Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Chapter- 3

METHODOLOGY

The methodology for image encryption and decryption using a 3D logistic map
involves several steps to ensure secure and robust encryption. Firstly, a secret key
comprising initial conditions (x, y, z) and control parameters (a, b, c) is generated and
kept confidential. The logistic map equations are then initialized with the key's initial
conditions, and the control parameters determine the chaotic map's behavior. The
plaintext image is divided into blocks or pixels, and a pseudorandom sequence is
generated using the chaotic map to shuffle pixel positions or modify pixel values. This
transformed image undergoes encryption by performing bitwise XOR operations with
a keystream generated from the chaotic map's pseudorandom numbers. To decrypt the
image, the same secret key is used, initializing the chaotic map with the initial
conditions and control parameters to generate an identical pseudorandom sequence.
The encrypted image is XORed with the keystream to obtain the transformed image,
which is then reconstructed using the inverse transformation process. This
methodology provides a high level of security due to the chaotic map's sensitivity to
the key parameters, offering resistance against various attacks and making it suitable
for secure image communication, storage, and privacy protection applications.

Figure:-3.1 Algorithms

20
3.1 SYSTEM FLOW DIAGRAM

Figure 1 shows the overview of the proposed method and execution of data based on
Image encryption using 3D logistic map.

Figure:-3.2 Flow Diagram

21
3.3 ENCRYPTION:
It consist of three main steps:
a. Key Generation.
b. Image Transformation.
c. Image Encryption.

3.3.1 Key Generation:

A secret key is generated, which consists of initial conditions (x, y, z) and control
parameters (a, b, c). These values are kept confidential and are known only to the
sender and receiver.

3.3.2 Image Trasformation:

The plaintext image is divided into blocks or pixels, and each block is represented by
a bit sequence. The chaotic map generates a sequence of pseudorandom numbers,
which are used to shuffle the pixel positions or modify the pixel values in the image.
This transformation makes the encrypted image appear completely different from the
original image.

3.3.3 Image Encryption:


The transformed image undergoes encryption using bitwise XOR (exclusive OR)
operations. The chaotic map generates a keystream, which is XORed with the
transformed image to produce the encrypted image. The keystream is generated by
using the chaotic map to generate pseudorandom numbers based on the control
parameters (a, b, c).

Figure:-3.3 Encryption

22
3.4 DECRYPTION:
It consist of two main steps:
a. Image Decryption.
b. Image Reconstruction.

3.4.1 Image Decryption


To decrypt the encrypted image, the receiver uses the same secret key and follows the
inverse operations of the encryption process. The chaotic map is initialized with the
same initial conditions and control parameters to generate the same pseudorandom
sequence. The encrypted image is XORed with the keystream to obtain the
transformed image.

3.4.2 Image Reconstruction


The transformed image is reconstructed by applying the inverse transformation
process. The pseudorandom numbers generated by the chaotic map are used to restore
the original pixel positions or values. The reconstructed image is identical to the
original plaintext image.

Figure:-3.4 Decryption

23
APPLICATION OF IMAGE ENCRYPTION
Image encryption has various applications across different domains. Some of the key
applications of image encryption are:

1. Secure Image Communication: Image encryption ensures the confidentiality and


integrity of images during transmission over insecure communication channels, such
as the internet. It prevents unauthorized access and tampering of sensitive visual
information, making it suitable for secure image sharing, online messaging, and video
conferencing.

2. Privacy Protection: With the increasing use of digital imaging devices, preserving
privacy has become crucial. Image encryption techniques help protect the privacy of
personal images, such as photographs, by encrypting them before storing them on
cloud storage or sharing them with others. This ensures that only authorized
individuals can access and view the private images.
3. Medical Imaging: Medical images contain sensitive patient information and need to
be securely stored and transmitted. Image encryption techniques play a vital role in
safeguarding medical images, such as X-rays, CT scans, and MRIs, to protect patient
privacy and prevent unauthorized access. It ensures that only authorized medical
professionals can access and analyze the sensitive medical data.

4. Digital Rights Management (DRM): Image encryption is utilized in DRM systems


to protect copyrighted images and prevent unauthorized reproduction or distribution.
Encryption techniques can be employed to encrypt the images and ensure that they
can only be accessed by authorized users or licensed devices.

5. Forensic Image Analysis: In forensic investigations, image encryption techniques


can be used to securely store and transmit digital evidence, such as crime scene
photographs or surveillance images. Encryption ensures the integrity and authenticity
of the evidence, maintaining its admissibility in legal proceedings and preventing
tampering or unauthorized access.

24
6. Military and Government Applications: Image encryption is of significant
importance in military and government applications where secure communication and
data protection are critical. Encrypted images are used for secure transmission of
classified information, satellite imaging, and remote sensing to safeguard national
security interests.

7. Cloud Computing and Storage: Image encryption techniques are employed to


secure images stored in cloud-based platforms. Encryption ensures that even if the
cloud provider's infrastructure is compromised, the encrypted images remain
unreadable and protected from unauthorized access.

8. Augmented Reality and Virtual Reality (AR/VR): Image encryption plays a role in
securing virtual reality and augmented reality applications by protecting the privacy
of user-generated images or sensitive visual information captured by AR/VR devices.
Encryption ensures that the AR/VR content remains confidential and cannot be
tampered with during transmission or storage.

25

You might also like