Show simple item record

dc.contributor.authorPremkumar, Ramesh
dc.contributor.authorMahdal, Miroslav
dc.contributor.authorElangovan, Muniyandy
dc.date.accessioned2022-12-06T10:44:23Z
dc.date.available2022-12-06T10:44:23Z
dc.date.issued2022
dc.identifier.citationSensors. 2022, vol. 22, issue 20, art. no. 8044.cs
dc.identifier.issn1424-8220
dc.identifier.urihttp://hdl.handle.net/10084/148964
dc.description.abstractSocial networks have greatly expanded in the last ten years the need for sharing multimedia data. However, on open networks such as the Internet, where security is frequently compromised, it is simple for eavesdroppers to approach the actual contents without much difficulty. Researchers have created a variety of encryption methods to strengthen the security of this transmission and make it difficult for eavesdroppers to get genuine data. However, these conventional approaches increase computing costs and communication overhead and do not offer protection against fresh threats. The problems with current algorithms encourage academics to further investigate the subject and suggest new algorithms that are more effective than current methods, that reduce overhead, and which are equipped with features needed by next-generation multimedia networks. In this paper, a genetic operator-based encryption method for multimedia security is proposed. It has been noted that the proposed algorithm produces improved key strength results. The investigations using attacks on data loss, differential assaults, statistical attacks, and brute force attacks show that the encryption technique suggested has improved security performance. It focuses on two techniques, bitplane slicing and followed by block segmentation and scrambling. The suggested method first divides the plaintext picture into several blocks, which is then followed by block swapping done by the genetic operator used to combine the genetic information of two different images to generate new offspring. The key stream is produced from an iterative chaotic map with infinite collapse (ICMIC). Based on a close-loop modulation coupling (CMC) approach, a three-dimensional hyperchaotic ICMIC modulation map is proposed. By using a hybrid model of multidirectional circular permutation with this map, a brand-new colour image encryption algorithm is created. In this approach, a multidirectional circular permutation is used to disrupt the image's pixel placements, and genetic operations are used to replace the pixel values. According to simulation findings and security research, the technique can fend off brute-force, statistical, differential, known-plaintext, and chosen-plaintext assaults, and has a strong key sensitivity.cs
dc.language.isoencs
dc.publisherMDPIcs
dc.relation.ispartofseriesSensorscs
dc.relation.urihttps://doi.org/10.3390/s22208044cs
dc.rights© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.cs
dc.rights.urihttp://creativecommons.org/licenses/by/4.0cs
dc.subjectbitplane slicingcs
dc.subjectblock swappingcs
dc.subjectmutationcs
dc.subjectscramblingcs
dc.subjectlogistic mapcs
dc.subjectCCI mapcs
dc.titleAn efficient chaos-based image encryption technique using bitplane decay and genetic operatorscs
dc.typearticlecs
dc.identifier.doi10.3390/s22208044
dc.rights.accessopenAccesscs
dc.type.versionpublishedVersioncs
dc.type.statusPeer-reviewedcs
dc.description.sourceWeb of Sciencecs
dc.description.volume22cs
dc.description.issue20cs
dc.description.firstpageart. no. 8044cs
dc.identifier.wos000873397700001


Files in this item

This item appears in the following Collection(s)

Show simple item record

© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Except where otherwise noted, this item's license is described as © 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.