Professional Documents
Culture Documents
1. INTRODUCTION
1.1 BACKGROUND
1.2 OBJECTIVE
2. LITERATURE SURVEY
There are different kinds of techniques used for image encryption and they
are
frequency domains. Also frequency domain procedures are further effectual and
consuming collective and widespread transforms such as DCT, DFT and DWT.
Data compression lessons can be classified into two types:
Lossy
Lossy methods compromise a definite loss for information in return with
the high compression proportion. Usually lossy methods decline the superiority of
the object so they are sought out for images, videos and audios for the reason of
human observation. There Lossy coding method also moreover categorized into
the following types:
a. Predictive coding
b. Transform coding
Lossless
On the other hand, some kinds of data could not accept any loss (e.g.
Database records, executable files and word processing files and medical images),
otherwise the data will be degraded, and here the lossless techniques play role.
The Lossless coding technique also further classified into following categories:
For the most part it implies that little contrasts in beginning conditions,
(for example, those because of adjusting errors in numerical calculation) yield
generally separating results for chaotic systems, interpreting long-term prediction
usually intolerable. This happens despite the fact that these frameworks or systems
are deterministic, implying that their future conduct is completely dictated by their
starting conditions, with no arbitrary components included. At the end of the day,
the deterministic nature of these frameworks or systems makes them volatile [28].
According to [29], there are two general ways to apply a chaos map in a cipher
system by using chaotic systems to generate pseudo-random key stream which
corresponds to stream ciphers. And using the plaintext or the secret key(s) as the
preliminary conditions and control parameters then apply some iterations on
chaotic systems to obtain cipher-text corresponding to the block ciphers.
This conduct is known as deterministic chaos, or basically chaos. Irregular
like conduct, non-anticipating and affectability to preliminary value are three
features that make it an adequate choice to relate it with cryptography. The main
distinction is that encryption operations are characterized on limited sets of
numbers while chaos maps are characterized on true numbers. Chaotic behaviors
are displays by chaotic maps. These maps are grouped by non-stop maps and
discrete maps. Discrete maps typically take the manifestation of iterated functions.
Iterates are like rounds in cryptosystems, so discrete chaotic dynamic systems are
utilized as a part of cryptography. Every map consists of parameters which are
correspondent to the encryption key in cryptography.
As per [29], there are two general approaches to apply a chaos map in a
cipher system. first chaotic systems utilization for production of pseudo-arbitrary
key stream which compares to stream ciphers. Second Utilization of the plaintext
or the mystery key(s) as the preliminary conditions and control parameters then
apply a few cycles on chaotic systems to acquire cipher content relating to the
block ciphers.
3. METHODOLOGY
Assume that the plain image is denoted by P with size of M×N, where M
and N are the height and width of the image, respectively. Its gray scale level is L-
bit. N mod 2 = 0 is required in the p this scheme. If not, a zero column vector of
length M should be added to the last column of P to generated a new plain image
with size of M × (N + 1) to replace image P.
On the basis of Fig.3.1, the complete flowchart of the image encryption
scheme is as shown in Fig.3.2. It shows the detailed structure of the encryption
and decryption and the use of chaotic scheme. The secret key of the scheme is
denoted by K = {x0, y0, z0, w0, r1, r2}, where, {x0, y0, z0, w0} come from chaotic
system, and r1 and r2 are 8-bit random numbers. In the encryption process, the
keys {x0, y0, z0, w0} are used as the initial values of hyper-chaotic Lorenz system,
and then six pseudo-random matrices X, Y, U, V, W and Z are generated by
iterating the hyper-chaotic Lorenz system to encrypt the plain image.
The scrambling operation only disturbs the position of each pixel in the
image, and does not change the value of each pixel, so the histograms for before
and after scrambling are the same. The concrete steps of plaintext-related image
scrambling are as follows:
1. For a given pixel location (i, j) in the image A, calculate the coordinate
point (m, n) according to the following formulas:
If ( j mod 2 = 1), then
m=(U(i, j) + sum(A(W(i, j), 1 to N))) mod M + 1
n=(V (i, j) + sum(A(1 to M,Z(i, j)))) mod N + 1
Else
m=(M+1) - [(U(i, j) + sum(A(W(i, j), 1 to N))) mod M + 1]
n=(N+1) - [(V (i, j) + sum(A(1 to M, Z(i, j)))) mod N + 1]
End if
2. If m = i or n = j or m = W(i, j) or n = Z(i, j) or W(i, j) = i or Z(i, j) = j, then
do nothing, else exchange A(i, j) with A(m, n).
3. Traverse each pixel (i, j) in the image A from left to right and top to
bottom, and repeat the above Steps 1 and 2 for each pixel (i, j).
Assume that the secret code matrices used in the scrambling of encryption
are denoted by U, V, W and Z. And the secret code matrices used in the
scrambling of decryption are new U = rot180(U), new V = rot180(V), new W =
(M+1) - rot180(W), and new Z = (N + 1) - rot180(Z) separately, where rot180(U)
represents that matrix U is rotated by 180 degrees. Rotate the scrambled matrix A
by 180 degrees to generate a matrix denoted by B, and the latter is used in the
backward diffusion described in the Backward diffusion.
6. REFERENCES