Enhanced Image Encryption based on Optimized Hybrid Chaotic Maps
Loading...
Date
item.page.authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
With the speedy progression of data transmission technology, the topic, image
newlineencryption has become a broad research area under information security. Multiple
newlineresearchers have been constantly focusing on digital image security during the past
newline10 years. There are a lot of image encryptions algorithms, most of which perform
newlineencryption by directly converting the original image into meaningless cipher images.
newlineIn a visual basis, some of those algorithms are vulnerable to illegal attacks on open
newlinechannels or few sharing platforms when performing the transmission. The extreme
newlinerequirement of digital images in almost all fields is in the pursuit of securing the images
newlineagainst adversaries, thereby leading to a protected transmission in the network. Owing
newlineto high sensitive nature, some of the images associated with the medical and criminal
newlineinvestigations are supposed to be vastly protected. Moreover, most of the encryption
newlinemodels are suitable only for gray images, and not completely framed for the color
newlineimages. On processing the advanced image encryption model, secure key generation
newlineis considered as an important and essential task. Recently, the development of chaotic
newlinemaps has been analyzed by the researchers in order to perform secured key generation.
newlineHowever, hyper-tuning is the main problem faced by the chaotic maps as it requires
newlinethe initial parameters to start the process. Numerous researchers have contributed
newlinediverse algorithms in the field of chaotic cryptography with the aid of various types of
newlinechaotic models such as chaotic maps, which are taken as one of the secure and reliable
newlinetechniques to look after confidential data or information. The aim of this research work
newlineis on the development of a secure image encryption model using different chaotic maps.
newlineInitially two-level security is adopted by chaos baker map and Lanczos algorithm in the
newlinestarting phase, followed by the integration of chaos baker map and SHA-1 algorithm
newlinein the next phase. The experimental analysis of both phases is done based on testing
newlinekey sensitivi