received his BE degree in Electronics and Communication
Engineering from RE College, Durgapur (University of Burdwan), India, in 1994 and M.
Tech. Degree from Burdwan University on Microwave Engineering in 1997. He
received his PhD degree from IIT, Kharagpur, India on Medical Imaging Technology.
His area of research includes Computer security and cryptography, Secure chaotic
communication, Video coding. He is an Associate Professor in the Department of
Information Technology, NIT, Durgapur, India.
NIT Durgapur
http://www.nitdgp.ac.in/
5www.icgst.com
Mr. Abhishek Kumar received his B.Tech degree in Electrical and Electronics
Engineering from Pondicherry University in 2009 and M.Tech degree in Power System
Engineering from North Eastern Regional Institute of Science and Technology, India in
the 2012.He is currently working as an Assistant Professor with Department of
Electrical & Electronics Engineering, National Institute of Technology, Arunachal
Pradesh, India.
National Institute of Technology, Arunachal
Prades
http://www.nitap.in/
6www.icgst.com
Mr. Madhusudhan Mishra has completed his B.Tech in Electronics and
Communication Engineering from North Eastern Regional Institute of Science and
Technology (NERIST), Nirjuli, Arunachal Pradesh in 2004 and M.Tech in Signal
Processing from IIT Guwahati in 2011. He worked in Sankara Institute of Technology,
Kukas, Jaipur for some years and joined NERIST as Assistant Professor in 2006. His
main interest of research area includes Digital Signal and Image Processing.
National Institute of Technology, Arunachal
Prades
http://www.nitap.in/
7

Weitere ähnliche Inhalte

Was ist angesagt?

Dynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationDynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationeSAT Publishing House
 
Dynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationDynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationeSAT Journals
 
Invisible water marking within media files using state of-the-art technology
Invisible water marking within media files using state of-the-art technologyInvisible water marking within media files using state of-the-art technology
Invisible water marking within media files using state of-the-art technologyIAEME Publication
 
IRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten CharactersIRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten CharactersIRJET Journal
 
A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ...
A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ...A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ...
A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ...Hadi Santoso
 
GUI based handwritten digit recognition using CNN
GUI based handwritten digit recognition using CNNGUI based handwritten digit recognition using CNN
GUI based handwritten digit recognition using CNNAbhishek Tiwari
 
IRJET-MText Extraction from Images using Convolutional Neural Network
IRJET-MText Extraction from Images using Convolutional Neural NetworkIRJET-MText Extraction from Images using Convolutional Neural Network
IRJET-MText Extraction from Images using Convolutional Neural NetworkIRJET Journal
 
Retrieval of textual and non textual information in
Retrieval of textual and non textual information inRetrieval of textual and non textual information in
Retrieval of textual and non textual information ineSAT Publishing House
 
Mining knowledge graphs to map heterogeneous relations between the internet o...
Mining knowledge graphs to map heterogeneous relations between the internet o...Mining knowledge graphs to map heterogeneous relations between the internet o...
Mining knowledge graphs to map heterogeneous relations between the internet o...IJECEIAES
 

Was ist angesagt? (19)

Resume
ResumeResume
Resume
 
Thirunavukkarasu (2)
Thirunavukkarasu (2)Thirunavukkarasu (2)
Thirunavukkarasu (2)
 
Resume
ResumeResume
Resume
 
Dynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationDynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentation
 
Dynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationDynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentation
 
Invisible water marking within media files using state of-the-art technology
Invisible water marking within media files using state of-the-art technologyInvisible water marking within media files using state of-the-art technology
Invisible water marking within media files using state of-the-art technology
 
IRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten CharactersIRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten Characters
 
A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ...
A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ...A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ...
A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ...
 
CV
CVCV
CV
 
Cc4301455457
Cc4301455457Cc4301455457
Cc4301455457
 
CV
CVCV
CV
 
Cv
CvCv
Cv
 
GUI based handwritten digit recognition using CNN
GUI based handwritten digit recognition using CNNGUI based handwritten digit recognition using CNN
GUI based handwritten digit recognition using CNN
 
IRJET-MText Extraction from Images using Convolutional Neural Network
IRJET-MText Extraction from Images using Convolutional Neural NetworkIRJET-MText Extraction from Images using Convolutional Neural Network
IRJET-MText Extraction from Images using Convolutional Neural Network
 
Retrieval of textual and non textual information in
Retrieval of textual and non textual information inRetrieval of textual and non textual information in
Retrieval of textual and non textual information in
 
Mining knowledge graphs to map heterogeneous relations between the internet o...
Mining knowledge graphs to map heterogeneous relations between the internet o...Mining knowledge graphs to map heterogeneous relations between the internet o...
Mining knowledge graphs to map heterogeneous relations between the internet o...
 
