An efficient chaos-based image encryption technique using bitplane decay and genetic operators
Loading...
Downloads
9
Date issued
Journal Title
Journal ISSN
Volume Title
Publisher
MDPI
Location
Signature
License
Abstract
Social networks have greatly expanded in the last ten years the need for sharing multimedia data. However, on open networks such as the Internet, where security is frequently compromised, it is simple for eavesdroppers to approach the actual contents without much difficulty. Researchers have created a variety of encryption methods to strengthen the security of this transmission and make it difficult for eavesdroppers to get genuine data. However, these conventional approaches increase computing costs and communication overhead and do not offer protection against fresh threats. The problems with current algorithms encourage academics to further investigate the subject and suggest new algorithms that are more effective than current methods, that reduce overhead, and which are equipped with features needed by next-generation multimedia networks. In this paper, a genetic operator-based encryption method for multimedia security is proposed. It has been noted that the proposed algorithm produces improved key strength results. The investigations using attacks on data loss, differential assaults, statistical attacks, and brute force attacks show that the encryption technique suggested has improved security performance. It focuses on two techniques, bitplane slicing and followed by block segmentation and scrambling. The suggested method first divides the plaintext picture into several blocks, which is then followed by block swapping done by the genetic operator used to combine the genetic information of two different images to generate new offspring. The key stream is produced from an iterative chaotic map with infinite collapse (ICMIC). Based on a close-loop modulation coupling (CMC) approach, a three-dimensional hyperchaotic ICMIC modulation map is proposed. By using a hybrid model of multidirectional circular permutation with this map, a brand-new colour image encryption algorithm is created. In this approach, a multidirectional circular permutation is used to disrupt the image's pixel placements, and genetic operations are used to replace the pixel values. According to simulation findings and security research, the technique can fend off brute-force, statistical, differential, known-plaintext, and chosen-plaintext assaults, and has a strong key sensitivity.
Description
Subject(s)
bitplane slicing, block swapping, mutation, scrambling, logistic map, CCI map
Citation
Sensors. 2022, vol. 22, issue 20, art. no. 8044.
Item identifier
Collections
Publikační činnost VŠB-TUO ve Web of Science / Publications of VŠB-TUO in Web of Science
OpenAIRE
Publikační činnost Katedry automatizační techniky a řízení / Publications of Department of Control Systems and Instrumentation (352)
Články z časopisů s impakt faktorem / Articles from Impact Factor Journals
OpenAIRE
Publikační činnost Katedry automatizační techniky a řízení / Publications of Department of Control Systems and Instrumentation (352)
Články z časopisů s impakt faktorem / Articles from Impact Factor Journals