Abstract

The security of digital content during transmission and storage through insecure communication links and databases is a challenging issue in today's world. In this article, an encryption scheme based on fractal Tromino and Chebyshev polynomial-based generated chaotic matrix is presented. The scheme fulfills the most fundamental aspect of encryption that is diffusion and confusion. For confusion highly non-linear, pre-defined S-boxes are used. The proposed scheme has been tested using state-of-the-art key performance indicators including differential analysis, statistical analysis. Information entropy analysis, mean square error, and NIST-based randomness analysis. The encrypted images have the highest practically achievable entropy of 7.999 and the time analysis shows that the proposed system is suitable for real-time implementation. The rest of the results indicates that the proposed cryptosystem possesses high immunity toward various attacks. The security analysis compared with the existing scheme shows the strength of the suggested scheme.

Highlights

  • In this modern era of technology, the transmission and storage of multimedia content grow rapidly

  • A lot of work has been done in the field of cryptography [11] discrete and continuous chaotic maps are utilized by the work presented in [12]

  • The remaining of the manuscript is arranged as the discussion of the different basics concepts and procedure are described in section two of the article, the step includes in the encryption process, and the explanation and flow diagram of the proposed cryptosystem is discussed in section three of the paper and to validate the strength and immunity to various attacks, the security analysis is computed and displayed in section four of the article, and conclusion is drawn in Sect. 5 of the paper

Read more

Summary

Introduction

In this modern era of technology, the transmission and storage of multimedia content grow rapidly. The remaining of the manuscript is arranged as the discussion of the different basics concepts and procedure are described in section two of the article, the step includes in the encryption process, and the explanation and flow diagram of the proposed cryptosystem is discussed in section three of the paper and to validate the strength and immunity to various attacks, the security analysis is computed and displayed in section four of the article, and conclusion is drawn in Sect. This segment is dedicated to the discussion of basics utilized in the proposed cryptosystem

Generation of fractal Tromino
Proposed encryption scheme
Security analysis
Differential analysis
Statistical analysis
Histogram analysis
Lena Peppers Airplane Baboon
Lena peppers airplane Baboon
PSNR RGB
Time for encryption
Throughput analysis for encryption procedure
Heat map analysis
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.