WhatsApp at (+91-9098855509) Support
ijprems Logo
  • Home
  • About Us
    • Editor Vision
    • Editorial Board
    • Privacy Policy
    • Terms & Conditions
    • Publication Ethics
    • Peer Review Process
  • For Authors
    • Publication Process(up)
    • Submit Paper Online
    • Pay Publication Fee
    • Track Paper
    • Copyright Form
    • Paper Format
    • Topics
  • Fees
  • Indexing
  • Conference
  • Contact
  • Archieves
    • Current Issue
    • Past Issue
  • More
    • FAQs
    • Join As Reviewer
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

CHAOS-BASED IMAGE ENCRYPTION USING LORENZ SYSTEM

Varsha s s

Download Paper

Paper Contents

Abstract

The abstract depicts a chaos based image encryption scheme based on Lorenz system for overcoming the computational and security difficulties of classical one-dimensional chaotic maps. The usage of a single dimension chaotic map like a logistic map for image encryption goes back in the ages, but even with this, there are deficiencies because its iterations are highly determinable and time-consuming, especially for large images. The speculative approach contributes to finding solution to these issues by employing the Lorenz system which constitutes of multiple dimensions. It has a high degree of sensitivity towards variations in initial parameters making it unpredictable for attackers to even accurately forecast or reconstruct the phase of a multi-dimensional chaotic system. In the encryption making use of substitution-permutation network, SPN which is one of the structural ciphers in use for this purpose, incorporates two core concepts: substitution for replacement of data and shuffling data as the second function. The Lawrence system is particularly employed in creating the S-box which essentially forms a part of the encryption that brings about non-linearity ensuring that multiple environment pixels are substituted in a random fashion. This ensures that as long as there is small variation in the input, the output will be entirely different ensuring that the enciphered data system is endurable to differential attacks.

Copyright

Copyright © 2024 Varsha s. This is an open access article distributed under the Creative Commons Attribution License.

Paper Details
Paper ID: IJPREMS41100083310
ISSN: 2321-9653
Publisher: ijprems
Page Navigation
  • Abstract
  • Copyright
About IJPREMS

The International Journal of Progressive Research in Engineering, Management and Science is a peer-reviewed, open access journal that publishes original research articles in engineering, management, and applied sciences.

Quick Links
  • Home
  • About Our Journal
  • Editorial Board
  • Publication Ethics
Contact Us
  • IJPREMS - International Journal of Progressive Research in Engineering Management and Science, motinagar, ujjain, Madhya Pradesh., india
  • Chat with us on WhatsApp: +91 909-885-5509
  • Email us: editor@ijprems.com
  • Sun-Sat: 9:00 AM - 9:00 PM

© 2025 International Journal of Progressive Research in Engineering, Management and Science. All Rights Reserved.

Terms & Conditions | Privacy Policy | Publication Ethics | Peer Review Process | Contact Us