A Fibonacci p-code traversing and unified chaotic map-based image encryption algorithm

R. Anandkumar,R. Kalpana
DOI: https://doi.org/10.1007/s12652-021-03659-y
IF: 3.662
2022-01-24
Journal of Ambient Intelligence and Humanized Computing
Abstract:The chaotic maps and cryptographic schemes are considered as the standard backbone for digital image encryption process. The pixel rearrangement under digital image encryption process in diversified dimensions is determined to be highly deceiving for pernicious parties. Moreover, the sensitivity of the chaos-based cryptosystem towards the characteristics of unpredictability, initial conditions and ergodic features is considered to be predominant during the process of image encryption. This paper contributes a Fibonacci p-code Traversingand Unified Chaotic Map-based Image Encryption (FPT-UCM-IE) scheme for facilitating three processes that include key stream generation, three-iterations-based scrambling and single round diffusion process. This proposed FPT-UCM-IE scheme initiates the process of key generation using the unified chaotic map. Then, the process of Fibonacci p-code Traversing is employed for facilitating effective act of scrambling, such that the pixel rows and columns are exchanged in a predominant manner. The final single round diffusion process of this proposed FPT-UCM-IE scheme is incorporated for cracking the strong correlations and modifying the pixel value that exist between the neighboring pixel in a simultaneous way. The security investigations of this proposed FPT-UCM-IE scheme aredetermined to be superior enough is resisting common type of attacks that are possible during the process of image encryption.
computer science, information systems,telecommunications, artificial intelligence
What problem does this paper attempt to address?