Affiliation:
1. Department of Computer Science and Engineering, Jashore University of Science and Technology, Jashore 7408, Bangladesh
2. Department of Computer Science and Engineering, Mawlana Bhashani Science and Technology University, Tangail 1902, Bangladesh
3. Department of Computer Science and Engineering, Jahangirnagar University, Dhaka 1342, Bangladesh
Abstract
Data transmission over the Internet and the personal network has been risen day by day due to the advancement of multimedia technology. Hence, it is today’s prime concern to protect the data from unauthorized access and encrypt the multimedia element as they are stored on the web servers and transmitted over the networks. Therefore, multimedia data encryption is essential. But, the multimedia encryption algorithm is complex to implement as it requires more time and memory space. For this reason, the lightweight image encryption algorithm gains popularity that requires less memory and less time along with low power or energy and provides supreme security for limited devices. In this study, we have studied the chaotic-based lightweight image encryption method. At first, we have presented a standard framework and algorithm based on two chaotic maps such as Arnold and logistic for lightweight image encryption and performed some experiments. We have analyzed different groups of images such as miscellaneous, medical, underwater, and texture. Experimentations have provided the largest entropy 7.9920 for medical image (chest X-ray), large key space 2m×m×8, and average encryption and decryption times are 3.9771 s and 3.1447 s, respectively. Besides, we have found an equal distribution of pixels and less correlation coefficients among adjacent pixels of the encrypted image. These criteria indicate an efficient image encryption method. Also, our method is efficient and less complex than the existing state-of-the-art methods.
Reference54 articles.
1. A new modified version of advanced encryption standard based algorithm for image encryption;S. H. Kamali
2. A novel image encryption scheme using Lorenz attractor;G. M. B. S. S. Kumar
3. Image encryption using binary key-images;Y. Zhou
4. Approaches to multimedia and security;K. Nahrstedt
5. Overview on Selective Encryption of Image and Video: Challenges and Perspectives
Cited by
32 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献