SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 10, No. 1, February 2020, pp. 188~195
ISSN: 2088-8708, DOI: 10.11591/ijece.v10i1.pp188-195 ๏ฒ 188
Journal homepage: http://ijece.iaescore.com/index.php/IJECE
Performance analysis of transformation and bogdonov chaotic
substitution based image cryptosystem
Prajwalasimha S. N., Basavaraj L.
Department of Electronics and Communication Engineering, ATME Research Centre, India
Article Info ABSTRACT
Article history:
Received Oct 2, 2018
Revised Aug 23, 2019
Accepted Aug 30, 2019
In this article, a combined Pseudo Hadamard transformation and modified
Bogdonav chaotic generator based image encryption technique is proposed.
Pixel position transformation is performed using Pseudo Hadamard
transformation and pixel value variation is made using Bogdonav chaotic
substitution. Bogdonav chaotic generator produces random sequences and it
is observed that very less correlation between the adjacent elements in
the sequence. The cipher image obtained from the transformation stage is
subjected for substitution using Bogdonav chaotic sequence to break
correlation between adjacent pixels. The cipher image is subjected for
various security tests under noisy conditions and very high degree of
similarity is observed after deciphering process between original and
decrypted images.
Keywords:
Chaotic generator
Confidentiality
Correlation
Encryption
Substitution Copyright ยฉ 2020 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Prajwalasimha S N,
Department of Electronics and Communication Engineering,
ATME Research Centre,
Mysuru, Karnataka, India.
Email: prajwalasimha.sn1@gmail.com
1. INTRODUCTION
Images are pictorial depiction of information. Due to swift maturation in internet technology, digital
images being major class of multimedia, plays a vital role in communication systems. These images are
characterized inimitably by high inter pixel redundancy, strong correlation between adjacent pixels and bulk
data capacity [1-7].
Confidentiality is one of the dominant facets of communication system. Fortification of information
can be accomplished by adopting an efficient cryptosystem, which should encrypt and decrypt the information
without flaws. More prevalently and habitually used encryption algorithms such as Rivest, Shamir and
Adleman (RSA), Data Encryption Standard (DES), International Data Encryption Algorithm (IDEA) and
Advance Encryption Standards (AES) are inapposite for images due to their inimitable characteristics [2].
Chaotic systems found proliferate implementation in the fields of cryptography, due to their intrinsic
properties such as volatility, subtlety to the initial conditions, similar casualness and aperiodicity [3, 8].
With the help of chaotic theory, the inter pixel redundancy and strong correlation between adjacent pixels can
be effectively reduced.
In many low dimensional chaos based cryptographic algorithms, the cipher data directly depends on
chaotic orbit of a single chaotic system. Due to this, many low dimensional chaotic systems are more prone to
phase space reconstruction attacks [9]. Such kind of attacks can be reduced by using S-box (Substitution box)
in the algorithm. Complexity of cryptanalysis and brute force attacks can be further reduced by increasing
the size of S-box in the algorithm. One such technique is developed by Silva-Garcรญa and et al [10].
They introduced S-boxes in Advanced Encryption Standard (AES) algorithm to increase the level of security.
Nonlinear chaotic differential equations are used to generate random numbers inside the S-box. But immunity
against noise has not been noticed in the algorithm.
Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ
Performance analysis of transformation and bogdonov chaotic substitution based โ€ฆ (Prajwalasimha S N)
189
A double humped logistic map has been developed by Lingfeng & et al. [11] by introducing general
parameters to the existing chaotic map to generate pseudo random key sequence for the substitution stage.
Robustness of the algorithm against Gaussian noise has been noticed but not against other kind of noises.
Better UACI values are observed for various images but considerable differences in the NPCR values are
noticed compared to ideal values. Rasul Enayatifar & et al. [12] developed combined permutation and
diffusion technique using 3-D logistic chaotic map. Better entropy is observed in the absence of noise for
many standard images but considerable difference in the values of NPCR and UACI is observed compared to
ideal values. A combined 1-D logistic map and 2-D Baker chaotic map based block wise permutation
algorithm has been developed by Lingfeng Liu & et al. [13]. Even though low dimensional chaotic maps are
considered, phase space is made large by multiple chaotic maps. Very minimum correlation between
the adjacent pixels in the cipher image has been noticed along with slightly high entropy but considerable
difference in the values of NPCR and UACI is observed compared to ideal values for few standard images.
Based on the above considerations a combined 2-D Pseudo Hadamard chaotic transformation
(MPHT) and 2-D Bogdonav chaotic random diffusion based algorithm has been proposed in which a large
phase space is considered along with a substitution image. The paper is organized as follows: Section 2
describes the proposed scheme. Section 3 with statistical and differential analysis followed by conclusion
in Section 4.
2. RESEARCH METHOD
Three stages per round are involved in the encryption process: Transformation, Diffusion and
Substitution. Modified Pseudo Hadamard transformation is used in the first stage and random sequence
generated by Bagdonov chaotic generator is used in the substitution stage. Figure 1 illustartes the flow
diagram of the system.
2.1. Encryption algorithm
Step1: Original image of size 2 ๐‘›
X 2 ๐‘›
is transformed using modified Pseudo Hadamard transformation.
๐ป1โ€ฒ(๐‘ฅ, ๐‘ฆ) = ๐ป((๐‘Ž + ๐‘ + ๐‘) ๐‘š๐‘œ๐‘‘ 2 ๐‘›
, (๐‘Ž + 2๐‘ + ๐‘) ๐‘š๐‘œ๐‘‘ 2 ๐‘›
) 1 < ๐‘Ž, ๐‘ < 2 ๐‘›
(1)
Where,
๐ป(๐‘Ž, ๐‘) is the host image of size 2 ๐‘›
X 2 ๐‘›
๐ป1โ€ฒ
(๐‘ฅ, ๐‘ฆ) is the transformed image of size 2 ๐‘›
X 2 ๐‘›
๐‘ is the constant (๐‘ = 37)
Step2: Block truncated substitution image of size 2 ๐‘›
X 2 ๐‘›
is transformed using modified Pseudo Hadamard
transformation.
๐‘†1โ€ฒ(๐‘ฅ, ๐‘ฆ) = ๐‘† ๐‘ก
((๐‘Žโ€ฒ + ๐‘โ€ฒ + ๐‘) ๐‘š๐‘œ๐‘‘ 2 ๐‘›
, (๐‘Žโ€ฒ + 2๐‘โ€ฒ + ๐‘) ๐‘š๐‘œ๐‘‘ 2 ๐‘›
) 1 < ๐‘Žโ€ฒ, ๐‘โ€ฒ < 2 ๐‘› (2)
Where,
๐‘†1โ€ฒ(๐‘Žโ€ฒ, ๐‘โ€ฒ) is the block truncated substitution image of size 2 ๐‘›
X 2 ๐‘›
๐‘† ๐‘ก(๐‘ฅ, ๐‘ฆ) is the transformed truncated image of size 2 ๐‘›
X 2 ๐‘›
๐‘ is the constant ( ๐‘ = 37)
Step3: Both transformed images are subjected for bitwise XOR operation
๐ถ1(๐‘ฅ, ๐‘ฆ) = ๐ปโ€ฒ(๐‘ฅ, ๐‘ฆ) โŠ• ๐‘†โ€ฒ(๐‘ฅ, ๐‘ฆ) (3)
Step4: The cipher image from first stage is subjected for substitution with pre-defined S-box.
๐ถ2(๐‘ฅ, ๐‘ฆ) = ๐ถ1(๐‘ฅ, ๐‘ฆ) โŠ• S-box (4)
Step4: The cipher image from substitution stage is subjected for diffusion with random sequence generated
Bogdonov chaotic equation.
๐‘ฅโ€ฒ
= (๐‘ฅ + ๐‘ฆโ€ฒ)๐‘š๐‘œ๐‘‘ 2 ๐‘› (5)
๐‘ฆโ€ฒ
= (๐‘ฆ + ๐œ€๐‘ฆโ€ฒ
+ ๐พ๐‘ฅโ€ฒ(๐‘ฅโ€ฒ
โˆ’ 1) + ๐œ‡๐‘ฅโ€ฒ๐‘ฆโ€ฒ) ๐‘š๐‘œ๐‘‘ 2 ๐‘› (6)
๏ฒ ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 188 - 195
