Encryption and Decryption Digital Image Using
Encryption and Decryption Digital Image Using
Chaotic Map
By
Supervision
In the past years, many encryption modes have been proposed including scan
mode method [5], double random phase encoding [6], encoding and iterative
random rotation converts vector encoding [7, 8], the quad tree coding [9], and
coding and chaotic function Kolmogorov flow [10]. However, Due to the hi
randomness and initial sensitivity, chaotic encryption has been used widely and
developed fast [11].
a. Chaotic Map
x n=f ( xn −1 ) , k =0 , 1, 2 , … (1)
Where x n is called the state, and f (xn-1) maps the state x n−1 to the next state x n .
However the quadratic chaotic map can be written as [12]:
This system exhibits a great variety of dynamics, depending upon the value
of the bifurcation parameter (r) [12].
The block diagram for the proposed chaotic sequence generator is shown in
Figure (1). The chaotic sequence generator shown in the block diagram
generates random chaotic signal from chaotic quadratic map for different initial
values xo and the bifurcation parameter r. the random chaotic signal is mapped
to binary to generate the final chaotic binary sequence.
Figure (2) is showing the chaotic signal generation by the quadratic chaotic
map, and the Figure (3) is showing the chaotic binary sequence generated by
transfer chaotic signal to binary stream.
Chaotic signal
1
0.8 xo=0.3
xo=0.3001
0.6
0.4
0.2
0
-0.2
-0.4
-0.6
-0.8
-1
0 5 10 15 20 25
Time Index
Figure 2 The chaotic signal generation by the quadratic chaotic map. (the
figure show the effect of change initial condition)
0.6
0.5
0.4
0.3
0.2
0.1
0
0 5 10 15 20 25
Time Index
5. Histogram Analysis
The histogram of any image is a chart showing the distribution of the pixel
intensity values. For example, in the 8-bit gray scale image, there are 256
different possible intensities. Therefore, the histogram of it will be display 256
numbers showing the distribution of the pixels amongst those intensities values.
However, the histogram of a good cipher image must have a fairly uniform
shape for any plain images.
Original image
Histogram of
original image
Cipher image
Histogram of
cipher image
In this work a chaotic image encryption algorithm have been discussed. This
algorithm is based on a quadratic chaotic map. The encryption key stream is
generated from quadratic chaotic map by choosing initial condition and
defragment parameter, and then the encryption process can be done by adding
(modulo-2) the stream pits of image to the encryption key generation from
quadratic chaotic map. The study is shown that the suggested algorithm gives a
good performance. Finally, to the future works, a new binary random generator
based on the chaotic linear feedback shift register will be proposed to modify
the performance of the encryption system.
7. References
[7] Y. Zhou, L. Bao, and C. L. P. Chen, “A new 1D chaotic system for image
encryption,” Signal Processing, vol. 97, pp. 172–182, 2014.View
at: Publisher Site | Google Scholar
[11] Q. Zhang, L. Guo, and X. Wei, “Image encryption using DNA addition
combining with chaotic maps,” Mathematical and Computer Modelling,
vol. 52, no. 11-12, pp. 2028–2035, 2010.View at: Publisher Site | Google
Scholar | MathSciNet