An Efficient Chaos-Based Image Encryption Technique Using Bitplane Decay and Genetic Operators
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27230%2F22%3A10250669" target="_blank" >RIV/61989100:27230/22:10250669 - isvavai.cz</a>
Result on the web
<a href="https://mdpi-res.com/d_attachment/sensors/sensors-22-08044/article_deploy/sensors-22-08044.pdf?version=1666342975" target="_blank" >https://mdpi-res.com/d_attachment/sensors/sensors-22-08044/article_deploy/sensors-22-08044.pdf?version=1666342975</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.3390/s22208044" target="_blank" >10.3390/s22208044</a>
Alternative languages
Result language
angličtina
Original language name
An Efficient Chaos-Based Image Encryption Technique Using Bitplane Decay and Genetic Operators
Original language description
Social networks have greatly expanded in the last ten years the need for sharing multimedia data. However, on open networks such as the Internet, where security is frequently compromised, it is simple for eavesdroppers to approach the actual contents without much difficulty. Researchers have created a variety of encryption methods to strengthen the security of this transmission and make it difficult for eavesdroppers to get genuine data. However, these conventional approaches increase computing costs and communication overhead and do not offer protection against fresh threats. The problems with current algorithms encourage academics to further investigate the subject and suggest new algorithms that are more effective than current methods, that reduce overhead, and which are equipped with features needed by next-generation multimedia networks. In this paper, a genetic operator-based encryption method for multimedia security is proposed. It has been noted that the proposed algorithm produces improved key strength results. The investigations using attacks on data loss, differential assaults, statistical attacks, and brute force attacks show that the encryption technique suggested has improved security performance. It focuses on two techniques, bitplane slicing and followed by block segmentation and scrambling. The suggested method first divides the plaintext picture into several blocks, which is then followed by block swapping done by the genetic operator used to combine the genetic information of two different images to generate new offspring. The key stream is produced from an iterative chaotic map with infinite collapse (ICMIC). Based on a close-loop modulation coupling (CMC) approach, a three-dimensional hyperchaotic ICMIC modulation map is proposed. By using a hybrid model of multidirectional circular permutation with this map, a brand-new colour image encryption algorithm is created. In this approach, a multidirectional circular permutation is used to disrupt the image's pixel placements, and genetic operations are used to replace the pixel values. According to simulation findings and security research, the technique can fend off brute-force, statistical, differential, known-plaintext, and chosen-plaintext assaults, and has a strong key sensitivity.
Czech name
—
Czech description
—
Classification
Type
J<sub>imp</sub> - Article in a specialist periodical, which is included in the Web of Science database
CEP classification
—
OECD FORD branch
20301 - Mechanical engineering
Result continuities
Project
—
Continuities
S - Specificky vyzkum na vysokych skolach
Others
Publication year
2022
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Name of the periodical
Sensors
ISSN
1424-3210
e-ISSN
1424-8220
Volume of the periodical
22
Issue of the periodical within the volume
20
Country of publishing house
CH - SWITZERLAND
Number of pages
23
Pages from-to
1-23
UT code for WoS article
000873397700001
EID of the result in the Scopus database
2-s2.0-85140833412