Adaptive Image Encryption Using Henon Map Scrambling and Perona-Malik Diffusion
Existing System
The existing image encryption techniques primarily rely on traditional cryptographic methods
such as AES and RSA, which, while effective for text-based data, struggle with handling
high-dimensional image data. These methods suffer from high computational complexity,
redundancy, and strong spatial correlations between pixels, making them unsuitable for real-
time applications. Chaos-based encryption techniques, such as the Arnold Cat Map and
Logistic Map, have been explored to address these limitations. However, existing chaotic
encryption methods often exhibit low diffusion efficiency, meaning small changes in the
input image do not sufficiently impact the encrypted output, leaving them vulnerable to
differential attacks. Additionally, some chaotic scrambling methods suffer from periodicity,
making them susceptible to statistical attacks and brute-force decryption attempts.
Proposed System
The proposed image encryption framework integrates Henon Map scrambling, XOR
chaotic diffusion, and Perona-Malik anisotropic diffusion to enhance security,
randomness, and resistance against cryptographic attacks. The Henon Map applies a chaotic
transformation to disrupt pixel spatial correlations, making statistical analysis and brute-force
attacks ineffective. XOR chaotic diffusion introduces intensity variations by applying a
dynamically generated chaotic key, ensuring high sensitivity to key changes and strong
randomness. Finally, Perona-Malik anisotropic diffusion enhances diffusion properties while
preserving significant image structures, preventing excessive blurring and ensuring
adaptability to image features. This approach strengthens encryption robustness while
maintaining computational efficiency, making it suitable for real-time applications such as
IoT, medical imaging, and cloud-based image security.
Module Description
1. Henon Map Scrambling
Implements a chaotic transformation to shuffle pixel positions randomly.
Eliminates spatial correlations, making statistical reconstruction infeasible.
2. XOR Chaotic Diffusion
Generates a chaotic key sequence using the Henon Map.
Applies XOR operation to modify pixel intensities, ensuring strong key sensitivity.
3. Perona-Malik Anisotropic Diffusion
Enhances diffusion properties while preserving image edges.
Prevents excessive blurring and spreads pixel intensity variations adaptively.
4. Decryption Process
Performs inverse Perona-Malik diffusion, XOR decryption, and Henon inverse
scrambling.
Ensures lossless reconstruction of the original image given the correct decryption key.
This encryption framework balances security, computational efficiency, and real-time
applicability, outperforming traditional methods in terms of resistance to statistical and
differential attacks.