K. Manasa, Rengarajan Amirtharajan, P. Praveenkumar
{"title":"Secure Encrypted Data Transmission Via Multiple Chaotic Maps","authors":"K. Manasa, Rengarajan Amirtharajan, P. Praveenkumar","doi":"10.1109/ICCCI.2019.8822110","DOIUrl":null,"url":null,"abstract":"Encryption is carried out for private sharing of confidential data. It is used to avoid data breach. The process involves randomising the image pixels using three chaotic sequences namely masking, swapping and permutation sequence. XOR is done between the image pixels and the masking sequence. The masked sequence is then shuffled using the permutation sequence. This is then diffused using the swapping sequence. This encrypted data is more randomised using four different permutation sequence namely discrete chaos, continuous chaos, dynamic random growth and coupled map lattice. The image is divided into four parts, and each part is encrypted using XOR based on the chess-based horse move algorithm. The strength of the image encryption process is calculated using the different encryption metrics.","PeriodicalId":302941,"journal":{"name":"2019 International Conference on Computer Communication and Informatics (ICCCI)","volume":"1990 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Computer Communication and Informatics (ICCCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCI.2019.8822110","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Encryption is carried out for private sharing of confidential data. It is used to avoid data breach. The process involves randomising the image pixels using three chaotic sequences namely masking, swapping and permutation sequence. XOR is done between the image pixels and the masking sequence. The masked sequence is then shuffled using the permutation sequence. This is then diffused using the swapping sequence. This encrypted data is more randomised using four different permutation sequence namely discrete chaos, continuous chaos, dynamic random growth and coupled map lattice. The image is divided into four parts, and each part is encrypted using XOR based on the chess-based horse move algorithm. The strength of the image encryption process is calculated using the different encryption metrics.