G0333946
G0333946G0333946
G0333946
 
Resume generator2
Resume generator2Resume generator2
Resume generator2
 
dheeraj_resume_naukri
dheeraj_resume_naukridheeraj_resume_naukri
dheeraj_resume_naukri
 

Andere mochten auch

Run time dynamic partial reconfiguration using microblaze soft core processor...
Run time dynamic partial reconfiguration using microblaze soft core processor...Run time dynamic partial reconfiguration using microblaze soft core processor...
Run time dynamic partial reconfiguration using microblaze soft core processor...eSAT Journals
 
Distribution network reconfiguration for loss reduction and voltage
Distribution network reconfiguration for loss reduction and voltageDistribution network reconfiguration for loss reduction and voltage
Distribution network reconfiguration for loss reduction and voltageGaddafi Sani
 
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...Sajid Iqbal
 
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаосМ.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаосProject KRIT
 
VOLTAGE SAG AND SWELL ALLEVIATION IN DISTRIBUTION NETWORK USING CUSTOM POWER...
 VOLTAGE SAG AND SWELL ALLEVIATION IN DISTRIBUTION NETWORK USING CUSTOM POWER... VOLTAGE SAG AND SWELL ALLEVIATION IN DISTRIBUTION NETWORK USING CUSTOM POWER...
VOLTAGE SAG AND SWELL ALLEVIATION IN DISTRIBUTION NETWORK USING CUSTOM POWER...Gaddafi Sani
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniqueAncy Mariam Babu
 
OPTIMAL PLACEMENT OF DISTRIBUTED GENERATION
OPTIMAL PLACEMENT OF DISTRIBUTED GENERATION OPTIMAL PLACEMENT OF DISTRIBUTED GENERATION
OPTIMAL PLACEMENT OF DISTRIBUTED GENERATION Jitendra Bhadoriya
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabMuhammad Saif Ul Islam
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Chaos Theory: An Introduction
Chaos Theory: An IntroductionChaos Theory: An Introduction
Chaos Theory: An IntroductionAntha Ceorote
 
Διερεύνηση της Γεωμετρικής Σκέψης των Αποφοίτων του Δημοτικού
Διερεύνηση της Γεωμετρικής Σκέψης των Αποφοίτων του ΔημοτικούΔιερεύνηση της Γεωμετρικής Σκέψης των Αποφοίτων του Δημοτικού
Διερεύνηση της Γεωμετρικής Σκέψης των Αποφοίτων του ΔημοτικούChristos Skarkos
 

Andere mochten auch (20)

P1111143901
P1111143901P1111143901
P1111143901
 
Jammer
JammerJammer
Jammer
 
Run time dynamic partial reconfiguration using microblaze soft core processor...
Run time dynamic partial reconfiguration using microblaze soft core processor...Run time dynamic partial reconfiguration using microblaze soft core processor...
Run time dynamic partial reconfiguration using microblaze soft core processor...
 
Distribution network reconfiguration for loss reduction and voltage
Distribution network reconfiguration for loss reduction and voltageDistribution network reconfiguration for loss reduction and voltage
Distribution network reconfiguration for loss reduction and voltage
 
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
Introducing Undergraduate Electrical Engineering Students to Chaotic Dynamics...
 
Sacolloq
SacolloqSacolloq
Sacolloq
 
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаосМ.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
 
Logistic map
Logistic mapLogistic map
Logistic map
 
VOLTAGE SAG AND SWELL ALLEVIATION IN DISTRIBUTION NETWORK USING CUSTOM POWER...
 VOLTAGE SAG AND SWELL ALLEVIATION IN DISTRIBUTION NETWORK USING CUSTOM POWER... VOLTAGE SAG AND SWELL ALLEVIATION IN DISTRIBUTION NETWORK USING CUSTOM POWER...
VOLTAGE SAG AND SWELL ALLEVIATION IN DISTRIBUTION NETWORK USING CUSTOM POWER...
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
 
OPTIMAL PLACEMENT OF DISTRIBUTED GENERATION
OPTIMAL PLACEMENT OF DISTRIBUTED GENERATION OPTIMAL PLACEMENT OF DISTRIBUTED GENERATION
OPTIMAL PLACEMENT OF DISTRIBUTED GENERATION
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on Matlab
 
