AI IS NOT ALLOWED!
1. Image Selection: Choose an image for encryption. This cou
AI IS NOT ALLOWED! 1. Image Selection: Choose an image for encryption. This could be a personal photo or a commonly
used standard image such as Lena, Baboon, or Barbara.
2. Encryption Techniques: Implement a fusion of encryption techniques, with a focus on chaotic
maps and/or cellular automata with your proposed method.
3. Key Generation: Propose and implement a method for Key Generation that will be integral to
the encryption process. Explain the rationale behind your chosen approach and how it contributes
to the security of the encryption.
4. Decryption Process: Develop a corresponding decryption process using the generated key.
Clearly articulate the steps involved in decrypting the encrypted image.
5. Documentation: Provide comprehensive documentation that includes code snippets,
explanations, and any external references used in the development of your encryption and
decryption processes.
6. Analysis: To conclude the assignment, assess the efficacy of your suggested encryption method
by computing the Normalized Pixel Change Rate (NPCR) and Unified Average Change Intensity
(UACI). It is recommended to aim for an NPCR value above 90, while achieving a UACI around
33. This quantitative evaluation will provide insights into the performance and reliability of the
proposed encryption approach
Leave a Reply