Secure chaotic image encryption based on multi-point row-column-crossover operation

Abhimanyu Kumar K. Patro*, Mukesh Drolia, Akash Deep Yadav, Bibhudendra Acharya

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapter

3 Citations (Scopus)

Abstract

In this present era, where everything is getting digitalized, information or data in any form, important to an organization or individual, are at a greater risk of being attacked under acts, commonly known as cyber-attack. Hence, a proper and more efficient cryptosystem is the prime need of the hour to secure the data (especially the image data). This chapter proposes an efficient multi-point crossover operation-based chaotic image encryption system to secure images. The multi-point crossover operation is performed on both the rows and columns of bit-planes in the images. The improved one-dimensional chaotic maps are then used to perform pixel-permutation and diffusion operations. The main advantage of this technique is the use of multi-point crossover operation in bit-levels. The multi-point crossover operation not only increases the security of cipher images but also increases the key space of the algorithm. The outcomes and analyses of various parameters show the best performance of the algorithm in image encryption and different common attacks.

Original languageEnglish
Title of host publicationHandbook of Research on Automated Feature Engineering and Advanced Applications in Data Science
PublisherIGI Global
Pages286-328
Number of pages43
ISBN (Electronic)9781799866619
ISBN (Print)1799866599, 9781799866596
DOIs
Publication statusPublished - 08-01-2021

All Science Journal Classification (ASJC) codes

  • General Computer Science

Fingerprint

Dive into the research topics of 'Secure chaotic image encryption based on multi-point row-column-crossover operation'. Together they form a unique fingerprint.

Cite this