{"title":"An efficient image system-based grey wolf optimiser method for multimedia image security using reduced entropy-based 3D chaotic map","authors":"Srinivas Koppu, V. M. Viswanatham","doi":"10.1504/ijcaet.2020.10029297","DOIUrl":null,"url":null,"abstract":"Chaotic maps play an important role in information sharing. In this paper a grey wolf optimiser used with reduced entropy-based 3D chaotic map. The selection and high coefficients are selected based on the reduced entropy value to identify the optimised parameters to get unpredictable random values. Time complexity, autocorrelation of V, H and D elements, histogram of original and cipher images, peak signal to noise ratio and NPCR and UACI values are computed from the cipher image. The empirical results show the proposed method provides good, better imperceptibility and defends various attacks. To prove this accomplishment of the method, several experiments were conducted and compared the results with existing systems.","PeriodicalId":346646,"journal":{"name":"Int. J. Comput. Aided Eng. Technol.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Comput. Aided Eng. Technol.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijcaet.2020.10029297","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Chaotic maps play an important role in information sharing. In this paper a grey wolf optimiser used with reduced entropy-based 3D chaotic map. The selection and high coefficients are selected based on the reduced entropy value to identify the optimised parameters to get unpredictable random values. Time complexity, autocorrelation of V, H and D elements, histogram of original and cipher images, peak signal to noise ratio and NPCR and UACI values are computed from the cipher image. The empirical results show the proposed method provides good, better imperceptibility and defends various attacks. To prove this accomplishment of the method, several experiments were conducted and compared the results with existing systems.