An improved bit plane image encryption technique using RC4 and quantum chaotic demeanour
- PDF / 2,972,843 Bytes
- 27 Pages / 439.37 x 666.142 pts Page_size
- 15 Downloads / 190 Views
An improved bit plane image encryption technique using RC4 and quantum chaotic demeanour Anjali Malik 1 & Sangeeta Dhall 1 & Shailender Gupta 1 Received: 15 January 2020 / Revised: 29 August 2020 / Accepted: 24 September 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract
To compete with the rising apprehension of data/image security, corporations are endorsing cryptography for protection. A high-quality image encryption scheme must ensure high Entropy, high key sensitivity, ability to resist known and chosen-plaintext attack, large keyspace, high randomness, and resistance towards differential attack. To accomplish this need, an improved bit plane image encryption scheme using RC4 and Quantum Chaotic behavior is proposed. In the projected mechanism, to ensure less bandwidth usage and efficient transmission of data over the network, YCbCr format is used. The keys are generated using the s- logistic map due to its high randomness, non-periodic behavior, and large keyspace to resist brute-force attacks. This contemporary encryption process includes confusion and diffusion stages. For the confusion stage, the Channel transformation process is employed, which helps in attaining randomness. A multilevel diffusion stage is implemented using CBC (Cipher Block chaining block), Zigzag permutation, and Inter bit plane permutation process. Additionally, the technique’s randomness and complexity are strengthened by utilizing RC4 to generate S-box for byte substitution. The projected framework is implemented in MATLAB and assessed using various performance metrics like mean square error (MSE), Peak Signal to noise ratio (PSNR), Entropy, and others referenced in writing. Result analysis illustrates that the proposed model reveals its capacity to conceal the confidentiality of information of the transmitted image and is more efficient than its classical counterpart. Its security is verified by the statistical, key-space, and key analysis. Keywords Bit planes . Chosen plaintext attack . Cipher block chaining block . Encryption . Known plaintext attack . Quantum chaotic logistic map . RC4
* Sangeeta Dhall [email protected] Extended author information available on the last page of the article
Multimedia Tools and Applications
1 Introduction Surreptitious information stored or during transmission is powerless against a security rupture. To endow with supremacy, encryption of the information achieves an indispensable job in protecting its legitimacy regardless of its accessibility to a programmer. Confidentiality is the core ingredient that accounts for the plausibility of security services for a message. Mainly providing privacy between the sender and the user is advocated by the phenomena of confidentiality. The authorization over data is held confidential only to the permitted users, attaining garbage values for an unauthorized user. As described, images perform a very crucial role in the communication of information on insecure channels. So, this paper works upon the principle of prese
Data Loading...