Reference Hub1
Secure Chaotic Image Encryption Based on Multi-Point Row-Column-Crossover Operation

Secure Chaotic Image Encryption Based on Multi-Point Row-Column-Crossover Operation

K. Abhimanyu Kumar Patro, Mukesh Drolia, Akash Deep Yadav, Bibhudendra Acharya
ISBN13: 9781799866596|ISBN10: 1799866599|EISBN13: 9781799866619
DOI: 10.4018/978-1-7998-6659-6.ch017
Cite Chapter Cite Chapter

MLA

Patro, K. Abhimanyu Kumar, et al. "Secure Chaotic Image Encryption Based on Multi-Point Row-Column-Crossover Operation." Handbook of Research on Automated Feature Engineering and Advanced Applications in Data Science, edited by Mrutyunjaya Panda and Harekrishna Misra, IGI Global, 2021, pp. 286-328. https://doi.org/10.4018/978-1-7998-6659-6.ch017

APA

Patro, K. A., Drolia, M., Yadav, A. D., & Acharya, B. (2021). Secure Chaotic Image Encryption Based on Multi-Point Row-Column-Crossover Operation. In M. Panda & H. Misra (Eds.), Handbook of Research on Automated Feature Engineering and Advanced Applications in Data Science (pp. 286-328). IGI Global. https://doi.org/10.4018/978-1-7998-6659-6.ch017

Chicago

Patro, K. Abhimanyu Kumar, et al. "Secure Chaotic Image Encryption Based on Multi-Point Row-Column-Crossover Operation." In Handbook of Research on Automated Feature Engineering and Advanced Applications in Data Science, edited by Mrutyunjaya Panda and Harekrishna Misra, 286-328. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-6659-6.ch017

Export Reference

Mendeley
Favorite

Abstract

In this present era, where everything is getting digitalized, information or data in any form, important to an organization or individual, are at a greater risk of being attacked under acts, commonly known as cyber-attack. Hence, a proper and more efficient cryptosystem is the prime need of the hour to secure the data (especially the image data). This chapter proposes an efficient multi-point crossover operation-based chaotic image encryption system to secure images. The multi-point crossover operation is performed on both the rows and columns of bit-planes in the images. The improved one-dimensional chaotic maps are then used to perform pixel-permutation and diffusion operations. The main advantage of this technique is the use of multi-point crossover operation in bit-levels. The multi-point crossover operation not only increases the security of cipher images but also increases the key space of the algorithm. The outcomes and analyses of various parameters show the best performance of the algorithm in image encryption and different common attacks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.