Chaos Theory
Chaos TheoryChaos Theory
Chaos Theory
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Chaos Theory: An Introduction
Chaos Theory: An IntroductionChaos Theory: An Introduction
Chaos Theory: An Introduction
 
SOS
SOS SOS
SOS
 
Διερεύνηση της Γεωμετρικής Σκέψης των Αποφοίτων του Δημοτικού
Διερεύνηση της Γεωμετρικής Σκέψης των Αποφοίτων του ΔημοτικούΔιερεύνηση της Γεωμετρικής Σκέψης των Αποφοίτων του Δημοτικού
Διερεύνηση της Γεωμετρικής Σκέψης των Αποφοίτων του Δημοτικού
 
presentatie Bremmer OG
presentatie Bremmer OGpresentatie Bremmer OG
presentatie Bremmer OG
 
Parkour
ParkourParkour
Parkour
 

Ähnlich wie P1151351311

June 2022: Top 10 Read Articles in Signal & Image Processing
June 2022: Top 10 Read Articles in Signal & Image   ProcessingJune 2022: Top 10 Read Articles in Signal & Image   Processing
June 2022: Top 10 Read Articles in Signal & Image Processingsipij
 
April 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image ProcessingApril 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image Processingsipij
 
May 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image ProcessingMay 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image Processingsipij
 
July 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image ProcessingJuly 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image Processingsipij
 
January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing	January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing sipij
 
August 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image ProcessingAugust 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image Processingsipij
 
April 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image ProcessingApril 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image Processingsipij
 
September 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image ProcessingSeptember 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image Processingsipij
 
October 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image ProcessingOctober 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image Processingsipij
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataeSAT Publishing House
 
A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...IAEME Publication
 
A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...IAEME Publication
 
Optimized image processing and clustering to mitigate security threats in mob...
Optimized image processing and clustering to mitigate security threats in mob...Optimized image processing and clustering to mitigate security threats in mob...
Optimized image processing and clustering to mitigate security threats in mob...TELKOMNIKA JOURNAL
 
Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...TELKOMNIKA JOURNAL
 
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...IJECEIAES
 
An ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingAn ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingeSAT Publishing House
 
An ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadAn ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadeSAT Journals
 
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...Editor IJMTER
 

Ähnlich wie P1151351311 (20)

P1151345302
P1151345302P1151345302
P1151345302
 
June 2022: Top 10 Read Articles in Signal & Image Processing
June 2022: Top 10 Read Articles in Signal & Image   ProcessingJune 2022: Top 10 Read Articles in Signal & Image   Processing
June 2022: Top 10 Read Articles in Signal & Image Processing
 
April 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image ProcessingApril 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image Processing
 
May 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image ProcessingMay 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image Processing
 
July 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image ProcessingJuly 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image Processing
 
January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing	January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing
 
August 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image ProcessingAugust 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image Processing
 
April 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image ProcessingApril 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image Processing
 
September 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image ProcessingSeptember 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image Processing
 
October 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image ProcessingOctober 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image Processing
 
Pratibha
PratibhaPratibha
Pratibha
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automata
 
A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...
 
A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...A novel technique of visual cryptography for maintaining the security of visu...
A novel technique of visual cryptography for maintaining the security of visu...
 
Optimized image processing and clustering to mitigate security threats in mob...
Optimized image processing and clustering to mitigate security threats in mob...Optimized image processing and clustering to mitigate security threats in mob...
Optimized image processing and clustering to mitigate security threats in mob...
 
Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...
 
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
Hybrid chaotic map with L-shaped fractal Tromino for image encryption and dec...
 
An ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingAn ideal steganographic scheme in networks using
An ideal steganographic scheme in networks using
 
An ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadAn ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payload
 
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
 

Mehr von Ashraf Aboshosha (20)

