Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
1 result(s) for "Mahatab, Kailash Chandra"
Sort by:
An efficient block-level image encryption scheme based on multi-chaotic maps with DNA encoding
This paper presents an efficient image encryption scheme based on permutation followed by diffusion, where both of these phases use 2-d Sine logistic modulation map (SLMM) with different initial values. In addition, diffusion uses another map as 1-d Logistic chaotic map (LCM). The initial values of these chaotic maps are obtained from an external key of 64 bytes along with 32-byte hash value from the corresponding plain-image to incorporate plain-text sensitivity. Initially, confusion of the plain-image is implemented by applying row-level and column-level permutations. Then, this permuted image is used for subsequent diffusion, applied on block-level considering block size of 64 bytes. This diffusion process is accomplished by overlaying with chaotic matrix derived from LCM, followed by substitution of those overlaid bytes by DNA encoding along with SLMM to attain an encrypted image with an entropy nearly 8. Furthermore, all the chaotic values generated from the aforementioned maps are highly sensitive on the key as well as on the plain-image. This scheme is thoroughly verified on different sized plain-images with modern statistical analyses to prove the robustness of this scheme. Eventually, comparison with other schemes reinforces its competence and suitability to implement it in real-time system.