4.6 Article

4D Hyperchaotic map and DNA encoding combined image encryption for secure communication

期刊

MULTIMEDIA TOOLS AND APPLICATIONS
卷 81, 期 11, 页码 15859-15878

出版社

SPRINGER
DOI: 10.1007/s11042-022-12598-5

关键词

Integer wavelet Transfrom (IWT); Logistic map; Global bit scrambling (GBS); 4D Lorenz Hyperchaotic system; Inverse integer wavelet transform (IIWT); DNA rules; XOR

向作者/读者索取更多资源

The usage of digital health data has increased drastically in recent years, leading to a greater need for information security. Conventional encryption algorithms such as DES and AES are less effective in providing sufficient security against various cyber-attacks, calling for more advanced encryption methods.
The usage of digital health data such as documents, images and videos has increased drastically in recent years, making them more prone to sophisticated cyber threats. Here arises a great requirement of information security since this digital data is sent through the public network. Many encryption algorithms were utilised to protect digital data from typical attacks. There exist several conventional encryption algorithms such as Data Encryption Standard (DES), Advanced Encryption Standard (AES), International DataEncryption Algorithm (IDEA), etc., which are used for encryption purposes. Still, they take longer execution time, provides poor security and are more vulnerable to several cyber-attacks. The proposed work provides a cryptosystem based on 4D Lorenz type hyper-chaos and Deoxyribonucleic acid (DNA) encoding mechanism to overcome earlier method limitations. The approximated and detailed coefficients of the input image is obtained by applying Integer Wavelet Transform (IWT). Then, the pixels of the Low-Low (LL) band get permuted using a Logistic map. The 4D hyper-chaotic system creates a pseudo-random chaotic sequence using the initial values, quantised to a keystream. The final data gets encoded using the DNA encoding rule. For enhanced diffusion, DNA-XOR is performed to produce the final cipher image. Various performance metrics have been analysed for several images, and the experimental results show that the proposed scheme is effective against brute force attacks.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据