An efficient chaos-based image encryption technique using bitplane decay and genetic operators

dc.contributor.authorPremkumar, Ramesh
dc.contributor.authorMahdal, Miroslav
dc.contributor.authorElangovan, Muniyandy
dc.date.accessioned2022-12-06T10:44:23Z
dc.date.available2022-12-06T10:44:23Z
dc.date.issued2022
dc.description.abstractSocial networks have greatly expanded in the last ten years the need for sharing multimedia data. However, on open networks such as the Internet, where security is frequently compromised, it is simple for eavesdroppers to approach the actual contents without much difficulty. Researchers have created a variety of encryption methods to strengthen the security of this transmission and make it difficult for eavesdroppers to get genuine data. However, these conventional approaches increase computing costs and communication overhead and do not offer protection against fresh threats. The problems with current algorithms encourage academics to further investigate the subject and suggest new algorithms that are more effective than current methods, that reduce overhead, and which are equipped with features needed by next-generation multimedia networks. In this paper, a genetic operator-based encryption method for multimedia security is proposed. It has been noted that the proposed algorithm produces improved key strength results. The investigations using attacks on data loss, differential assaults, statistical attacks, and brute force attacks show that the encryption technique suggested has improved security performance. It focuses on two techniques, bitplane slicing and followed by block segmentation and scrambling. The suggested method first divides the plaintext picture into several blocks, which is then followed by block swapping done by the genetic operator used to combine the genetic information of two different images to generate new offspring. The key stream is produced from an iterative chaotic map with infinite collapse (ICMIC). Based on a close-loop modulation coupling (CMC) approach, a three-dimensional hyperchaotic ICMIC modulation map is proposed. By using a hybrid model of multidirectional circular permutation with this map, a brand-new colour image encryption algorithm is created. In this approach, a multidirectional circular permutation is used to disrupt the image's pixel placements, and genetic operations are used to replace the pixel values. According to simulation findings and security research, the technique can fend off brute-force, statistical, differential, known-plaintext, and chosen-plaintext assaults, and has a strong key sensitivity.cs
dc.description.firstpageart. no. 8044cs
dc.description.issue20cs
dc.description.sourceWeb of Sciencecs
dc.description.volume22cs
dc.identifier.citationSensors. 2022, vol. 22, issue 20, art. no. 8044.cs
dc.identifier.doi10.3390/s22208044
dc.identifier.issn1424-8220
dc.identifier.urihttp://hdl.handle.net/10084/148964
dc.identifier.wos000873397700001
dc.language.isoencs
dc.publisherMDPIcs
dc.relation.ispartofseriesSensorscs
dc.relation.urihttps://doi.org/10.3390/s22208044cs
dc.rights© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.cs
dc.rights.accessopenAccesscs
dc.rights.urihttp://creativecommons.org/licenses/by/4.0cs
dc.subjectbitplane slicingcs
dc.subjectblock swappingcs
dc.subjectmutationcs
dc.subjectscramblingcs
dc.subjectlogistic mapcs
dc.subjectCCI mapcs
dc.titleAn efficient chaos-based image encryption technique using bitplane decay and genetic operatorscs
dc.typearticlecs
dc.type.statusPeer-reviewedcs
dc.type.versionpublishedVersioncs

Files

Original bundle

Now showing 1 - 1 out of 1 results
Loading...
Thumbnail Image
Name:
1424-8220-2022v22i20an8044.pdf
Size:
7.46 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 out of 1 results
Loading...
Thumbnail Image
Name:
license.txt
Size:
718 B
Format:
Item-specific license agreed upon to submission
Description: