TY - CHAP
T1 - A secure chaotic image encryption based on bit-plane operation
AU - Sravanthi, Dasari
AU - Abhimanyu Kumar Patro, K.
AU - Acharya, Bibhudendra
AU - Majumder, Saikat
N1 - Funding Information:
Acknowledgements This research work is supported by Information Security Education Awareness (ISEA) project phase-II, Department of Electronics and Information Technology (DeitY), Govt. of India.
Publisher Copyright:
© Springer Nature Singapore Pte Ltd. 2019.
PY - 2018
Y1 - 2018
N2 - Today security is an issue in the transmission of digital information, basically digital images through the internet. In this paper, we have proposed an image encryption technique based on bit-plane operation by using Piece-wise Linear Chaotic Map (PWLCM) and 2-D Logistic-adjusted-Sine map. At first, bit-plane diffusion operation is performed by using the PWLCM system and secondly, the row-shuffling and column-shuffling operations are performed by using the 2-D Logistic-adjusted-Sine map. Apart from that, the Secure Hash Algorithm SHA-256 is used to update the secret keys of the proposed cryptosystem to resist known-plaintext attack and chosen-plaintext attack. The main significance of this algorithm is bit-plane operation. The bit-plane operation not only confuses the pixels but also diffuses the pixels simultaneously. The simulation results show the better encryption results of the proposed cryptosystem while the security analysis shows the stronger resistivity against the most known common attacks.
AB - Today security is an issue in the transmission of digital information, basically digital images through the internet. In this paper, we have proposed an image encryption technique based on bit-plane operation by using Piece-wise Linear Chaotic Map (PWLCM) and 2-D Logistic-adjusted-Sine map. At first, bit-plane diffusion operation is performed by using the PWLCM system and secondly, the row-shuffling and column-shuffling operations are performed by using the 2-D Logistic-adjusted-Sine map. Apart from that, the Secure Hash Algorithm SHA-256 is used to update the secret keys of the proposed cryptosystem to resist known-plaintext attack and chosen-plaintext attack. The main significance of this algorithm is bit-plane operation. The bit-plane operation not only confuses the pixels but also diffuses the pixels simultaneously. The simulation results show the better encryption results of the proposed cryptosystem while the security analysis shows the stronger resistivity against the most known common attacks.
UR - http://www.scopus.com/inward/record.url?scp=85052935305&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85052935305&partnerID=8YFLogxK
U2 - 10.1007/978-981-13-0514-6_68
DO - 10.1007/978-981-13-0514-6_68
M3 - Chapter
AN - SCOPUS:85052935305
T3 - Advances in Intelligent Systems and Computing
SP - 717
EP - 726
BT - Advances in Intelligent Systems and Computing
PB - Springer Verlag
ER -