Efficient image encryption scheme based on generalized logistic map for real time image processing

  • PDF / 2,429,428 Bytes
  • 13 Pages / 595.276 x 790.866 pts Page_size
  • 16 Downloads / 275 Views

DOWNLOAD

REPORT


SPECIAL ISSUE PAPER

Efficient image encryption scheme based on generalized logistic map for real time image processing Asif A. Shah1 · Shabir A. Parah1 · Mamoon Rashid2 · Mohamed Elhoseny3 Received: 3 April 2020 / Accepted: 31 July 2020 © Springer-Verlag GmbH Germany, part of Springer Nature 2020

Abstract In this era of the information age with digitalization, the transmission of sensitive real-time image information over insecure channels is highly-likely to be accessed or even attacked by an adversary. To prevent such unauthorized access, cryptography is being used to convert sensitive information in real-time images into unintelligible data. Most of the time, schemes are proposed with a high level of security. However, the challenge always remains the slower speeds due to their high complexity which makes them unusable in the applications of real-time images. In this paper, an efficient image encryption algorithm has been developed and tested for real-time images. The proposed scheme makes use of encryption with an efficient permutation technique based on a modular logistic map to bring down the size of√ the chaotic value vector, required to permute real-time image. We show that an efficient permutation is obtained using only N chaotic numbers for a square image with 3N pixels (N Pixels in each color bit plane). The algorithm makes use of a 192-bit key; divided into smaller blocks and each block selected chaotically to diffuse the pixel using multiple XOR operations. The experimental analysis reveals that the proposed algorithm is immune to various statistical and differential attacks such as entropy, histogram analysis, spectral characteristic analysis, etc. A comparison of the proposed scheme with some state-of-the-art techniques show that it performs better, and as such, can be utilized for efficient real-time image encryption. Keywords  Chaos · Encryption · Logistic map · Computational complexity · Real time · Image processing

1 Introduction With the tremendous increase in the use of real-time images, a huge amount of data is being shared over e-networked infrastructure. The data shared over insecure communication channels are always prone to attacks from intruders. Such data, at times, represent information which is confidential and sensitive, thus it is imperative to be prevented from unauthorized access. The sensitive data is usually mapped to some unintelligible form to keep the adversary at bay. This goal is achieved generally by using cryptography, which makes use of many sophisticated mathematical * Shabir A. Parah [email protected] 1



Department of Electronics and Instrumentation Technology, University of Kashmir, Hazratbal, Srinagar, India

2



School of Computer Science and Engineering, Lovely Professional University, Jalandhar, India

3

Faculty of Computers and Information, Mansoura University, Mansoura, Egypt



techniques for encrypting the data before transmission [1–3]. Encryption of data provides a security layer over the plain data, such that the data being transmitted appears e