TY - JOUR
T1 - A novel image encryption based on bit-shuffled improved tent map
AU - Gupta, Aaditya
AU - Thawait, Richa
AU - Abhimanyu Kumar Patro, K.
AU - Acharya, Bibhudendra
N1 - Publisher Copyright:
© International Science Press.
PY - 2016
Y1 - 2016
N2 - With the fast progression of digital data communication in an electronic way, information security is becoming an issue in the modern advancing technology. Cryptography is one of the techniques of modern electronic security that serves the purpose of maintaining information security. There are numerous ways to encrypt and decrypt information for maintaining security. In this paper, a bit-shuffled improved tent map based image encryption technique is proposed. The implementation is based on the improved tent map combined with bit-shuffling operation using random sequence. The simulation results and security analysis shows that the proposed algorithm is resistive to brute-force attacks, statistical attacks, differential attacks, sensitive to secret keys and have more randomness. The proposed scheme is efficient and reliable and this technique can be applied in various fields where confidentiality of image is needed during communication and transmission such as in Governments, military, financial institutions, hospitals, etc.
AB - With the fast progression of digital data communication in an electronic way, information security is becoming an issue in the modern advancing technology. Cryptography is one of the techniques of modern electronic security that serves the purpose of maintaining information security. There are numerous ways to encrypt and decrypt information for maintaining security. In this paper, a bit-shuffled improved tent map based image encryption technique is proposed. The implementation is based on the improved tent map combined with bit-shuffling operation using random sequence. The simulation results and security analysis shows that the proposed algorithm is resistive to brute-force attacks, statistical attacks, differential attacks, sensitive to secret keys and have more randomness. The proposed scheme is efficient and reliable and this technique can be applied in various fields where confidentiality of image is needed during communication and transmission such as in Governments, military, financial institutions, hospitals, etc.
UR - http://www.scopus.com/inward/record.url?scp=85007480288&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85007480288&partnerID=8YFLogxK
M3 - Article
AN - SCOPUS:85007480288
SN - 0974-5572
VL - 9
SP - 1
EP - 16
JO - International Journal of Control Theory and Applications
JF - International Journal of Control Theory and Applications
IS - 34
ER -