190
Where,
ฮต = 7(d)2
K = 9(d)2
ฮผ = 3(d)
d = โˆ‘ โˆ‘ ๐ป(๐‘Ž, ๐‘)256
1
256
1
๐ถ3(๐‘ฅ, ๐‘ฆ) = ๐ถ2(๐‘ฅ, ๐‘ฆ) โŠ• ๐‘ฅโ€ฒ (7)
Where,
๐ถ3(๐‘ฅ, ๐‘ฆ) is the cipher image after diffusion of size 2 ๐‘›
X 2 ๐‘›
Step5: The number of execution rounds (d) is placed in the four extreme corners of the cipher image along
with the respective pixel values.
Figure 1. Flow diagram of proposed cryptosystem
2.2. Decryption algorithm
The number of rounds for decryption stage (d) is taken from the pixel values in the four extreme
corners of the cipher image.
Step1: The cipher image is then subjected for XOR operation with random sequence generated Bogdonav
chaotic equation with the same constant co-efficient.
๐‘ฅโ€ฒ
= (๐‘ฅ + ๐‘ฆโ€ฒ)๐‘š๐‘œ๐‘‘ 2 ๐‘› (8)
๐‘ฆโ€ฒ
= (๐‘ฆ + ๐œ€๐‘ฆโ€ฒ
+ ๐พ๐‘ฅโ€ฒ(๐‘ฅโ€ฒ
โˆ’ 1) + ๐œ‡๐‘ฅโ€ฒ๐‘ฆโ€ฒ) ๐‘š๐‘œ๐‘‘ 2 ๐‘› (9)
Where,
ฮต = 7(d)2
K = 9(d)2
ฮผ = 3(d)
Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ
Performance analysis of transformation and bogdonov chaotic substitution based โ€ฆ (Prajwalasimha S N)
191
๐ถ2โ€ฒ(๐‘ฅ, ๐‘ฆ) = ๐ถ3โ€ฒ(๐‘ฅ, ๐‘ฆ) โŠ• ๐‘ฅโ€ฒ (10)
Step2: The obtained cipher image XORed with the elements of S-box used for encryption.
๐ถ1โ€ฒ(๐‘ฅ, ๐‘ฆ) = ๐ถ3โ€ฒ(๐‘ฅ, ๐‘ฆ) โŠ•S-box (11)
Step3: The block truncated substitution image is subjected for MPHT with same constant and then XORed
with cipher image from previous stage.
๐‘†1โ€ฒ(๐‘ฅ, ๐‘ฆ) = ๐‘† ๐‘ก(๐‘Žโ€ฒ + ๐‘โ€ฒ + ๐‘) ๐‘š๐‘œ๐‘‘ 2 ๐‘›
, (๐‘Žโ€ฒ + 2๐‘โ€ฒ + ๐‘) ๐‘š๐‘œ๐‘‘ 2 ๐‘› (12)
๐ป1โ€ฒ(๐‘ฅ, ๐‘ฆ) = ๐ถ1โ€ฒ(๐‘ฅ, ๐‘ฆ) โŠ• ๐‘†โ€ฒ(๐‘ฅ, ๐‘ฆ) (13)
Step4: the obtained image from previous step is subjected for inverse MPHT to get original image.
๐ป ๐‘Ÿ(๐‘Ž, ๐‘) = ๐ป1โ€ฒ(5๐‘ฅ โˆ’ 4๐‘ฆ โˆ’ ๐‘) ๐‘š๐‘œ๐‘‘ 2 ๐‘›
, (y โ€“ x) mod 2n
) (14)
3. EXPERIMENTAL RESULTS
Standard test images are considered from Computer Vision Group (CVG), Dept. of Computer
Science and Artificial Intelligence, University of Granada, Spain. Matlab software is used for performance
analysis and implementation. Performance analysis is made based on various security tests. Table 1 compares
resultant Entropy, Correlation, UACI and NPCR of different encryption schemes with the proposed system.
The results indicates very less correlation between the adjacent pixels after substitution phase along with high
entropy value indicating that the pixel values are altered effectively in the cipher image.
Table 1. Comparision of entropy and correlation between standard and encrypted images
Images Entropy = 8 [14] Correlation UACI โ‰ฅ 33.4635% [14] NPCR โ‰ฅ 99.6093% [14]
Lena
5.5407 (Blow Fish) [15]
0.1500 [16]
31.00 [16] 90.21 [16]5.5438 (Two Fish) [15]
5.5439(AES 256) [15]
5.5439 (RC 4) [15]
33.4201 [19] 99.5859 [19]
7.5220 [16]
7.9972 [17]
7.9950 [18]
7.9958 [19]
0.0020
32.01 [22] 99.60 [22]7.6427 [20]
7.9971 [21]
7.9970 [22]
33.4303 99.6063
7.9973
Baboon
7.9950 [18]
-4.6636e-04
30.87 [21] 99.59 [21]
7.9947 [21]
7.9968 33.2305 99.5544
Peppers
7.9960 [18]
-0.0040
30.71 [21] 99.61 [21]
7.9954 [21]
33.3761 99.6490
7.9973
Airplane 7.9972 0.0040 33.2971 99.6231
Cameraman
7.9972 [23]
-0.0041 33.3763 99.6201
7.9975
Barche 7.9973 0.0048 33.3745 99.6017
Carnev 7.9971 -9.7275e-04 33.3590 99.5651
Donna 7.9973 1.6005e-04 33.4637 99.6460
Foto 7.9968 -0.0028 33.4974 99.5667
Galaxia 7.9972 0.0024 33.4866 99.5773
Leopard 7.9972 0.0013 33.3751 99.5911
Montage 7.9966 -0.0050 33.3403 99.6384
Clock 7.9969 0.0038 33.3330 99.6094
Vacas 7.9974 -4.2689e-04 33.3868 99.6140
Fiore 7.9972 0.0058 33.4856 99.6262
Mapasp 7.9972 0.0040 33.2827 99.6201
Soil 7.9970 0.0026 33.3852 99.6017
Mesa 7.9976 0.0077 33.3114 99.6155
Papav 7.9969 4.2616e-04 33.4553 99.6216
Tulips 7.9974 0.0058 33.4337 99.5987
๏ฒ ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 188 - 195
192
3.1. Noise interference
The correlation coefficient decides the similarity between retrieved (decrypted) and original
images [24]. The performance analysis of decrypted image under noisy condition is decided by comparing
the correlation coefficient between decrypted and original images. Figure 2 illustartes retrieved and original
image under different noisy conditions and Table 2 discribes the similarity in the order of correlation between
the de-crypted and original images under noise interference. If the correlation coefficient is equal to unity,
the retrieved image is same as that of the original watermark. The cipher image is considered under
various noisy conditions and the performance analysis of the algorithm is made after decrypting the noisy
cipher image.
Figure 2. Performance analysis of retrieved and original image under noisy conditions
Table 2. Performance analysis of retrieved and original image under noisy attacks
Noise Interference Correlation
Pepper & Salt 0.8617
Gaussian 0.7062
Poisson 0.8449
Speckle 0.6527
LSB neutralization attack 0.9790
3.2. Inference
The correlation co-efficient value drops to a minimum 0.6527 with speckle (multiplicative) noise in
cipher image indicating 65% similarity between the corresponding pixels in original and retrieved images.
Due to LSB neutralization attack, the correlation co-efficient of 0.9790 is observed indicating 98% similarity
between original and retrieved images. It has been observed that, an average of 81% similarity between
original and retrieved images is observed under noisy conditions. And hence the proposed algorithm gives
better results under noise attacks. Figure 3 illustrates similarity in the order of correlation between
Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ
Performance analysis of transformation and bogdonov chaotic substitution based โ€ฆ (Prajwalasimha S N)
193
the de-crypted and original images under different noise densities. Figure 4 Illustration of resultant images
under different stage of the crypto-process. Also very close to the ideal values of Unified Average Changing
Intensity (UACI=33.39%) but slight less and Number of Pixel Changing Rate (NPCR=99.61%) equal to
the ideal value, slightly greater than that as observed in non-Chaotic substitution [25] are noticed from
the outcome of the standard images.
Figure 3. Correlation between the retrieved and original watermarks under noise interference
Figure 4. Illustration of Host image, Substitution image and Cipher image after transformation, diffusion and
substitution stages
๏ฒ ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 188 - 195
194
4. CONCLUSION
In the proposed encryption scheme, Pseudo Hadamard transformation is used in the transformation
stage to vary pixel positions and Bogdonov chaotic random sequence generator is used in the substitution
stage to vary the pixel values in an image. High redundancy and strong correlation between the adjacent
pixels are effectively reduced by the proposed technique. High degree of randomness obtained from
Bogdonav chaotic generator in the substitution stage leads to achieve better entropy in the cipher image.
Correlation between host and cipher images is very less indicating poor similarities between them. Average
values of 99.61% number of pixel changing rate (NPCR) is observed which is almost equal to the ideal value
and an average value of 33.39% unified average changing intensity (UACI) is obtained which is very close to
