Abstract

Recently, the digital multimedia security technology has been an interesting research theme due to fast advancement in employing real time multimedia through Internet and wireless networks. The market of multimedia streaming, such as exclusive video on demand (VoD) is a huge multi- billion-dollar market. This market is threatened by hackers. The multimedia streaming industry needs a cryptosystem that is both fast and secure. Chaotic cryptosystems have been proposed by many researchers in order to promote communication security. However, these chaotic schemes have some major problems, such as unacceptable expansion of data, slow performance speed, and shortcomings against differential attack. Therefore, this paper provides an efficient Fractional Fourier Transform (FrFT)-based logistic map (LM) color image encryption scheme by applying a 2D LM on FrFT. In the proposed FrFT-based LM color image encryption scheme, the 2D LM is employed as a confusion step to scramble the color image pixel positions in the FrFT and confuse the relationship between the cipherimage and the plainimage. For enhancing the encryption performance characteristics of the 2D LM under the FrFT, the angle of the FrFT is taken as an extra additional key in encryption. The proposed FrFT-based LM color image encryption scheme is examined and investigated using visual inspection, entropy, histograms, encryption quality, noise tests, and differential analysis. The obtained simulation tests demonstrate and verify the effectiveness of the FrFT-based LM color image encryption scheme. Moreover, our results also show a significant improvement in the performance of the confusion property with our proposed 2D LM encryption scheme using the FrFT. Also, we compared the proposed cryptosystem with recent state-of-the-art cryptosystems. Experimental results show that our proposed image cryptosystem is highly secure from the cryptographic point of view. Furthermore, the obtained test results ensured the superiority of our proposed cryptosystem for digital image transmission compared to the recent state-of-theart cryptosystems.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.