A cryptographic model for better information security

31Citations
Citations of this article
29Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this study, a novel cryptographic model that uses coupled map lattice is proposed for securing image. It incorporates mixing based on randomly generated secret key, sub-keys based substitution, confusion algorithm and coupled map lattice based diffusion process to enrich the security, sensitivity and robustness of the model. The control parameters of coupled map lattice and initial condition of chaotic systems are deduced using externally generated random secret key of 280-bit length. To make the encryption process more dependent on confusion and more sensitive to the encryption key, pixels of a channel are XOR-ed with pixels of other channel with an intelligent mix of sub-keys. Finally, the diffusion model based on coupled map lattice, binds the pixels in a way such that a single-bit change is reflected into a large number of pixels in the cipher image. Resistance to various kinds of attacks like plain text, brute force and statistical attacks are the important features observed in the proposed cryptographic model. Several studies related to correlation coefficients, histogram, anti-noise attacks, plain text analysis, NPCR, key sensitivity, UACI and key space analysis were carried out and corresponding results are given in detail. The simulation results yield an average NPCR score to be about 99.63% and UACI value 33.46%. A number of analysis performed and mentioned here, suggests the proposed model a potential candidate for image encryption application.

References Powered by Scopus

Chaos-based cryptography: A brief overview

793Citations
N/AReaders
Get full text

2D Sine Logistic modulation map for image encryption

715Citations
N/AReaders
Get full text

Image encryption using 2D Logistic-adjusted-Sine map

701Citations
N/AReaders
Get full text

Cited by Powered by Scopus

When an attacker meets a cipher-image in 2018: A year in review

246Citations
N/AReaders
Get full text

A new digital signature algorithm for ensuring the data integrity in cloud using elliptic curves

37Citations
N/AReaders
Get full text

A survey on secure communication techniques for 5G wireless heterogeneous networks

35Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Kumar, S., Kumar, M., Budhiraja, R., Das, M. K., & Singh, S. (2018). A cryptographic model for better information security. Journal of Information Security and Applications, 43, 123–138. https://doi.org/10.1016/j.jisa.2018.10.011

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 16

89%

Lecturer / Post doc 1

6%

Researcher 1

6%

Readers' Discipline

Tooltip

Computer Science 11

58%

Engineering 6

32%

Chemistry 1

5%

Social Sciences 1

5%

Save time finding and organizing research with Mendeley

Sign up for free