Simple permutation and diffusion operation based image encryption using various one-dimensional chaotic maps: A comparative analysis on security

Dasari Sravanthi, K. Abhimanyu Kumar Patro, Bibhudendra Acharya, M. Prasanth Jagapathi Babu

Research output: Chapter in Book/Report/Conference proceedingChapter

9 Citations (SciVal)

Abstract

With the development in technology, the security of transmission and storage of digital information (basically, digital images) is a challenge to all cryptographic researchers. In recent years, for securing digital images multiple encryption techniques have been proposed. Among them, one-dimensional (1D) chaotic map based image encryption techniques render better security in storage and transmission of images. 1D chaotic maps are simple in structure and hence efficient to implement in both software and hardware. An image encryption based on simple permutation and diffusion operation using various 1D chaotic maps is proposed in this paper. The proposed technique first performs pixel permutation operation using various 1D chaotic maps and then performs pixel diffusion operation using pixel key generated by the Secure Hash Algorithm-256 and the plain image. Also in this paper, a comparative analysis of security is presented using various 1D chaotic maps in image encryptions. The comparative results show the best security of using most of the 1D chaotic maps in image encryptions.

Original languageEnglish
Title of host publicationLecture Notes in Networks and Systems
PublisherSpringer Gabler
Pages81-96
Number of pages16
DOIs
Publication statusPublished - 2020

Publication series

NameLecture Notes in Networks and Systems
Volume94
ISSN (Print)2367-3370
ISSN (Electronic)2367-3389

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • Signal Processing
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Simple permutation and diffusion operation based image encryption using various one-dimensional chaotic maps: A comparative analysis on security'. Together they form a unique fingerprint.

Cite this