Abstract
Single image encryption schemes are not efficient enough when a bunch of images is to be encrypted in some real-world setting. To overcome this problem, an efficient and secured multiple images encryption scheme is proposed in this study using two chaotic maps and simple row and column swapping operations in a 3D image space. The N input images are piled to make a 3D image. To confuse the given pixel data, two images are chosen randomly from this pile. The randomly chosen two rows from the two randomly chosen images are swapped with each other. In the same way, two randomly chosen columns are swapped with each other. The operation of randomly chosen two images, two rows, and two columns have been iterated an arbitrary number of times to throw the confusion effects in the pixels data. Intertwining Logistic Map (ILM) and Improved Piecewise Linear Chaotic Map (MPWLCM) have been used to get the four streams of random numbers. The three streams of the former map have been used to create the confusion effects, whereas the fourth stream of random numbers given by the latter map has been used for the diffusion effects. SHA-256 hash codes have been used to throw the plaintext sensitivity in the proposed cipher. Besides, a 256-bit user key has been employed to increase the key space. Both the simulation and the exhaustive security analyses carried out at the end vividly prove the security, resistance to the varied attacks, and the real-world applicability of the proposed cipher.
Highlights
In this modern age, cameras are embedded in virtually every digital device
Since the proposed multiple images encryption scheme is symmetric so its decryption procedure will consist of the exact reverse steps of the encryption procedure
The results prove that the proposed encryption scheme is strong enough to cope with the differential attacks of NPCR and UACI
Summary
Cameras are embedded in virtually every digital device. The resolution of these digital devices is getting high with each passing day. These properties are very promising for the enterprise of cryptography due to which researchers use these maps in their schemes for random data generation These streams play a vital role in the encryption process and provide help in the permutation (confusion/scrambling) and substitution (diffusion) process. They shuffled the input image pixels using the 2D standard map; they substituted the pixels’ values using the 2D lookup tables This process was conducted for a significant amount of time to achieve satisfactory results. In yet another scheme presented in [35], the chaotic logistic map was used for the pixels swapping.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have