the ideal values, for a set of twenty standard images. Further, more number of chaotic generators can be used
to get random sequences for substitution stage of encryption to increase the level of security.
REFERENCES
[1] Leo Yu Zhang, et al., โ€œOn the Security of a Class of Diffusion Mechanisms for Image Encryption,โ€
IEEE Transactions on Cybernetics, vol. 48, no. 4, pp. 1163-1175, 2018.
[2] Alireza Jolfaei, et al., โ€œOn the Security of Permutation-Only Image Encryption Schemes,โ€ IEEE Transactions on
Information Forensics and Security, vol. 11, no. 2, pp. 235-246, 2016.
[3] Yue Wu, et al., โ€œDiscrete Wheel-Switching Chaotic System and Applications,โ€ IEEE Transactions on Circuits and
Systems, vol. 61, no. 12, pp. 3469-3476, 2014.
[4] Prajwalasimha S N, et al., โ€œPerformance analysis of DCT and successive division based digital image
watermarking scheme,โ€ Indonesian Journal of Electrical Engineering and Computer Science, vol. 15, no. 2,
pp. 750-757, 2019
[5] Prajwalasimha S N, et al., โ€œLogarithmic Transform based Digital Watermarking Scheme,โ€ In: Pandian D.,
Fernando X., Baig Z., Shi F. (eds) Proceedings of the International Conference on ISMAC in Computational Vision
and Bio-Engineering 2018 (ISMAC-CVB). ISMAC 2018. Lecture Notes in Computational Vision and
Biomechanics, Springer, Cham, vol 30, 2019.
[6] Prajwalasimha S N, et al., โ€œPerformance Analysis of Combined Discrete Fourier Transformation (DFT) and
Successive Division based Image Watermarking Scheme,โ€ International Journal of Recent Technology and
Engineering, vol. 8, no. 3, Sep. 2019
[7] Prajwalasimha S N, et al., โ€œDigital Image Watermarking Using Sine Transform Technique,โ€ In: Pandian D.,
Fernando X., Baig Z., Shi F. (eds) Proceedings of the International Conference on ISMAC in Computational Vision
and Bio-Engineering 2018 (ISMAC-CVB). ISMAC 2018, Lecture Notes in Computational Vision and
Biomechanics, Springer, Cham, vol. 30, 2019.
[8] Sanjeev Sharma, et al., โ€œImproved method for image security based on chaotic-shuffle and chaotic
diffusion algorithms,โ€ International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 1,
pp. 273-280, 2019.
[9] Samar M. Ismail, et al., โ€œGeneralized double-humped logistic map-based medical image encrytpion,โ€ Journal of
Advanced Research, Elsevier, vol. 10, pp. 85-98, 2018.
[10] V.M. Silva-Garcรญa, et al., โ€œSubstitution box generation using Chaos: An Image Encryption Application,โ€
Applied Mathematics and Computation, Elsevier, vol. 332, pp. 123-135, 2018.
[11] Lingfeng Liu and Suoxia Miao, โ€œA new image encryption algorithm based on logistic chaotic map with varying
parameter,โ€ SpringerPlus, vol. 286, no. 5, pp. 1-12, 2016.
[12] Rasul Enayatifar, et al., โ€œImage encryption using a synchronous permutation-di๏ฌ€usion technique,โ€ Optics and
Lasers in Engineering, Elsevier, vol. 90, pp. 146-154, 2017.
[13] Lingfeng Liu, et al., โ€œImage block Encryption method based on chaotic maps,โ€ IET Journal on Signal Processing,
vol. 12, no. 1, pp. 22-30, 2018.
[14] Xingyuan Wang, et al., โ€œAn Image Encryption Algorithm Based on Josephus Traversing and Mixed Chaotic Map,โ€
IEEE Access Lett, vol. 6, pp. 23733-23746, 2018.
[15] Delong Cui, et al., โ€œImage Encryption Using Block Based Transformation With Fractional Fourier Transform,โ€
Proc. of 8th International Conference on Communications and Networking in China, pp. 552-556, 2013.
[16] Nitumoni Hazarika, et al., โ€œA Wavelet Based Partial Image Encryption using Chaotic Logistic Map,โ€ Proceedings
of IEEE International Conference on Advanced Communication Control and Computing Technologies,
pp. 1-5, 2014.
[17] Prajwalasimha S.N., โ€œPseudo-Hadamard Transformation-Based Image Encryption Scheme.โ€ In: Krishna A.,
Srikantaiah K., Naveena C. (eds) Integrated Intelligent Computing, Communication and Security, Studies in
Computational Intelligence, Springer, Singapore, vol. 771, 2019.
[18] Anish Goel and Kaustubh Chaudhari, โ€œMedian Based Pixel Selection for Partial Image Encryption,โ€ Proc. of Sixth
International Conference on Image Processing Theory, Tools and Applications, 2016.
[19] Zaheer Abbas Balouch, et al., โ€œEnergy efficient image encryption algorithm,โ€ Proc. of International Conference on
Innovations in Electrical Engineering and Computational Technologies, 2017.
[20] S N Prajwalasimha, Usha Surendra, โ€œMultimedia Data Encryption based on Discrete Dyadic Transformation,โ€
Proc. of IEEE International conference on Signal processing and Communication, pp. 492-495, 2017.
Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ
Performance analysis of transformation and bogdonov chaotic substitution based โ€ฆ (Prajwalasimha S N)
195
[21] Nabil Ben Slimane, et al., โ€œNested chaotic image encryption scheme using two-diffusion process and
the Secure Hash Algorithm SHA-1,โ€ Proc.of 4th International Conference on Control Engineering & Information
Technology, 2016.
[22] Prajwalasimha S N and S. R. Bhagyashree, โ€œImage Encryption using Discrete Radon Transformationand Non
chaotic Substitution,โ€ Proc. 2nd IEEE International Conference on Electrical, Computer and Communication
Technologies, pp. 842-846, 2017.
[23] Prajwalasimha S N, Kavya S R and Tanaaz Zeba Ahmed, โ€œDesign and Analysis of Pseudo Hadamard
Transformation and non-Chaotic Substitution based Image Encryption Scheme,โ€ Indonesian Journal of Electrical
Engineering and Computer Science (IJEECS), vol. 15, no. 3, 2019.
[24] Shetter A., et al., โ€œImage de-noising algorithm based on filtering and histogram equalization,โ€ Proceedings of the
International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC, pp 325-328, 2018.
[25] Prajwalasimha S N and Basavaraj L, โ€œDesign and Implementation of Transformation and non-Chaotic Substitution
based Image Cryptosystem,โ€ International Journal of Engineering and Advanced Technology, vol. 8, no. 6,
pp. 1079-1083, 2019.
BIOGRAPHIES OF AUTHORS
Prajwalasimha S N received Bachelor of Engineering (B.E) Degree in Electronics &
Communication from Visvesvaraya Technological University, India in 2012, Master of
Technology (M.Tech) Degree in Digital Electronics & Communication Systems from
Visvesvaraya Technological University, India in 2014 and pursuing Doctoral Degree (Ph.D) in
the field of Cryptography under Visvesvaraya Technological University, India. He has
published more than 20 research papers in International Journals, Conferences & Book
Chapters and serving as Reviewer for many International Journals and Conferences. He has
been conferred with best research contribution award from IEEE ICECCT 2017. His research
interest includes Cryptography, Steganography, Digital Image Watermarking and Image
Processing.
Dr. L Basavaraj received Bachelor of Engineering (B.E) Degree in Electrical & Electronics
Engineering from University of Mysore, India, Master of Technology (M.Tech) Degree in
Digital Electronics from Darwad University, India and Doctoral Degree (Ph.D) in the field of
Image & Signal Processing under University of Mysore, India. He has published more than 40
research papers in International Journals, Conferences & Book Chapters and currenty guiding
7 Ph.D scholars. Being senior member of IEEE, his research interest includes Image & Signal
Processing.

