IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Secure Chaotic Image Encryption Based on Multi-Point Row-Column-Crossover Operation

Secure Chaotic Image Encryption Based on Multi-Point Row-Column-Crossover Operation
View Sample PDF
Author(s): K. Abhimanyu Kumar Patro (National Institute of Technology, Raipur, India), Mukesh Drolia (National Institute of Technology, Raipur, India), Akash Deep Yadav (National Institute of Technology, Raipur, India)and Bibhudendra Acharya (National Institute of Technology, Raipur, India)
Copyright: 2021
Pages: 43
Source title: Handbook of Research on Automated Feature Engineering and Advanced Applications in Data Science
Source Author(s)/Editor(s): Mrutyunjaya Panda (Utkal University, India)and Harekrishna Misra (Institute of Rural Management, Anand, India)
DOI: 10.4018/978-1-7998-6659-6.ch017

Purchase

View Secure Chaotic Image Encryption Based on Multi-Point Row-Column-Crossover Operation on the publisher's website for pricing and purchasing information.

Abstract

In this present era, where everything is getting digitalized, information or data in any form, important to an organization or individual, are at a greater risk of being attacked under acts, commonly known as cyber-attack. Hence, a proper and more efficient cryptosystem is the prime need of the hour to secure the data (especially the image data). This chapter proposes an efficient multi-point crossover operation-based chaotic image encryption system to secure images. The multi-point crossover operation is performed on both the rows and columns of bit-planes in the images. The improved one-dimensional chaotic maps are then used to perform pixel-permutation and diffusion operations. The main advantage of this technique is the use of multi-point crossover operation in bit-levels. The multi-point crossover operation not only increases the security of cipher images but also increases the key space of the algorithm. The outcomes and analyses of various parameters show the best performance of the algorithm in image encryption and different common attacks.

Related Content

Princy Pappachan, Sreerakuvandana, Mosiur Rahaman. © 2024. 26 pages.
Winfred Yaokumah, Charity Y. M. Baidoo, Ebenezer Owusu. © 2024. 23 pages.
Mario Casillo, Francesco Colace, Brij B. Gupta, Francesco Marongiu, Domenico Santaniello. © 2024. 25 pages.
Suchismita Satapathy. © 2024. 19 pages.
Xinyi Gao, Minh Nguyen, Wei Qi Yan. © 2024. 13 pages.
Mario Casillo, Francesco Colace, Brij B. Gupta, Angelo Lorusso, Domenico Santaniello, Carmine Valentino. © 2024. 30 pages.
Pratyay Das, Amit Kumar Shankar, Ahona Ghosh, Sriparna Saha. © 2024. 32 pages.
Body Bottom