Abstract

Nowadays, the images are transferred through open channels that are subject to potential attacks, so the exchange of image data requires additional security in many fields, such as medical, military, banking, etc. The security factors are essential in preventing the system from brute force and differential attacks. We propose an Enhanced Logistic Map (ELM) while using chaotic maps and simple encryption techniques, such as block scrambling, modified zigzag transformation for encryption phases, including permutation, diffusion, and key stream generation to withstand the attacks. The results of encryption are evaluated while using the histogram, correlation analysis, Number of Pixel Change Rate (NPCR), Unified Average Change Intensity (UACI), Peak-Signal-to-Noise Ratio (PSNR), and entropy. Our results demonstrate the security, reliability, efficiency, and flexibility of the proposed method.

Highlights

  • With rapid spread of cloud computing, mobile networks, internet of things, and social networking, the issue of secure transmission of image data has become increasingly relevant [1,2]

  • Encrypting secret information that is sent over Internet or wireless networks as multimedia is important in satisfying the need of a secure route of data transmission over various communications channels

  • Different types of data are transmitted over the channels, for example, text, images, audio, video, three-dimensional (3D), and others for many domains of application, such as military, medical, financial institutions, etc

Read more

Summary

Introduction

With rapid spread of cloud computing, mobile networks, internet of things, and social networking, the issue of secure transmission of image data has become increasingly relevant [1,2]. Encrypting secret information that is sent over Internet or wireless networks as multimedia is important in satisfying the need of a secure route of data transmission over various communications channels. Adjustment, or the destruction of data ought to anchor the data exchanged through these channels. Different types of data are transmitted over the channels, for example, text, images, audio, video, three-dimensional (3D), and others for many domains of application, such as military, medical, financial institutions, etc. The security of those images is a challenge. The critical part of exchanging images is security, in order to protect the image from unauthorized access and modification

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call