More Related Content

What's hot

A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyA Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyIOSR Journals
ย 
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONSA (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONSIJNSA Journal
ย 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET Journal
ย 
Reversible Data Hiding in the Spatial and Frequency Domains
Reversible Data Hiding in the Spatial and Frequency DomainsReversible Data Hiding in the Spatial and Frequency Domains
Reversible Data Hiding in the Spatial and Frequency DomainsCSCJournals
ย 
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingAn Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingCSCJournals
ย 
F42022628
F42022628F42022628
F42022628IJERA Editor
ย 
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...IJNSA Journal
ย 
Denoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped WindowsDenoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped WindowsCSCJournals
ย 
Greyscale image authentication and repairing
Greyscale image authentication and repairingGreyscale image authentication and repairing
Greyscale image authentication and repairingeSAT Journals
ย 
Greyscale image authentication and repairing
Greyscale image authentication and repairingGreyscale image authentication and repairing
Greyscale image authentication and repairingeSAT Publishing House
ย 
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwarePerformance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwareCSCJournals
ย 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
ย 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODeditorijcres
ย 
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICESA BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICEScsandit
ย 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageijctet
ย 
Region duplication forgery detection in digital images
Region duplication forgery detection  in digital imagesRegion duplication forgery detection  in digital images
Region duplication forgery detection in digital imagesRupesh Ambatwad
ย 
Learning from Computer Simulation to Tackle Real-World Problems
Learning from Computer Simulation to Tackle Real-World ProblemsLearning from Computer Simulation to Tackle Real-World Problems
Learning from Computer Simulation to Tackle Real-World ProblemsNAVER Engineering
ย 

What's hot (18)

A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyA Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder Piracy
ย 
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONSA (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS
ย 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
ย 
Reversible Data Hiding in the Spatial and Frequency Domains
Reversible Data Hiding in the Spatial and Frequency DomainsReversible Data Hiding in the Spatial and Frequency Domains
Reversible Data Hiding in the Spatial and Frequency Domains
ย 
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingAn Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video Coding
ย 
F42022628
F42022628F42022628
F42022628
ย 
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...
ย 
Denoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped WindowsDenoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped Windows
ย 
Greyscale image authentication and repairing
Greyscale image authentication and repairingGreyscale image authentication and repairing
Greyscale image authentication and repairing
ย 
Greyscale image authentication and repairing
Greyscale image authentication and repairingGreyscale image authentication and repairing
Greyscale image authentication and repairing
ย 
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwarePerformance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
ย 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
ย 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
ย 
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICESA BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
ย 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
ย 
Region duplication forgery detection in digital images
Region duplication forgery detection  in digital imagesRegion duplication forgery detection  in digital images
Region duplication forgery detection in digital images
ย 
Learning from Computer Simulation to Tackle Real-World Problems
Learning from Computer Simulation to Tackle Real-World ProblemsLearning from Computer Simulation to Tackle Real-World Problems
Learning from Computer Simulation to Tackle Real-World Problems
ย 
V2 v posenet
V2 v posenetV2 v posenet
V2 v posenet
ย 

Similar to Performance analysis of transformation and bogdonov chaotic substitution based image cryptosystem

COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
ย 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
ย 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling cscpconf
ย 
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat mapA New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat maptayseer Karam alshekly
ย 
Chaotic Block Image Scheme using Large Key Space and Message Digest Algorithm
Chaotic Block Image Scheme using Large Key Space and Message Digest AlgorithmChaotic Block Image Scheme using Large Key Space and Message Digest Algorithm
Chaotic Block Image Scheme using Large Key Space and Message Digest AlgorithmCSCJournals
ย 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
ย 
Development of stereo matching algorithm based on sum of absolute RGB color d...
Development of stereo matching algorithm based on sum of absolute RGB color d...Development of stereo matching algorithm based on sum of absolute RGB color d...
Development of stereo matching algorithm based on sum of absolute RGB color d...IJECEIAES
ย 
Parallel implementation of geodesic distance transform with application in su...
Parallel implementation of geodesic distance transform with application in su...Parallel implementation of geodesic distance transform with application in su...
Parallel implementation of geodesic distance transform with application in su...Tuan Q. Pham
ย 
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...ZaidHussein6
ย 
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...IJAAS Team
ย 
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement  Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement ijsc
ย 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSIJNSA Journal
ย 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONijcseit
ย 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionIRJET Journal
ย 
Field-programmable gate array design of image encryption and decryption usin...
Field-programmable gate array design of image encryption and  decryption usin...Field-programmable gate array design of image encryption and  decryption usin...
Field-programmable gate array design of image encryption and decryption usin...IJECEIAES
ย 
IRJET- Analysis of Chaotic, Hyperchaotic and DNA Sequence for Image Encryption
IRJET- Analysis of Chaotic, Hyperchaotic and DNA Sequence for Image EncryptionIRJET- Analysis of Chaotic, Hyperchaotic and DNA Sequence for Image Encryption
IRJET- Analysis of Chaotic, Hyperchaotic and DNA Sequence for Image EncryptionIRJET Journal
ย 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniquesIRJET Journal
ย 
T01022103108
T01022103108T01022103108
T01022103108IOSR Journals
ย 
A new four-dimensional hyper-chaotic system for image encryption
A new four-dimensional hyper-chaotic system for image encryption A new four-dimensional hyper-chaotic system for image encryption
A new four-dimensional hyper-chaotic system for image encryption IJECEIAES
ย 

Similar to Performance analysis of transformation and bogdonov chaotic substitution based image cryptosystem (20)

COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
ย 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
ย 
Paper_KST
Paper_KSTPaper_KST
Paper_KST
ย 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
ย 
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat mapA New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
ย 
Chaotic Block Image Scheme using Large Key Space and Message Digest Algorithm
Chaotic Block Image Scheme using Large Key Space and Message Digest AlgorithmChaotic Block Image Scheme using Large Key Space and Message Digest Algorithm
Chaotic Block Image Scheme using Large Key Space and Message Digest Algorithm
ย 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
ย 
Development of stereo matching algorithm based on sum of absolute RGB color d...
Development of stereo matching algorithm based on sum of absolute RGB color d...Development of stereo matching algorithm based on sum of absolute RGB color d...
Development of stereo matching algorithm based on sum of absolute RGB color d...
ย 
Parallel implementation of geodesic distance transform with application in su...
Parallel implementation of geodesic distance transform with application in su...Parallel implementation of geodesic distance transform with application in su...
Parallel implementation of geodesic distance transform with application in su...
ย 
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
ย 
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
ย 
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement  Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
ย 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
ย 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
ย 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
ย 
Field-programmable gate array design of image encryption and decryption usin...
Field-programmable gate array design of image encryption and  decryption usin...Field-programmable gate array design of image encryption and  decryption usin...
Field-programmable gate array design of image encryption and decryption usin...
ย 
IRJET- Analysis of Chaotic, Hyperchaotic and DNA Sequence for Image Encryption
IRJET- Analysis of Chaotic, Hyperchaotic and DNA Sequence for Image EncryptionIRJET- Analysis of Chaotic, Hyperchaotic and DNA Sequence for Image Encryption
IRJET- Analysis of Chaotic, Hyperchaotic and DNA Sequence for Image Encryption
ย 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniques
ย 
T01022103108
T01022103108T01022103108
T01022103108
ย 
A new four-dimensional hyper-chaotic system for image encryption
A new four-dimensional hyper-chaotic system for image encryption A new four-dimensional hyper-chaotic system for image encryption
A new four-dimensional hyper-chaotic system for image encryption
ย 

