Abstract

Single image encryption schemes are not efficient enough when a bunch of images is to be encrypted in some real-world setting. To overcome this problem, an efficient and secured multiple images encryption scheme is proposed in this study using two chaotic maps and simple row and column swapping operations in a 3D image space. The N input images are piled to make a 3D image. To confuse the given pixel data, two images are chosen randomly from this pile. The randomly chosen two rows from the two randomly chosen images are swapped with each other. In the same way, two randomly chosen columns are swapped with each other. The operation of randomly chosen two images, two rows, and two columns have been iterated an arbitrary number of times to throw the confusion effects in the pixels data. Intertwining Logistic Map (ILM) and Improved Piecewise Linear Chaotic Map (MPWLCM) have been used to get the four streams of random numbers. The three streams of the former map have been used to create the confusion effects, whereas the fourth stream of random numbers given by the latter map has been used for the diffusion effects. SHA-256 hash codes have been used to throw the plaintext sensitivity in the proposed cipher. Besides, a 256-bit user key has been employed to increase the key space. Both the simulation and the exhaustive security analyses carried out at the end vividly prove the security, resistance to the varied attacks, and the real-world applicability of the proposed cipher.

Highlights

  • In this modern age, cameras are embedded in virtually every digital device

  • Since the proposed multiple images encryption scheme is symmetric so its decryption procedure will consist of the exact reverse steps of the encryption procedure

  • The results prove that the proposed encryption scheme is strong enough to cope with the differential attacks of NPCR and UACI

Read more

Summary

INTRODUCTION

Cameras are embedded in virtually every digital device. The resolution of these digital devices is getting high with each passing day. These properties are very promising for the enterprise of cryptography due to which researchers use these maps in their schemes for random data generation These streams play a vital role in the encryption process and provide help in the permutation (confusion/scrambling) and substitution (diffusion) process. They shuffled the input image pixels using the 2D standard map; they substituted the pixels’ values using the 2D lookup tables This process was conducted for a significant amount of time to achieve satisfactory results. In yet another scheme presented in [35], the chaotic logistic map was used for the pixels swapping.

ROWS AND COLUMNS’ SWAPPING OPERATIONS
ENCRYPTION PROCEDURE
DECRYPTION PROCEDURE
SIMULATION
SECURITY ANALYSIS
INFORMATION ENTROPY ANALYSIS
NOISE AND DATA LOSS ANALYSIS
TIME COMPLEXITY ANALYSIS
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call