B Tech Seminar Report Template
B Tech Seminar Report Template
A Seminar Report
Submitted to the APJ Abdul Kalam Technological University
in partial fulfillment of requirements for the award of degree
Bachelor of Technology
in
Electronics and Communication Engineering
by
Basil Biju(MUT21EC020)
CERTIFICATE
This is to certify that the report entitled ”Chaotic Image Encryption Using
Logistic Map” submitted by Basil Biju ( Reg. No.:MUT21EC020), to the APJ
Abdul Kalam Technological University in partial fulfillment of the B.Tech.degree
in Electronics and Communication Engineering is a bonafide record of the seminar
presentation carried out by them under our guidance and supervision. This report in
any form has not been submitted to any other University or Institute for any purpose.
Dr.Abhilash Antony
Professor and Head
Dept.of ECE
Muthoot Institute Of Technology and Science
Ernakulam
DECLARATION
I hereby declare that the seminar report title, submitted for partial fulfillment of
the requirements for the award of degree of Bachelor of Technology of the APJ
Abdul Kalam Technological University, Kerala is a bonafide work done by us under
supervision of ”guide name” .
This submission represents our ideas in our own words and where ideas or words
of others have been included, we have adequately and accurately cited and referenced
the original sources.
I also declare that I have adhered to ethics of academic honesty and integrity
and have not misrepresented or fabricated any data or idea or fact or source in my
submission. I understand that any violation of the above will be a cause for disciplinary
action by the institute and/or the University and can also evoke penal action from the
sources which have thus not been properly cited or from whom proper permission has
not been obtained. This report has not been previously formed the basis for the award
of any degree, diploma or similar title of any other University.
15.10.2024
Abstract
i
advancements in the field have explored the use of hybrid chaotic maps and multi-
dimensional logistic systems to further enhance the security of image encryption. This
approach is advantageous in applications such as secure image sharing, confidential
communications, and watermarking, where preserving data privacy is paramount.
As computational needs evolve, chaotic image mapping using logistic maps offers a
scalable and adaptable solution for maintaining data security in the face of increasingly
sophisticated cyber threats.
ii
Acknowledgement
First, I sincerely thank the Almighty who is most beneficent and merciful for giving
me knowledge and courage to complete the seminar work successfully.
I derive immense pleasure in expressing our sincere thanks to the Principal Dr.
Neelakantan P.C, for his permission and infrastructural facilities for the successful
completion of my seminar.
I express my gratitude to Dr. Abhilash Antony, Head of the Department, ECE, for
his encouragement and motivation during my seminar. I express my heartfelt gratitude
to Dr. Abhilash Antony, Head of the Department, Department of ECE, Seminar Guide,
for his/her valuable guidance and suggestions during the seminar.
Basil Biju
iii
Contents
Abstract i
Acknowledgement iii
List of Figures vi
1 Introduction 1
2 Literature Review 3
2.1 IMAGE ENCRYPTION USING CHAOTIC MAPS . . . . . . . . . . 3
2.2 A novel chaos-based permutation for image encryption . . . . . . . . 4
2.3 Logistic Map: Stability and Entrance to Chaos . . . . . . . . . . . . 6
3 System Development 8
3.0.1 Overview of System Development . . . . . . . . . . . . . . . 8
3.0.2 Requirements and Design Principles . . . . . . . . . . . . . . 8
3.0.3 Architecture of the Chaos-Based Image Encryption System . . 9
3.0.4 Implementation Details . . . . . . . . . . . . . . . . . . . . . 10
3.0.5 Security Measures and Performance Optimization . . . . . . . 10
3.0.6 Testing and Validation . . . . . . . . . . . . . . . . . . . . . 10
iv
4.0.2 Security Analysis . . . . . . . . . . . . . . . . . . . . . . . . 13
4.0.3 Histogram Analysis . . . . . . . . . . . . . . . . . . . . . . . 14
4.0.4 Comparison with Traditional Methods . . . . . . . . . . . . . 15
4.0.5 Practical Applications and Challenges . . . . . . . . . . . . . 16
5 Conclusion 17
5.0.1 Summary of Findings . . . . . . . . . . . . . . . . . . . . . . 17
5.0.2 Advantages of Chaos-Based Encryption . . . . . . . . . . . . 17
5.0.3 Limitations and Challenges . . . . . . . . . . . . . . . . . . 18
5.0.4 Future Research Directions . . . . . . . . . . . . . . . . . . . 18
5.0.5 Closing Remarks . . . . . . . . . . . . . . . . . . . . . . . . 19
References 20
v
List of Figures
vi
List of Tables
vii
List of Symbols
viii
Chapter 1
Introduction
In the digital age, where the volume of sensitive information shared over the internet
is continually expanding, ensuring the security of digital media has become essential.
