Innovative Cybersecurity for Enhanced Data Protection: An Extended Bit-Plane Extraction and Chaotic Permutation-Diffusion Approach in Information Security

In the era of big data, protecting digital images from cyberattacks during network transmission is of utmost importance. While various image encryption algorithms have been developed, some remain vulnerable to specific cyber threats. This paper presents an enhanced version of the image encryption al...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 12; pp. 17926 - 17944
Main Authors Rehman, Mujeeb Ur, Shafique, Arslan, Khan, Kashif Hesham, Altamimi, Saad Nasser, Qasem, Sultan Noman, Al-Sarem, Mohammed
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In the era of big data, protecting digital images from cyberattacks during network transmission is of utmost importance. While various image encryption algorithms have been developed, some remain vulnerable to specific cyber threats. This paper presents an enhanced version of the image encryption algorithm based on bit-plane extraction (BPCPD) to address its vulnerability to chosen-plaintext attacks. The proposed cryptographic system encompasses three primary phases. The initial phase involves bit-plane extraction from the plaintext image and the generation of random sequences and a random image using multiple chaotic maps, such as the chaotic Arnold map and the chaotic CAT map. The second phase is dedicated to permutation operations, which comprise three sub-phases: multi-layer permutation, multi-round permutation, and recursive permutation. In the third phase, diffusion is introduced to the permuted image through pixel substitution, coupled with XOR operations performed on the respective bit-planes of the random image. To gauge the efficiency of the proposed encryption scheme, a range of experimental analyses are conducted, including histogram analysis, contrast assessment, entropy measurement, correlation analysis, encryption quality assessment, and investigations into noise attacks and occlusion attacks. The results of these experimental analyses, in comparison to an existing encryption scheme, demonstrate that the proposed framework exceeds both BPCPD and other existing encryption schemes in various aspects of performance.
ISSN:2169-3536
2169-3536
DOI:10.1109/ACCESS.2023.3343118