P1121352313
P1121352313P1121352313
P1121352313
 
P1121340296
P1121340296P1121340296
P1121340296
 
P1121340294
P1121340294P1121340294
P1121340294
 
P1121327289
P1121327289P1121327289
P1121327289
 
P1151442347
P1151442347P1151442347
P1151442347
 
P1151439345
P1151439345P1151439345
P1151439345
 
P1151424332
P1151424332P1151424332
P1151424332
 
P1151423331
P1151423331P1151423331
P1151423331
 
P1151420328
P1151420328P1151420328
P1151420328
 
P1151418327
P1151418327P1151418327
P1151418327
 
P1151404314
P1151404314P1151404314
P1151404314
 
P1111351312
P1111351312P1111351312
P1111351312
 
P1111444352
P1111444352P1111444352
P1111444352
 
P1111440346
P1111440346P1111440346
P1111440346
 
P1111431335
P1111431335P1111431335
P1111431335
 
P1111410320
P1111410320P1111410320
P1111410320
 
P1111410321
P1111410321P1111410321
P1111410321
 
P1111350310
P1111350310P1111350310
P1111350310
 
P1111348307
P1111348307P1111348307
P1111348307
 
P1111343299
P1111343299P1111343299
P1111343299
 

Kürzlich hochgeladen

COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptxrouholahahmadi9876
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...jabtakhaidam7
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 

Kürzlich hochgeladen (20)

COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 

P1151351311

  • 1. Secure Image Encryption using Two Dimensional Logistic Map * Gangadhar Tiwari1, Debashis Nandi2, Abhishek Kumar3, Madhusudhan Mishra4 1, 2Department of Information Technology, NIT Durgapur (W.B.), India 3Department of Electronics and Electrical Engineering, NITAP, (A.P.), India 4Department of Electronics and Communication Engineering, NERIST, (A.P.), India 1www.icgst.com http://www.icgst.com/paper.aspx?pid=P1151351311
  • 2. Current researches in image encryption techniques suggest using chaotic systems. But, one-dimensional (1D) chaotic schemes have drawbacks like small key space and weak security. This paper proposes a novel chaotic image encryption scheme based on two-dimensional (2D) logistic map. The 2D logistic map has more complex chaotic behaviors with respect to 1D logistic map like basin structures and attractors. The proposed scheme is based on permutation-substitution network and offers good confusion and diffusion properties in stream and block ciphers both. It encrypts plaintext image into random-like ciphertext image by generating the pseudorandom sequences from logistic map. The key schedule algorithm translates a binary encryption key to initial values and system parameters used in the 2D logistic map. This scheme uses 256 bit long cipher key for encryption/decryption. Experimental result indicates that the proposed scheme is secure against known cryptanalytic attacks and offers superior performance compared to existing chaotic image encryption schemes. 2www.icgst.com http://www.icgst.com/paper.aspx?pid=P1151351311 Secure Image Encryption using Two Dimensional Logistic Map Abstract
  • 3. 3www.icgst.com Mr. Gangadhar Tiwari completed B.Sc.(Mathematics) from Guwahati University, Guwahati in 2006 and M.Sc.(Information Technology) from Punjab Technical University,Jalandhar in 2011. Currently, he is pursuing PhD at NIT Durgapur, India.His research interests include Information Security and Digital Image Processing. NIT Durgapur http://www.nitdgp.ac.in/
  • 4. 4www.icgst.com Dr. Debashis Nandi received his BE degree in Electronics and Communication Engineering from RE College, Durgapur (University of Burdwan), India, in 1994 and M. Tech. Degree from Burdwan University on Microwave Engineering in 1997. He received his PhD degree from IIT, Kharagpur, India on Medical Imaging Technology. His area of research includes Computer security and cryptography, Secure chaotic communication, Video coding. He is an Associate Professor in the Department of Information Technology, NIT, Durgapur, India. NIT Durgapur http://www.nitdgp.ac.in/
  • 5. 5www.icgst.com Mr. Abhishek Kumar received his B.Tech degree in Electrical and Electronics Engineering from Pondicherry University in 2009 and M.Tech degree in Power System Engineering from North Eastern Regional Institute of Science and Technology, India in the 2012.He is currently working as an Assistant Professor with Department of Electrical & Electronics Engineering, National Institute of Technology, Arunachal Pradesh, India. National Institute of Technology, Arunachal Prades http://www.nitap.in/
  • 6. 6www.icgst.com Mr. Madhusudhan Mishra has completed his B.Tech in Electronics and Communication Engineering from North Eastern Regional Institute of Science and Technology (NERIST), Nirjuli, Arunachal Pradesh in 2004 and M.Tech in Signal Processing from IIT Guwahati in 2011. He worked in Sankara Institute of Technology, Kukas, Jaipur for some years and joined NERIST as Assistant Professor in 2006. His main interest of research area includes Digital Signal and Image Processing. National Institute of Technology, Arunachal Prades http://www.nitap.in/
  • 7. 7