Images, in particular, are widely used in fields like healthcare, military, and financial
services, where confidentiality and integrity are paramount. Traditional cryptographic
methods, though effective for textual data, often face challenges when applied to
multimedia data, as images have unique properties such as high pixel correlation and
redundancy. To address these challenges, chaotic image encryption has emerged as
a promising approach, leveraging the inherent properties of chaos theory to provide
secure and efficient encryption methods. Chaotic image encryption using a logistic
map is one such approach, where the system’s sensitiv- ity to initial conditions and
control parameters offers a high degree of unpredictability and security. The logistic
map, a simple yet powerful chaotic function, generates pseudorandom sequences based
on initial values that determine the chaotic behavior of the system. This feature
makes it an ideal candidate for encryption, as a slight change in the parameters can
yield drastically different out- comes, creating a robust defense against unauthorized
decryption. In chaotic image encryption, the logistic map sequences are used to
permute and substitute image pixels, scrambling the image content to produce a secure
and unrecognizable output. The process is lightweight and computa- tionally efficient,
which is particularly advantageous in real-time applications and in environments
with limited processing resources. This report delves into the concept of chaotic
image encryption using logistic maps, exploring the mathematical foundations of
1
the logistic map and its chaotic properties. It also examines the encryption and
decryption processes, highlighting the roles of permutation and substitution in cre-
ating a secure mapping of image data. The report further analyzes the effectiveness of
this method against various attacks and evaluates its suitability for different types of
applications. Through a detailed examination, this report aims to provide insights into
the advantages, limitations, and potential improvements of using logistic map-based
chaotic encryption, ultimately contributing to a better understanding of how chaos
theory can enhance digital security in modern applications.
2
Chapter 2
Literature Review
3
dynamic key updates during encryption.
Other studies have explored various chaotic approaches for image encryption,
utilizing different types of chaotic maps and combinations of cryptographic principles.
For example, Mazleena et al. developed a variable-sized image encryption method
using Baker’s map, introducing pixel shifts and the XOR operation to heighten
encryption robustness. Similarly, Gao et al. investigated nonlinear chaotic encryption
with tangent and power functions, and Awad and Saadane applied piecewise linear
chaotic maps to strengthen their encryption against cryptanalysis. Gupta’s work builds
on these advancements by integrating the efficiency of a 1D logistic map, focusing on
maximizing encryption speed while maintaining high-security standards.
The robustness of chaotic encryption schemes depends heavily on key sensitivity, a
point the authors emphasize in their key sensitivity tests. In the proposed scheme, even
a single bit change in the encryption key results in significantly different encryption
outputs, demonstrating its resilience to brute-force attacks. Furthermore, the statistical
analyses conducted show that encrypted images maintain uniform histograms and low
correlation between adjacent pixels, key indicators of effective encryption in image
cryptography.
This study contributes to the literature on chaotic image encryption by demon-
strating the practical viability and security of 1D logistic map-based encryption in
real-world applications, particularly for secure image transmission in limited-resource
environments. Future studies might expand on this by exploring multi-dimensional
logistic maps and alternative chaotic functions to further enhance cryptographic
strength while balancing computational demands.
4
Secondly, a secure cipher was achieved through the use of index-based permutation.
Talhaoui et al. have introduced a new method of image encryption based on a
1D cosine chaotic system (Wang et al., 2021). Their research shows that this new
system exhibits improved chaotic behaviors and performance compared to previous
methods. The image encryption was carried out using a parallel mode of the shifted
scrambling diffusion method. However, despite its promising features, the proposed
cipher [2] employed a classical structure for scrambling and its security was found to
be inadequate. Mansouri and Wang enhanced the Arnold system for digital image
encryption (Mansouri and Wang, 2021). They incorporated an improved Arnold
system with a shuffle operation to achieve confusion and diffusion for the cipher
images. The resulting cipher exhibited high sensitivity and resistance to well-known
attacks. However, the proposed algorithm may not be resistant to other types of
cryptanalysis attacks, and the security needs to be verified after multiple rounds of the
Arnold system. A novel medical image encryption algorithm was proposed by Muthu
and Murali, utilizing a newly developed 1D chaotic map (Muthu and Murali, 2022).
