期刊
MULTIMEDIA TOOLS AND APPLICATIONS
卷 81, 期 11, 页码 15859-15878出版社
SPRINGER
DOI: 10.1007/s11042-022-12598-5
关键词
Integer wavelet Transfrom (IWT); Logistic map; Global bit scrambling (GBS); 4D Lorenz Hyperchaotic system; Inverse integer wavelet transform (IIWT); DNA rules; XOR
The usage of digital health data has increased drastically in recent years, leading to a greater need for information security. Conventional encryption algorithms such as DES and AES are less effective in providing sufficient security against various cyber-attacks, calling for more advanced encryption methods.
The usage of digital health data such as documents, images and videos has increased drastically in recent years, making them more prone to sophisticated cyber threats. Here arises a great requirement of information security since this digital data is sent through the public network. Many encryption algorithms were utilised to protect digital data from typical attacks. There exist several conventional encryption algorithms such as Data Encryption Standard (DES), Advanced Encryption Standard (AES), International DataEncryption Algorithm (IDEA), etc., which are used for encryption purposes. Still, they take longer execution time, provides poor security and are more vulnerable to several cyber-attacks. The proposed work provides a cryptosystem based on 4D Lorenz type hyper-chaos and Deoxyribonucleic acid (DNA) encoding mechanism to overcome earlier method limitations. The approximated and detailed coefficients of the input image is obtained by applying Integer Wavelet Transform (IWT). Then, the pixels of the Low-Low (LL) band get permuted using a Logistic map. The 4D hyper-chaotic system creates a pseudo-random chaotic sequence using the initial values, quantised to a keystream. The final data gets encoded using the DNA encoding rule. For enhanced diffusion, DNA-XOR is performed to produce the final cipher image. Various performance metrics have been analysed for several images, and the experimental results show that the proposed scheme is effective against brute force attacks.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据