Symmetric keys image encryption and decryption using 3D chaotic maps with DNA encoding technique
- PDF / 1,362,082 Bytes
- 19 Pages / 439.37 x 666.142 pts Page_size
- 97 Downloads / 203 Views
Symmetric keys image encryption and decryption using 3D chaotic maps with DNA encoding technique Sakshi Patel 1 & Bharath K P 1 & Rajesh Kumar M 1 Received: 26 July 2019 / Revised: 30 July 2020 / Accepted: 6 August 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract
In present digital era, multimedia like images, text, documents and videos plays a vital role, therefore due to increase in usage of digital data; there comes high demand of security. Encryption is a technique used to secure and protect the images from unfair means. In cryptography, chaotic maps play an important role in forming strong and effective encryption algorithm. In this paper 3D chaotic logistic map with DNA encoding is used for confusion and diffusion of image pixels. Additionally, three symmetric keys are used to initialize 3D chaos logistic map, which makes the encryption algorithm strong. The symmetric keys used are 32 bit ASCII key, Chebyshev chaotic key and prime key. The algorithm first applies 3D non-linear logistic chaotic map with three symmetric keys in order to generate initial conditions. These conditions are then used in image row and column permutation to create randomness in pixels. The third chaotic sequence generated by 3D map is used to generate key image. Diffusion of these random pixels are done using DNA encoding; further XOR logical operation is applied between DNA encoded input image and key image. Analysis parameters like NPCR, UACI, entropy, histogram, chi-square test and correlation are calculated for proposed algorithm and also compared with different existing encryption methods. Keywords Encryption . Decryption . 3D chaotic maps . DNA encoding . Symmetric keys . Logical operations
* Rajesh Kumar M [email protected] Sakshi Patel [email protected] Bharath K P [email protected] 1
School of Electronics Engineering, VIT University, Vellore, India
Multimedia Tools and Applications
1 Introduction Due to advancement in technology it has become easy to share information like images, data, documents, voice, videos in seconds. As this information is shared over a single band of frequency therefore it can be a questionable issue for security of personal information from the end user. Techniques used in order to secure the information plays an important role in maintaining integrity, privacy and authentication of the data to protect from unauthorized users. In this present era of technology and digitization, security is a vital aspect; therefore, encryption is one of the ways to secure the data from being hacked. Immense spreading of communication gives rise to digitized data leading to information abuse. One of the most important multimedia information carriers is images, containing critical and sensitive data. Securing these images from unauthorized users becomes the most important task in this digital world. Images play a vital role in many fields such as sharing information, authorization, Google maps, satellite, medical, military, etc. [21]. Cryptography is a method that
Data Loading...