Abstract

The transmission of significant masses of sensitive and secret images over a public network is inevitable, and demands effective tools and technology to safeguard and conceal the data. In this paper, a symmetric multiple color image encryption technique is proposed by adopting a dual permutation and dual substitution framework. Firstly, the input images are combined into a large image and then segmented into many small and equal-sized pure-image elements. Secondly, using the elementary cellular automata Rule-30, these pure-image elements are permuted to obtain mixed-image elements. Thirdly, second-level permutation is undertaken on the mixed-image elements by applying zigzag pattern scanning. Fourthly, pixel values are substituted by employing the circular shift method; subsequently, second-level pixel substitution is realized through using chaotic random sequences from a 2D logistic map. Finally, the big encrypted image is segmented into smaller encrypted images. Additionally, the keys are calculated from the input images to attain input sensitivity. The efficiency of this method is quantified, based on the unified average changing intensity (UACI), information entropy, number of pixels change rate (NPCR), key sensitivity, key space, histogram, peak signal-to-noise ratio (PSNR) and correlation coefficient (CC) performance metrics. The outcome of the experiments and a comparative analysis with two similar methods indicate that the proposed method produced high security results.

Highlights

  • High speed networks and communication infrastructure in the modern digital facilitate easy and rapid online communication

  • The union of cellular automata (CA) and chaos theory-based image encryption design offers a superior solution for image security issues

  • The performance test results produced by the proposed technique is analyzed and compared here with three peer image ciphers based on performance metrics like the correlation coefficient, NPCR, peak signal-to-noise ratio (PSNR), UACI and information entropy

Read more

Summary

Introduction

High speed networks and communication infrastructure in the modern digital facilitate easy and rapid online communication. Real-time communication is put to good use in telemedicine, weather monitoring, defense surveillance, and social media, to name a few In these fields, images area primary source of information and, further, a massive quantum of visual content is transmitted using public networks and stored in the cloud. Images area primary source of information and, further, a massive quantum of visual content is transmitted using public networks and stored in the cloud Given that such digital images may contain secret and sensitive information of a personal, financial or national nature, it is imperative to ensure their safety in order to stop in formation leaks. The union of cellular automata (CA) and chaos theory-based image encryption design offers a superior solution for image security issues

Methods
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.