A superlative image encryption technique based on bit plane using key-based electronic code book
- PDF / 8,659,767 Bytes
- 31 Pages / 439.37 x 666.142 pts Page_size
- 64 Downloads / 211 Views
A superlative image encryption technique based on bit plane using key-based electronic code book Manju Kumari 1 & Shailender Gupta 1 & Anjali Malik 1 Received: 26 January 2020 / Revised: 30 July 2020 / Accepted: 13 August 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract
To contend with the growing concern of information security, firms are espousing cryptography for protection. To comprehend this need, the paper proposes a block cipher that ensures confidentiality and secrecy for secure data communication network. A highquality cryptographic process ensures high entropy, high key sensitivity, ability to resist known plaintext and chosen-plaintext attack, high speed of execution, high key space, high randomness and resistance towards differential attack. In projected work, encryption mechanism is comprises of multiple processes and each process is devised key dependent utilizing diverse keys to ensure high key sensitivity and vast resistance power towards differential attack. The keys are generated using contemporary encryption process- the quantum chaotic map due to its high randomness and non periodicity, which includes confusion and diffusion processes. For the confusion process, Electronic Code Book (ECB), Initial Permutation (IP), Bit plane scrambling, and Inter bit plane scrambling are employed. The ECB and IP, being matching processes are chosen for high speed of execution. Bit level permutation unlike byte level is applied to reinforce randomness, in conjunction with variable number of rounds as per the security key. For diffusion process, the folding technique is used along eight directions, exploiting different keys. To reveal the efficacy of the proposed methodology, it is compared with the existing renowned methods on the basis of Cryptanalysis, Perceptibility analysis, Statistical analysis, etc. It is asserted that results such as differential attack, cryptanalysis, and key space analysis are reasonably enhanced than others while entropy and speed of execution are at equivalence with other techniques. Keywords Bit plane scrambling . Block cipher . Confusion . Cryptanalysis . Cryptography . Diffusion . Electronic code book . Encryption . Initial permutation block . Quantum chaotic map
* Anjali Malik [email protected] Extended author information available on the last page of the article
Multimedia Tools and Applications
1 Introduction The world is interconnected by the distinct spectra of technology. Advancement in technology budge into the future of automation which raises reliance on cyber connectivity, resulting in exposure of secret messages, images to the attackers that are always trying to uncover and exploit vulnerabilities. Henceforth necessitates protection of usability for smooth transfusion of data from one port to another [15]. Securing a network is the process of targeting a variety of threats and stopping them from rampaging through the system, as just a few minutes of exposure can cause widespread disruption and massive damage to public and pr
Data Loading...