This map provided a larger space for the secret key and generated the key stream
at a faster rate. Diffusion and confusion were achieved through the use of a shuffle
operation. However, the proposed cipher for medical images demonstrated weak
diffusion performance. Shahna and Mohamed introduced a new image encryption
method based on chaos (Shahna and Mohamed, 2021). The key stream was generated
using Lorenz’s chaotic map, and pixel-level and bit-level scramble and diffusion
operations were applied at two levels. While the proposed algorithm demonstrated
a highly secure cipher image, the time consumption was prolonged due to the bit-level
scrambling. A new image encryption algorithm based on the logistic map has been
proposed by Wang and Gao (2020). The algorithm utilized a 2D logistic-adjusted sine
chaotic map to generate the chaotic data sequence for encrypting the digital image.
Two encryption rounds were achieved by combining the Boolean network with the
chaotic data sequence. The proposed algorithm demonstrated improved security, but
the use of the 2D chaotic map was computationally intensive. In another study (Hua et
al., 2019), Hua et al. (2019) introduced a novel technique to improve classical chaotic
maps like the logistic, sine, and tent maps. Their approach involved using the cosine-
transform method in combination with two seed maps, resulting in enhanced chaotic
5
performance and the generation of several new chaotic maps. Furthermore, the authors
proposed a new image encryption algorithm that utilized scrambling and substitution
operations, with a total of four rounds of encryption. However, the time required to
produce the cipher image was long. Li et al. (2017) have proposed a simple new
algorithm for chaotic image encryption, utilizing the classical tent map. The keystream
was produced from the chaotic data sequence, and the digital image was encrypted
directly using the Exclusive OR (XOR) operation. Unfortunately, the effectiveness
of this new chaotic image encryption algorithm was very weak and was subsequently
breached by Wu et al. (2017) in their paper. In the same paper, Wu et al. developed
an image encryption algorithm based on Li’s cipher, which was subsequently also later
broken by Zhu and Sun (2018). Gao et al. (2023b) propose a 3D model encryption
technique that utilizes a 2D chaotic system created through the combination of logistic
map and infinite collapse (2D-LAIC), along with semi-tensor product (STP) theory.
Compared to classical chaotic systems, 2D-LAIC demonstrates superior dynamical
behavior. The study’s comprehensive security and experimental analysis shows that
the proposed algorithm, 3DME-SC, is highly efficient and effective.
6
The Logistic Map is one of the most widely known examples of a nonlinear
difference equation that reveals chaotic dynamics. Represented as
where u is a population variable and r represents the growth rate, this equation
models population growth under environmental constraints. When visualizing the
Logistic Map with different values of r, it becomes [4]evident that the population
behavior changes dramatically with increases in the growth rate. For low values of
r, the population stabilizes to a constant value. As r increases, the system enters a state
of periodic cycles, where the population oscillates between different values, exhibiting
bifurcation. [5] Beyond a threshold value, around r¿3.57, the system enters a chaotic
state where the population no longer stabilizes but fluctuates seemingly randomly. This
transition to chaos with increasing bifurcations reveals a fractal structure, often linked
to the Mandelbrot set.
This phenomenon is not isolated to the Logistic Map; similar chaotic behavior is
observed across various mathematical functions. Feigenbaum discovered a universal
constant that describes the rate at which these bifurcations occur in a wide range of
chaotic systems, a finding that was foundational in developing the mathematical theory
of chaos. His work demonstrated that the periodic doubling in systems undergoing
bifurcation follows a consistent rate of convergence, known as Feigenbaum’s constant.
This insight provided a new understanding of how simple rules in nonlinear systems
can produce complex, chaotic outcomes [6] over time. Chaotic systems, although
governed by deterministic laws, exhibit behavior that is highly sensitive to initial
conditions, a property that complicates long-term predictions.
Key definitions further clarify concepts related to chaotic systems. Fixed points in
a function f are values that remain unchanged under f, and sequences converge if they
approach a specific limit. A fixed point is attractive if sequences converge toward it
and repulsive if they diverge away. Cyclic behavior in nonlinear maps, where values
periodically return to a prior state after a set number of iterations, represents another
form of stability or pattern within the otherwise unpredictable chaos. Together, these
elements contribute to the understanding of how even simple iterative processes can
lead to complex, often unpredictable dynamics.
7
Chapter 3
System Development
8
carefully chosen chaotic maps to maximize entropy and pseudo-randomness. Overall,
these principles guide the system’s architecture, ensuring that it remains both robust
against attacks and manageable in terms of resource consumption.