More from IJECEIAES

Predicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningPredicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningIJECEIAES
ย 
Taxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca AirportTaxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca AirportIJECEIAES
ย 
Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...IJECEIAES
ย 
Ataxic person prediction using feature optimized based on machine learning model
Ataxic person prediction using feature optimized based on machine learning modelAtaxic person prediction using feature optimized based on machine learning model
Ataxic person prediction using feature optimized based on machine learning modelIJECEIAES
ย 
Situational judgment test measures administrator computational thinking with ...
Situational judgment test measures administrator computational thinking with ...Situational judgment test measures administrator computational thinking with ...
Situational judgment test measures administrator computational thinking with ...IJECEIAES
ย 
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...IJECEIAES
ย 
An overlapping conscious relief-based feature subset selection method
An overlapping conscious relief-based feature subset selection methodAn overlapping conscious relief-based feature subset selection method
An overlapping conscious relief-based feature subset selection methodIJECEIAES
ย 
Recognition of music symbol notation using convolutional neural network
Recognition of music symbol notation using convolutional neural networkRecognition of music symbol notation using convolutional neural network
Recognition of music symbol notation using convolutional neural networkIJECEIAES
ย 
A simplified classification computational model of opinion mining using deep ...
A simplified classification computational model of opinion mining using deep ...A simplified classification computational model of opinion mining using deep ...
A simplified classification computational model of opinion mining using deep ...IJECEIAES
ย 
An efficient convolutional neural network-extreme gradient boosting hybrid de...
An efficient convolutional neural network-extreme gradient boosting hybrid de...An efficient convolutional neural network-extreme gradient boosting hybrid de...
An efficient convolutional neural network-extreme gradient boosting hybrid de...IJECEIAES
ย 
Generating images using generative adversarial networks based on text descrip...
Generating images using generative adversarial networks based on text descrip...Generating images using generative adversarial networks based on text descrip...
Generating images using generative adversarial networks based on text descrip...IJECEIAES
ย 
Collusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networksCollusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networksIJECEIAES
ย 
Application of deep learning methods for automated analysis of retinal struct...
Application of deep learning methods for automated analysis of retinal struct...Application of deep learning methods for automated analysis of retinal struct...
Application of deep learning methods for automated analysis of retinal struct...IJECEIAES
ย 
Proposal of a similarity measure for unified modeling language class diagram ...
Proposal of a similarity measure for unified modeling language class diagram ...Proposal of a similarity measure for unified modeling language class diagram ...
Proposal of a similarity measure for unified modeling language class diagram ...IJECEIAES
ย 
Efficient criticality oriented service brokering policy in cloud datacenters
Efficient criticality oriented service brokering policy in cloud datacentersEfficient criticality oriented service brokering policy in cloud datacenters
Efficient criticality oriented service brokering policy in cloud datacentersIJECEIAES
ย 
System call frequency analysis-based generative adversarial network model for...
System call frequency analysis-based generative adversarial network model for...System call frequency analysis-based generative adversarial network model for...
System call frequency analysis-based generative adversarial network model for...IJECEIAES
ย 
Comparison of Iris dataset classification with Gaussian naรฏve Bayes and decis...
Comparison of Iris dataset classification with Gaussian naรฏve Bayes and decis...Comparison of Iris dataset classification with Gaussian naรฏve Bayes and decis...
Comparison of Iris dataset classification with Gaussian naรฏve Bayes and decis...IJECEIAES
ย 
Efficient intelligent crawler for hamming distance based on prioritization of...
Efficient intelligent crawler for hamming distance based on prioritization of...Efficient intelligent crawler for hamming distance based on prioritization of...
Efficient intelligent crawler for hamming distance based on prioritization of...IJECEIAES
ย 
Predictive modeling for breast cancer based on machine learning algorithms an...
Predictive modeling for breast cancer based on machine learning algorithms an...Predictive modeling for breast cancer based on machine learning algorithms an...
Predictive modeling for breast cancer based on machine learning algorithms an...IJECEIAES
ย 
An algorithm for decomposing variations of 3D model
An algorithm for decomposing variations of 3D modelAn algorithm for decomposing variations of 3D model
An algorithm for decomposing variations of 3D modelIJECEIAES
ย 

More from IJECEIAES (20)

Predicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningPredicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learning
ย 
Taxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca AirportTaxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca Airport
ย 
Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...
ย 
Ataxic person prediction using feature optimized based on machine learning model
Ataxic person prediction using feature optimized based on machine learning modelAtaxic person prediction using feature optimized based on machine learning model
Ataxic person prediction using feature optimized based on machine learning model
ย 
Situational judgment test measures administrator computational thinking with ...
Situational judgment test measures administrator computational thinking with ...Situational judgment test measures administrator computational thinking with ...
Situational judgment test measures administrator computational thinking with ...
ย 
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
ย 
An overlapping conscious relief-based feature subset selection method
An overlapping conscious relief-based feature subset selection methodAn overlapping conscious relief-based feature subset selection method
An overlapping conscious relief-based feature subset selection method
ย 
Recognition of music symbol notation using convolutional neural network
Recognition of music symbol notation using convolutional neural networkRecognition of music symbol notation using convolutional neural network
Recognition of music symbol notation using convolutional neural network
ย 
A simplified classification computational model of opinion mining using deep ...
A simplified classification computational model of opinion mining using deep ...A simplified classification computational model of opinion mining using deep ...
A simplified classification computational model of opinion mining using deep ...
ย 
An efficient convolutional neural network-extreme gradient boosting hybrid de...
An efficient convolutional neural network-extreme gradient boosting hybrid de...An efficient convolutional neural network-extreme gradient boosting hybrid de...
An efficient convolutional neural network-extreme gradient boosting hybrid de...
ย 
Generating images using generative adversarial networks based on text descrip...
Generating images using generative adversarial networks based on text descrip...Generating images using generative adversarial networks based on text descrip...
Generating images using generative adversarial networks based on text descrip...
ย 
Collusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networksCollusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networks
ย 
Application of deep learning methods for automated analysis of retinal struct...
Application of deep learning methods for automated analysis of retinal struct...Application of deep learning methods for automated analysis of retinal struct...
Application of deep learning methods for automated analysis of retinal struct...
ย 
Proposal of a similarity measure for unified modeling language class diagram ...
Proposal of a similarity measure for unified modeling language class diagram ...Proposal of a similarity measure for unified modeling language class diagram ...
Proposal of a similarity measure for unified modeling language class diagram ...
ย 
Efficient criticality oriented service brokering policy in cloud datacenters
Efficient criticality oriented service brokering policy in cloud datacentersEfficient criticality oriented service brokering policy in cloud datacenters
Efficient criticality oriented service brokering policy in cloud datacenters
ย 
System call frequency analysis-based generative adversarial network model for...
System call frequency analysis-based generative adversarial network model for...System call frequency analysis-based generative adversarial network model for...
System call frequency analysis-based generative adversarial network model for...
ย 
Comparison of Iris dataset classification with Gaussian naรฏve Bayes and decis...
Comparison of Iris dataset classification with Gaussian naรฏve Bayes and decis...Comparison of Iris dataset classification with Gaussian naรฏve Bayes and decis...
Comparison of Iris dataset classification with Gaussian naรฏve Bayes and decis...
ย 
Efficient intelligent crawler for hamming distance based on prioritization of...
Efficient intelligent crawler for hamming distance based on prioritization of...Efficient intelligent crawler for hamming distance based on prioritization of...
Efficient intelligent crawler for hamming distance based on prioritization of...
ย 
Predictive modeling for breast cancer based on machine learning algorithms an...
Predictive modeling for breast cancer based on machine learning algorithms an...Predictive modeling for breast cancer based on machine learning algorithms an...
Predictive modeling for breast cancer based on machine learning algorithms an...
ย 
An algorithm for decomposing variations of 3D model
An algorithm for decomposing variations of 3D modelAn algorithm for decomposing variations of 3D model
An algorithm for decomposing variations of 3D model
ย 

Recently uploaded

Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...Call Girls in Nagpur High Profile
ย 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
ย 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
ย 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
ย 
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
ย 
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night StandCall Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Standamitlee9823
ย 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
ย 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
ย 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
ย 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
ย 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
ย 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7Call Girls in Nagpur High Profile Call Girls
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
ย 

Recently uploaded (20)

Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
ย 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
ย 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
ย 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
ย 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
ย 
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
ย 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
ย 
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night StandCall Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
ย 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
ย 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
ย 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
ย 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
ย 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
ย 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
ย 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
ย 

Performance analysis of transformation and bogdonov chaotic substitution based image cryptosystem

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 10, No. 1, February 2020, pp. 188~195 ISSN: 2088-8708, DOI: 10.11591/ijece.v10i1.pp188-195 ๏ฒ 188 Journal homepage: http://ijece.iaescore.com/index.php/IJECE Performance analysis of transformation and bogdonov chaotic substitution based image cryptosystem Prajwalasimha S. N., Basavaraj L. Department of Electronics and Communication Engineering, ATME Research Centre, India Article Info ABSTRACT Article history: Received Oct 2, 2018 Revised Aug 23, 2019 Accepted Aug 30, 2019 In this article, a combined Pseudo Hadamard transformation and modified Bogdonav chaotic generator based image encryption technique is proposed. Pixel position transformation is performed using Pseudo Hadamard transformation and pixel value variation is made using Bogdonav chaotic substitution. Bogdonav chaotic generator produces random sequences and it is observed that very less correlation between the adjacent elements in the sequence. The cipher image obtained from the transformation stage is subjected for substitution using Bogdonav chaotic sequence to break correlation between adjacent pixels. The cipher image is subjected for various security tests under noisy conditions and very high degree of similarity is observed after deciphering process between original and decrypted images. Keywords: Chaotic generator Confidentiality Correlation Encryption Substitution Copyright ยฉ 2020 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Prajwalasimha S N, Department of Electronics and Communication Engineering, ATME Research Centre, Mysuru, Karnataka, India. Email: prajwalasimha.sn1@gmail.com 1. INTRODUCTION Images are pictorial depiction of information. Due to swift maturation in internet technology, digital images being major class of multimedia, plays a vital role in communication systems. These images are characterized inimitably by high inter pixel redundancy, strong correlation between adjacent pixels and bulk data capacity [1-7]. Confidentiality is one of the dominant facets of communication system. Fortification of information can be accomplished by adopting an efficient cryptosystem, which should encrypt and decrypt the information without flaws. More prevalently and habitually used encryption algorithms such as Rivest, Shamir and Adleman (RSA), Data Encryption Standard (DES), International Data Encryption Algorithm (IDEA) and Advance Encryption Standards (AES) are inapposite for images due to their inimitable characteristics [2]. Chaotic systems found proliferate implementation in the fields of cryptography, due to their intrinsic properties such as volatility, subtlety to the initial conditions, similar casualness and aperiodicity [3, 8]. With the help of chaotic theory, the inter pixel redundancy and strong correlation between adjacent pixels can be effectively reduced. In many low dimensional chaos based cryptographic algorithms, the cipher data directly depends on chaotic orbit of a single chaotic system. Due to this, many low dimensional chaotic systems are more prone to phase space reconstruction attacks [9]. Such kind of attacks can be reduced by using S-box (Substitution box) in the algorithm. Complexity of cryptanalysis and brute force attacks can be further reduced by increasing the size of S-box in the algorithm. One such technique is developed by Silva-Garcรญa and et al [10]. They introduced S-boxes in Advanced Encryption Standard (AES) algorithm to increase the level of security. Nonlinear chaotic differential equations are used to generate random numbers inside the S-box. But immunity against noise has not been noticed in the algorithm.
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ Performance analysis of transformation and bogdonov chaotic substitution based โ€ฆ (Prajwalasimha S N) 189 A double humped logistic map has been developed by Lingfeng & et al. [11] by introducing general parameters to the existing chaotic map to generate pseudo random key sequence for the substitution stage. Robustness of the algorithm against Gaussian noise has been noticed but not against other kind of noises. Better UACI values are observed for various images but considerable differences in the NPCR values are noticed compared to ideal values. Rasul Enayatifar & et al. [12] developed combined permutation and diffusion technique using 3-D logistic chaotic map. Better entropy is observed in the absence of noise for many standard images but considerable difference in the values of NPCR and UACI is observed compared to ideal values. A combined 1-D logistic map and 2-D Baker chaotic map based block wise permutation algorithm has been developed by Lingfeng Liu & et al. [13]. Even though low dimensional chaotic maps are considered, phase space is made large by multiple chaotic maps. Very minimum correlation between the adjacent pixels in the cipher image has been noticed along with slightly high entropy but considerable difference in the values of NPCR and UACI is observed compared to ideal values for few standard images. Based on the above considerations a combined 2-D Pseudo Hadamard chaotic transformation (MPHT) and 2-D Bogdonav chaotic random diffusion based algorithm has been proposed in which a large phase space is considered along with a substitution image. The paper is organized as follows: Section 2 describes the proposed scheme. Section 3 with statistical and differential analysis followed by conclusion in Section 4. 2. RESEARCH METHOD Three stages per round are involved in the encryption process: Transformation, Diffusion and Substitution. Modified Pseudo Hadamard transformation is used in the first stage and random sequence generated by Bagdonov chaotic generator is used in the substitution stage. Figure 1 illustartes the flow diagram of the system. 2.1. Encryption algorithm Step1: Original image of size 2 ๐‘› X 2 ๐‘› is transformed using modified Pseudo Hadamard transformation. ๐ป1โ€ฒ(๐‘ฅ, ๐‘ฆ) = ๐ป((๐‘Ž + ๐‘ + ๐‘) ๐‘š๐‘œ๐‘‘ 2 ๐‘› , (๐‘Ž + 2๐‘ + ๐‘) ๐‘š๐‘œ๐‘‘ 2 ๐‘› ) 1 < ๐‘Ž, ๐‘ < 2 ๐‘› (1) Where, ๐ป(๐‘Ž, ๐‘) is the host image of size 2 ๐‘› X 2 ๐‘› ๐ป1โ€ฒ (๐‘ฅ, ๐‘ฆ) is the transformed image of size 2 ๐‘› X 2 ๐‘› ๐‘ is the constant (๐‘ = 37) Step2: Block truncated substitution image of size 2 ๐‘› X 2 ๐‘› is transformed using modified Pseudo Hadamard transformation. ๐‘†1โ€ฒ(๐‘ฅ, ๐‘ฆ) = ๐‘† ๐‘ก ((๐‘Žโ€ฒ + ๐‘โ€ฒ + ๐‘) ๐‘š๐‘œ๐‘‘ 2 ๐‘› , (๐‘Žโ€ฒ + 2๐‘โ€ฒ + ๐‘) ๐‘š๐‘œ๐‘‘ 2 ๐‘› ) 1 < ๐‘Žโ€ฒ, ๐‘โ€ฒ < 2 ๐‘› (2) Where, ๐‘†1โ€ฒ(๐‘Žโ€ฒ, ๐‘โ€ฒ) is the block truncated substitution image of size 2 ๐‘› X 2 ๐‘› ๐‘† ๐‘ก(๐‘ฅ, ๐‘ฆ) is the transformed truncated image of size 2 ๐‘› X 2 ๐‘› ๐‘ is the constant ( ๐‘ = 37) Step3: Both transformed images are subjected for bitwise XOR operation ๐ถ1(๐‘ฅ, ๐‘ฆ) = ๐ปโ€ฒ(๐‘ฅ, ๐‘ฆ) โŠ• ๐‘†โ€ฒ(๐‘ฅ, ๐‘ฆ) (3) Step4: The cipher image from first stage is subjected for substitution with pre-defined S-box. ๐ถ2(๐‘ฅ, ๐‘ฆ) = ๐ถ1(๐‘ฅ, ๐‘ฆ) โŠ• S-box (4) Step4: The cipher image from substitution stage is subjected for diffusion with random sequence generated Bogdonov chaotic equation. ๐‘ฅโ€ฒ = (๐‘ฅ + ๐‘ฆโ€ฒ)๐‘š๐‘œ๐‘‘ 2 ๐‘› (5) ๐‘ฆโ€ฒ = (๐‘ฆ + ๐œ€๐‘ฆโ€ฒ + ๐พ๐‘ฅโ€ฒ(๐‘ฅโ€ฒ โˆ’ 1) + ๐œ‡๐‘ฅโ€ฒ๐‘ฆโ€ฒ) ๐‘š๐‘œ๐‘‘ 2 ๐‘› (6)
