Enhanced Image Encryption based on Optimized Hybrid Chaotic Maps

Abstract

With the speedy progression of data transmission technology, the topic, image newlineencryption has become a broad research area under information security. Multiple newlineresearchers have been constantly focusing on digital image security during the past newline10 years. There are a lot of image encryptions algorithms, most of which perform newlineencryption by directly converting the original image into meaningless cipher images. newlineIn a visual basis, some of those algorithms are vulnerable to illegal attacks on open newlinechannels or few sharing platforms when performing the transmission. The extreme newlinerequirement of digital images in almost all fields is in the pursuit of securing the images newlineagainst adversaries, thereby leading to a protected transmission in the network. Owing newlineto high sensitive nature, some of the images associated with the medical and criminal newlineinvestigations are supposed to be vastly protected. Moreover, most of the encryption newlinemodels are suitable only for gray images, and not completely framed for the color newlineimages. On processing the advanced image encryption model, secure key generation newlineis considered as an important and essential task. Recently, the development of chaotic newlinemaps has been analyzed by the researchers in order to perform secured key generation. newlineHowever, hyper-tuning is the main problem faced by the chaotic maps as it requires newlinethe initial parameters to start the process. Numerous researchers have contributed newlinediverse algorithms in the field of chaotic cryptography with the aid of various types of newlinechaotic models such as chaotic maps, which are taken as one of the secure and reliable newlinetechniques to look after confidential data or information. The aim of this research work newlineis on the development of a secure image encryption model using different chaotic maps. newlineInitially two-level security is adopted by chaos baker map and Lanczos algorithm in the newlinestarting phase, followed by the integration of chaos baker map and SHA-1 algorithm newlinein the next phase. The experimental analysis of both phases is done based on testing newlinekey sensitivi

Description

Keywords

Citation

item.page.endorsement

item.page.review

item.page.supplemented

item.page.referenced