You can view the full text of this article for free using the link below.

Title: Attack resistant chaos-based cryptosystem by modified baker map and logistic map

Authors: Debanjan Chatterjee; Barnali Gupta Banik; Abhinandan Banik

Addresses: Department of Computer Science and Engineering, Indian Institute of Technology, Kanpur, 208016, India ' Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, KL Deemed to be University, Hyderabad, Telangana 500075, India ' Department of Computer Science and Engineering, School of Technology, GITAM University, Hyderabad, 502329, India

Abstract: In this paper, a new substitution-diffusion type chaos-based cryptosystem is proposed, which can encrypt greyscale images having arbitrary resolution. In substitution, image pixels are permuted using a modified form of the discretised 2-D Baker map, followed by a two-step diffusion approach, which employs a chaotic logistic map. The proposed cryptosystem is resistant to brute force attacks (measured by key-space and key-sensitivity analysis), statistical attacks (tested by histogram and chi-square test) and differential attacks (measured against NPCR, UACI, and hamming distance); the proposed method has also been tested for encryption quality, correlation analysis, entropy analysis, and performance analysis by measuring encryption speed as well as time complexity. Therefore, it is sufficiently secured to be used in real-world applications. To prove the unparalleled outcome of the proposed system, four sets of comparisons have been presented with respect to NPCR and UACI, Encryption throughput, and, lastly, with similar and non-similar existing cryptosystems.

Keywords: data security; encryption; image communication; chaos; sensitivity analysis; statistical analysis.

DOI: 10.1504/IJICS.2023.128002

International Journal of Information and Computer Security, 2023 Vol.20 No.1/2, pp.48 - 83

Received: 06 Apr 2020
Accepted: 13 Nov 2020

Published online: 04 Jan 2023 *

Full-text access for editors Full-text access for subscribers Free access Comment on this article