  • 3. ๏ฒ ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 188 - 195 190 Where, ฮต = 7(d)2 K = 9(d)2 ฮผ = 3(d) d = โˆ‘ โˆ‘ ๐ป(๐‘Ž, ๐‘)256 1 256 1 ๐ถ3(๐‘ฅ, ๐‘ฆ) = ๐ถ2(๐‘ฅ, ๐‘ฆ) โŠ• ๐‘ฅโ€ฒ (7) Where, ๐ถ3(๐‘ฅ, ๐‘ฆ) is the cipher image after diffusion of size 2 ๐‘› X 2 ๐‘› Step5: The number of execution rounds (d) is placed in the four extreme corners of the cipher image along with the respective pixel values. Figure 1. Flow diagram of proposed cryptosystem 2.2. Decryption algorithm The number of rounds for decryption stage (d) is taken from the pixel values in the four extreme corners of the cipher image. Step1: The cipher image is then subjected for XOR operation with random sequence generated Bogdonav chaotic equation with the same constant co-efficient. ๐‘ฅโ€ฒ = (๐‘ฅ + ๐‘ฆโ€ฒ)๐‘š๐‘œ๐‘‘ 2 ๐‘› (8) ๐‘ฆโ€ฒ = (๐‘ฆ + ๐œ€๐‘ฆโ€ฒ + ๐พ๐‘ฅโ€ฒ(๐‘ฅโ€ฒ โˆ’ 1) + ๐œ‡๐‘ฅโ€ฒ๐‘ฆโ€ฒ) ๐‘š๐‘œ๐‘‘ 2 ๐‘› (9) Where, ฮต = 7(d)2 K = 9(d)2 ฮผ = 3(d)
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ Performance analysis of transformation and bogdonov chaotic substitution based โ€ฆ (Prajwalasimha S N) 191 ๐ถ2โ€ฒ(๐‘ฅ, ๐‘ฆ) = ๐ถ3โ€ฒ(๐‘ฅ, ๐‘ฆ) โŠ• ๐‘ฅโ€ฒ (10) Step2: The obtained cipher image XORed with the elements of S-box used for encryption. ๐ถ1โ€ฒ(๐‘ฅ, ๐‘ฆ) = ๐ถ3โ€ฒ(๐‘ฅ, ๐‘ฆ) โŠ•S-box (11) Step3: The block truncated substitution image is subjected for MPHT with same constant and then XORed with cipher image from previous stage. ๐‘†1โ€ฒ(๐‘ฅ, ๐‘ฆ) = ๐‘† ๐‘ก(๐‘Žโ€ฒ + ๐‘โ€ฒ + ๐‘) ๐‘š๐‘œ๐‘‘ 2 ๐‘› , (๐‘Žโ€ฒ + 2๐‘โ€ฒ + ๐‘) ๐‘š๐‘œ๐‘‘ 2 ๐‘› (12) ๐ป1โ€ฒ(๐‘ฅ, ๐‘ฆ) = ๐ถ1โ€ฒ(๐‘ฅ, ๐‘ฆ) โŠ• ๐‘†โ€ฒ(๐‘ฅ, ๐‘ฆ) (13) Step4: the obtained image from previous step is subjected for inverse MPHT to get original image. ๐ป ๐‘Ÿ(๐‘Ž, ๐‘) = ๐ป1โ€ฒ(5๐‘ฅ โˆ’ 4๐‘ฆ โˆ’ ๐‘) ๐‘š๐‘œ๐‘‘ 2 ๐‘› , (y โ€“ x) mod 2n ) (14) 3. EXPERIMENTAL RESULTS Standard test images are considered from Computer Vision Group (CVG), Dept. of Computer Science and Artificial Intelligence, University of Granada, Spain. Matlab software is used for performance analysis and implementation. Performance analysis is made based on various security tests. Table 1 compares resultant Entropy, Correlation, UACI and NPCR of different encryption schemes with the proposed system. The results indicates very less correlation between the adjacent pixels after substitution phase along with high entropy value indicating that the pixel values are altered effectively in the cipher image. Table 1. Comparision of entropy and correlation between standard and encrypted images Images Entropy = 8 [14] Correlation UACI โ‰ฅ 33.4635% [14] NPCR โ‰ฅ 99.6093% [14] Lena 5.5407 (Blow Fish) [15] 0.1500 [16] 31.00 [16] 90.21 [16]5.5438 (Two Fish) [15] 5.5439(AES 256) [15] 5.5439 (RC 4) [15] 33.4201 [19] 99.5859 [19] 7.5220 [16] 7.9972 [17] 7.9950 [18] 7.9958 [19] 0.0020 32.01 [22] 99.60 [22]7.6427 [20] 7.9971 [21] 7.9970 [22] 33.4303 99.6063 7.9973 Baboon 7.9950 [18] -4.6636e-04 30.87 [21] 99.59 [21] 7.9947 [21] 7.9968 33.2305 99.5544 Peppers 7.9960 [18] -0.0040 30.71 [21] 99.61 [21] 7.9954 [21] 33.3761 99.6490 7.9973 Airplane 7.9972 0.0040 33.2971 99.6231 Cameraman 7.9972 [23] -0.0041 33.3763 99.6201 7.9975 Barche 7.9973 0.0048 33.3745 99.6017 Carnev 7.9971 -9.7275e-04 33.3590 99.5651 Donna 7.9973 1.6005e-04 33.4637 99.6460 Foto 7.9968 -0.0028 33.4974 99.5667 Galaxia 7.9972 0.0024 33.4866 99.5773 Leopard 7.9972 0.0013 33.3751 99.5911 Montage 7.9966 -0.0050 33.3403 99.6384 Clock 7.9969 0.0038 33.3330 99.6094 Vacas 7.9974 -4.2689e-04 33.3868 99.6140 Fiore 7.9972 0.0058 33.4856 99.6262 Mapasp 7.9972 0.0040 33.2827 99.6201 Soil 7.9970 0.0026 33.3852 99.6017 Mesa 7.9976 0.0077 33.3114 99.6155 Papav 7.9969 4.2616e-04 33.4553 99.6216 Tulips 7.9974 0.0058 33.4337 99.5987
  • 5. ๏ฒ ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 188 - 195 192 3.1. Noise interference The correlation coefficient decides the similarity between retrieved (decrypted) and original images [24]. The performance analysis of decrypted image under noisy condition is decided by comparing the correlation coefficient between decrypted and original images. Figure 2 illustartes retrieved and original image under different noisy conditions and Table 2 discribes the similarity in the order of correlation between the de-crypted and original images under noise interference. If the correlation coefficient is equal to unity, the retrieved image is same as that of the original watermark. The cipher image is considered under various noisy conditions and the performance analysis of the algorithm is made after decrypting the noisy cipher image. Figure 2. Performance analysis of retrieved and original image under noisy conditions Table 2. Performance analysis of retrieved and original image under noisy attacks Noise Interference Correlation Pepper & Salt 0.8617 Gaussian 0.7062 Poisson 0.8449 Speckle 0.6527 LSB neutralization attack 0.9790 3.2. Inference The correlation co-efficient value drops to a minimum 0.6527 with speckle (multiplicative) noise in cipher image indicating 65% similarity between the corresponding pixels in original and retrieved images. Due to LSB neutralization attack, the correlation co-efficient of 0.9790 is observed indicating 98% similarity between original and retrieved images. It has been observed that, an average of 81% similarity between original and retrieved images is observed under noisy conditions. And hence the proposed algorithm gives better results under noise attacks. Figure 3 illustrates similarity in the order of correlation between
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ Performance analysis of transformation and bogdonov chaotic substitution based โ€ฆ (Prajwalasimha S N) 193 the de-crypted and original images under different noise densities. Figure 4 Illustration of resultant images under different stage of the crypto-process. Also very close to the ideal values of Unified Average Changing Intensity (UACI=33.39%) but slight less and Number of Pixel Changing Rate (NPCR=99.61%) equal to the ideal value, slightly greater than that as observed in non-Chaotic substitution [25] are noticed from the outcome of the standard images. Figure 3. Correlation between the retrieved and original watermarks under noise interference Figure 4. Illustration of Host image, Substitution image and Cipher image after transformation, diffusion and substitution stages
