Professional Documents
Culture Documents
Chapter 3
Chapter 3
METHODOLOGY
The methodology for image encryption and decryption using a 3D logistic map
involves several steps to ensure secure and robust encryption. Firstly, a secret key
comprising initial conditions (x, y, z) and control parameters (a, b, c) is generated and
kept confidential. The logistic map equations are then initialized with the key's initial
conditions, and the control parameters determine the chaotic map's behavior. The
plaintext image is divided into blocks or pixels, and a pseudorandom sequence is
generated using the chaotic map to shuffle pixel positions or modify pixel values. This
transformed image undergoes encryption by performing bitwise XOR operations with
a keystream generated from the chaotic map's pseudorandom numbers. To decrypt the
image, the same secret key is used, initializing the chaotic map with the initial
conditions and control parameters to generate an identical pseudorandom sequence.
The encrypted image is XORed with the keystream to obtain the transformed image,
which is then reconstructed using the inverse transformation process. This
methodology provides a high level of security due to the chaotic map's sensitivity to
the key parameters, offering resistance against various attacks and making it suitable
for secure image communication, storage, and privacy protection applications.
Figure:-3.1 Algorithms
20
3.1 SYSTEM FLOW DIAGRAM
Figure 1 shows the overview of the proposed method and execution of data based on
Image encryption using 3D logistic map.
21
3.3 ENCRYPTION:
It consist of three main steps:
a. Key Generation.
b. Image Transformation.
c. Image Encryption.
A secret key is generated, which consists of initial conditions (x, y, z) and control
parameters (a, b, c). These values are kept confidential and are known only to the
sender and receiver.
The plaintext image is divided into blocks or pixels, and each block is represented by
a bit sequence. The chaotic map generates a sequence of pseudorandom numbers,
which are used to shuffle the pixel positions or modify the pixel values in the image.
This transformation makes the encrypted image appear completely different from the
original image.
Figure:-3.3 Encryption
22
3.4 DECRYPTION:
It consist of two main steps:
a. Image Decryption.
b. Image Reconstruction.
Figure:-3.4 Decryption
23
APPLICATION OF IMAGE ENCRYPTION
Image encryption has various applications across different domains. Some of the key
applications of image encryption are:
2. Privacy Protection: With the increasing use of digital imaging devices, preserving
privacy has become crucial. Image encryption techniques help protect the privacy of
personal images, such as photographs, by encrypting them before storing them on
cloud storage or sharing them with others. This ensures that only authorized
individuals can access and view the private images.
3. Medical Imaging: Medical images contain sensitive patient information and need to
be securely stored and transmitted. Image encryption techniques play a vital role in
safeguarding medical images, such as X-rays, CT scans, and MRIs, to protect patient
privacy and prevent unauthorized access. It ensures that only authorized medical
professionals can access and analyze the sensitive medical data.
24
6. Military and Government Applications: Image encryption is of significant
importance in military and government applications where secure communication and
data protection are critical. Encrypted images are used for secure transmission of
classified information, satellite imaging, and remote sensing to safeguard national
security interests.
8. Augmented Reality and Virtual Reality (AR/VR): Image encryption plays a role in
securing virtual reality and augmented reality applications by protecting the privacy
of user-generated images or sensitive visual information captured by AR/VR devices.
Encryption ensures that the AR/VR content remains confidential and cannot be
tampered with during transmission or storage.
25