Abstract
The security of digital content during transmission and storage through insecure communication links and databases is a challenging issue in today's world. In this article, an encryption scheme based on fractal Tromino and Chebyshev polynomial-based generated chaotic matrix is presented. The scheme fulfills the most fundamental aspect of encryption that is diffusion and confusion. For confusion highly non-linear, pre-defined S-boxes are used. The proposed scheme has been tested using state-of-the-art key performance indicators including differential analysis, statistical analysis. Information entropy analysis, mean square error, and NIST-based randomness analysis. The encrypted images have the highest practically achievable entropy of 7.999 and the time analysis shows that the proposed system is suitable for real-time implementation. The rest of the results indicates that the proposed cryptosystem possesses high immunity toward various attacks. The security analysis compared with the existing scheme shows the strength of the suggested scheme.
Highlights
In this modern era of technology, the transmission and storage of multimedia content grow rapidly
A lot of work has been done in the field of cryptography [11] discrete and continuous chaotic maps are utilized by the work presented in [12]
The remaining of the manuscript is arranged as the discussion of the different basics concepts and procedure are described in section two of the article, the step includes in the encryption process, and the explanation and flow diagram of the proposed cryptosystem is discussed in section three of the paper and to validate the strength and immunity to various attacks, the security analysis is computed and displayed in section four of the article, and conclusion is drawn in Sect. 5 of the paper
Summary
In this modern era of technology, the transmission and storage of multimedia content grow rapidly. The remaining of the manuscript is arranged as the discussion of the different basics concepts and procedure are described in section two of the article, the step includes in the encryption process, and the explanation and flow diagram of the proposed cryptosystem is discussed in section three of the paper and to validate the strength and immunity to various attacks, the security analysis is computed and displayed in section four of the article, and conclusion is drawn in Sect. This segment is dedicated to the discussion of basics utilized in the proposed cryptosystem
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.