  • 7. ๏ฒ ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 188 - 195 194 4. CONCLUSION In the proposed encryption scheme, Pseudo Hadamard transformation is used in the transformation stage to vary pixel positions and Bogdonov chaotic random sequence generator is used in the substitution stage to vary the pixel values in an image. High redundancy and strong correlation between the adjacent pixels are effectively reduced by the proposed technique. High degree of randomness obtained from Bogdonav chaotic generator in the substitution stage leads to achieve better entropy in the cipher image. Correlation between host and cipher images is very less indicating poor similarities between them. Average values of 99.61% number of pixel changing rate (NPCR) is observed which is almost equal to the ideal value and an average value of 33.39% unified average changing intensity (UACI) is obtained which is very close to the ideal values, for a set of twenty standard images. Further, more number of chaotic generators can be used to get random sequences for substitution stage of encryption to increase the level of security. REFERENCES [1] Leo Yu Zhang, et al., โ€œOn the Security of a Class of Diffusion Mechanisms for Image Encryption,โ€ IEEE Transactions on Cybernetics, vol. 48, no. 4, pp. 1163-1175, 2018. [2] Alireza Jolfaei, et al., โ€œOn the Security of Permutation-Only Image Encryption Schemes,โ€ IEEE Transactions on Information Forensics and Security, vol. 11, no. 2, pp. 235-246, 2016. [3] Yue Wu, et al., โ€œDiscrete Wheel-Switching Chaotic System and Applications,โ€ IEEE Transactions on Circuits and Systems, vol. 61, no. 12, pp. 3469-3476, 2014. [4] Prajwalasimha S N, et al., โ€œPerformance analysis of DCT and successive division based digital image watermarking scheme,โ€ Indonesian Journal of Electrical Engineering and Computer Science, vol. 15, no. 2, pp. 750-757, 2019 [5] Prajwalasimha S N, et al., โ€œLogarithmic Transform based Digital Watermarking Scheme,โ€ In: Pandian D., Fernando X., Baig Z., Shi F. (eds) Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB). ISMAC 2018. Lecture Notes in Computational Vision and Biomechanics, Springer, Cham, vol 30, 2019. [6] Prajwalasimha S N, et al., โ€œPerformance Analysis of Combined Discrete Fourier Transformation (DFT) and Successive Division based Image Watermarking Scheme,โ€ International Journal of Recent Technology and Engineering, vol. 8, no. 3, Sep. 2019 [7] Prajwalasimha S N, et al., โ€œDigital Image Watermarking Using Sine Transform Technique,โ€ In: Pandian D., Fernando X., Baig Z., Shi F. (eds) Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB). ISMAC 2018, Lecture Notes in Computational Vision and Biomechanics, Springer, Cham, vol. 30, 2019. [8] Sanjeev Sharma, et al., โ€œImproved method for image security based on chaotic-shuffle and chaotic diffusion algorithms,โ€ International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 1, pp. 273-280, 2019. [9] Samar M. Ismail, et al., โ€œGeneralized double-humped logistic map-based medical image encrytpion,โ€ Journal of Advanced Research, Elsevier, vol. 10, pp. 85-98, 2018. [10] V.M. Silva-Garcรญa, et al., โ€œSubstitution box generation using Chaos: An Image Encryption Application,โ€ Applied Mathematics and Computation, Elsevier, vol. 332, pp. 123-135, 2018. [11] Lingfeng Liu and Suoxia Miao, โ€œA new image encryption algorithm based on logistic chaotic map with varying parameter,โ€ SpringerPlus, vol. 286, no. 5, pp. 1-12, 2016. [12] Rasul Enayatifar, et al., โ€œImage encryption using a synchronous permutation-di๏ฌ€usion technique,โ€ Optics and Lasers in Engineering, Elsevier, vol. 90, pp. 146-154, 2017. [13] Lingfeng Liu, et al., โ€œImage block Encryption method based on chaotic maps,โ€ IET Journal on Signal Processing, vol. 12, no. 1, pp. 22-30, 2018. [14] Xingyuan Wang, et al., โ€œAn Image Encryption Algorithm Based on Josephus Traversing and Mixed Chaotic Map,โ€ IEEE Access Lett, vol. 6, pp. 23733-23746, 2018. [15] Delong Cui, et al., โ€œImage Encryption Using Block Based Transformation With Fractional Fourier Transform,โ€ Proc. of 8th International Conference on Communications and Networking in China, pp. 552-556, 2013. [16] Nitumoni Hazarika, et al., โ€œA Wavelet Based Partial Image Encryption using Chaotic Logistic Map,โ€ Proceedings of IEEE International Conference on Advanced Communication Control and Computing Technologies, pp. 1-5, 2014. [17] Prajwalasimha S.N., โ€œPseudo-Hadamard Transformation-Based Image Encryption Scheme.โ€ In: Krishna A., Srikantaiah K., Naveena C. (eds) Integrated Intelligent Computing, Communication and Security, Studies in Computational Intelligence, Springer, Singapore, vol. 771, 2019. [18] Anish Goel and Kaustubh Chaudhari, โ€œMedian Based Pixel Selection for Partial Image Encryption,โ€ Proc. of Sixth International Conference on Image Processing Theory, Tools and Applications, 2016. [19] Zaheer Abbas Balouch, et al., โ€œEnergy efficient image encryption algorithm,โ€ Proc. of International Conference on Innovations in Electrical Engineering and Computational Technologies, 2017. [20] S N Prajwalasimha, Usha Surendra, โ€œMultimedia Data Encryption based on Discrete Dyadic Transformation,โ€ Proc. of IEEE International conference on Signal processing and Communication, pp. 492-495, 2017.
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708 ๏ฒ Performance analysis of transformation and bogdonov chaotic substitution based โ€ฆ (Prajwalasimha S N) 195 [21] Nabil Ben Slimane, et al., โ€œNested chaotic image encryption scheme using two-diffusion process and the Secure Hash Algorithm SHA-1,โ€ Proc.of 4th International Conference on Control Engineering & Information Technology, 2016. [22] Prajwalasimha S N and S. R. Bhagyashree, โ€œImage Encryption using Discrete Radon Transformationand Non chaotic Substitution,โ€ Proc. 2nd IEEE International Conference on Electrical, Computer and Communication Technologies, pp. 842-846, 2017. [23] Prajwalasimha S N, Kavya S R and Tanaaz Zeba Ahmed, โ€œDesign and Analysis of Pseudo Hadamard Transformation and non-Chaotic Substitution based Image Encryption Scheme,โ€ Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 15, no. 3, 2019. [24] Shetter A., et al., โ€œImage de-noising algorithm based on filtering and histogram equalization,โ€ Proceedings of the International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC, pp 325-328, 2018. [25] Prajwalasimha S N and Basavaraj L, โ€œDesign and Implementation of Transformation and non-Chaotic Substitution based Image Cryptosystem,โ€ International Journal of Engineering and Advanced Technology, vol. 8, no. 6, pp. 1079-1083, 2019. BIOGRAPHIES OF AUTHORS Prajwalasimha S N received Bachelor of Engineering (B.E) Degree in Electronics & Communication from Visvesvaraya Technological University, India in 2012, Master of Technology (M.Tech) Degree in Digital Electronics & Communication Systems from Visvesvaraya Technological University, India in 2014 and pursuing Doctoral Degree (Ph.D) in the field of Cryptography under Visvesvaraya Technological University, India. He has published more than 20 research papers in International Journals, Conferences & Book Chapters and serving as Reviewer for many International Journals and Conferences. He has been conferred with best research contribution award from IEEE ICECCT 2017. His research interest includes Cryptography, Steganography, Digital Image Watermarking and Image Processing. Dr. L Basavaraj received Bachelor of Engineering (B.E) Degree in Electrical & Electronics Engineering from University of Mysore, India, Master of Technology (M.Tech) Degree in Digital Electronics from Darwad University, India and Doctoral Degree (Ph.D) in the field of Image & Signal Processing under University of Mysore, India. He has published more than 40 research papers in International Journals, Conferences & Book Chapters and currenty guiding 7 Ph.D scholars. Being senior member of IEEE, his research interest includes Image & Signal Processing.