9
3.0.4 Implementation Details
The implementation involves the use of specific chaotic maps—such as the Logistic
map, Tent map, and Henon map—selected for their capacity to generate complex
and unpredictable sequences from small variations in initial conditions. These maps
are used to manipulate pixel positions and values, maximizing the encryption’s
randomness and resilience to decryption without the proper key. At the pixel
level, encryption processes are conducted in a way that ensures optimal diffusion
and confusion of the image data, which effectively obscures original patterns or
recognizable structures in the encrypted output. Key generation and encryption
processes are structured to leverage the chaotic maps in both the permutation and
diffusion stages, where each pixel’s transformed value is dependent on its neighbors,
providing a thorough level of inter-pixel dependency that enhances security.
To ensure the highest level of security, the system incorporates measures like entropy
maximization and pseudo-randomness, which are essential in chaotic encryption
schemes. High entropy in encrypted images minimizes predictability, making it
difficult for attackers to infer patterns or partial information from the encrypted data.
Randomness tests, such as those from the NIST Statistical Test Suite, are performed
to confirm that the encrypted output achieves adequate levels of unpredictability.
Performance optimization is also a key concern; techniques like hardware acceleration
and efficient chaotic algorithms are used to maintain a balance between encryption
robustness and processing efficiency. These optimizations make the system suitable
for applications requiring real-time encryption, such as secure video streaming and
high-speed data transmission.
Rigorous testing is conducted to validate both the performance and security of the
encryption system. Randomness tests, including NIST Statistical Tests, verify that
the encryption process introduces sufficient entropy, making the encrypted images
10
appear as random as possible. Performance testing evaluates factors such as encryption
and decryption speed, processing load, and resource usage, ensuring that the system
can be implemented in real-world applications without significant delays. Security
validation encompasses tests to assess resistance to common attacks, including brute-
force and known-plaintext attacks. The system’s ability to resist such attacks ensures
its effectiveness in protecting image data from unauthorized access or tampering.
11
Chapter 4
12
Figure 4.1: Encryption result
13
Figure 4.2: correlation
14
Figure 4.3: Histagram analysis
15
4.0.5 Practical Applications and Challenges
The applications of chaos-based image encryption extend across fields like secure
image storage, medical data security, and the Internet of Things (IoT). In telemedicine,
for example, chaos-based encryption can ensure patient confidentiality by securing
sensitive images, such as X-rays, as they are transmitted over networks. The
Internet of Things also stands to benefit from lightweight, fast encryption systems that
chaos-based techniques can provide, particularly with limited computing resources
on IoT devices. However, implementing chaos-based encryption systems presents
several challenges. These include the sensitivity of chaotic systems to computational
precision, which can introduce potential errors during encryption and decryption.
Additionally, low-dimensional chaotic maps may exhibit periodic behavior, which
could create vulnerabilities. High-dimensional chaotic systems, while more secure,
demand greater processing power and complexity. Addressing these challenges is key
to advancing chaos-based encryption for secure and efficient use in modern, practical
applications.
16
Chapter 5
Conclusion
17
in initial parameters produce vastly different encryption outcomes, ensuring a high
degree of security even with small changes in key data. Furthermore, the versatility
of chaotic systems allows them to be applied effectively in both the spatial and
frequency domains, enabling encryption approaches that can target specific image
characteristics and adapt to various image types and compression needs. Additionally,
chaos-based systems are computationally efficient; unlike many traditional encryption
methods, they provide high security without substantial processing power, which is
crucial for real-time applications like video surveillance and secure remote data access.
Together, these advantages make chaos-based encryption particularly appealing for
image-focused applications.
There are several avenues for future research to further improve chaos-based image
encryption. One promising direction is the development of hybrid encryption
techniques that combine chaotic systems with other cryptographic methods, such
18
as quantum encryption or neural network-based cryptography. These combinations
can create more resilient and multi-layered security frameworks, addressing some
limitations of chaos-based encryption alone. Another key area for advancement
lies in optimizing key management systems for chaos-based encryption, particularly
in asymmetric frameworks. Improved key distribution and storage mechanisms
could enhance the security and usability of chaotic encryption, fostering wider
adoption in real-world applications. Finally, the exploration of hardware-optimized
implementations, such as FPGA and ASIC designs, can significantly improve the
speed, scalability, and efficiency of chaos-based systems. Hardware solutions could be
especially useful in time-sensitive or resource-limited applications, further broadening
the range of environments where chaos-based encryption can be applied effectively.
19
References
[4] A. OZER and A. Erhan, “Tools for detecting chaos,” Sakarya Üniversitesi Fen
Bilimleri Enstitüsü Dergisi, vol. 9, no. 1, pp. 60–66, 2005.
[5] H. Giacomini, J. Llibre, and M. Viano, “On the nonexistence, existence and
uniqueness of limit cycles,” Nonlinearity, vol. 9, no. 2, p. 501, 1996.
20