Journal of Cybersecurity and Information Management
  JCIM
  2690-6775
  2769-7851
  
   10.54216/JCIM
   https://www.americaspg.com/journals/show/1809
  
 
 
  
   2019
  
  
   2019
  
 
 
  
   An Improved Image Encryption Consuming Fusion Transmutation and Edge Operator
  
  
   Gyan Ganga Institute of Technology and Sciences, Jabalpur, India
   
    Vandana
    Roy
   
  
  
   The field of cryptography oversees the development of methods for transforming information between coherent and incoherent formats. Encryption and decryption techniques controlled by keys maintain the privacy of the substance and who can access it. Private key cryptography refers to methods of encryption and decryption that employ the same secret key. The alternative is public key cryptography, wherever the encryption and decryption keys are different. It is essential for the sanctuary of any crypto scheme that the confusion and diffusion properties be met. While the diffusion property rearranges the pixels in an image, the confusion property simply replaces the pixel values. In-depth discussion of a genetic-algorithm-based hybrid approach to secure and complex three-dimensional chaos-based image encryption (SCIE) has been presented. Here, we use mathematics edge, multipoint edges operator, and coupled transmutation operatives to accomplish permutation. In this method, a key stream is created using a 3D CSI (Compound Sine and ICMIC) map. Using a private key, hybrid operators are used to encrypt data. Several metrics were considered while evaluating the suggested algorithm's efficacy, including the UACI (Unified Average Change Intensity), correlation constant, NPCR (Net Pixel Change Rate). Experiments with the same have shown promising results in protecting real-time photos.
  
  
   2021
  
  
   2021
  
  
   42
   52
  
  
   10.54216/JCIM.080105
   https://www.americaspg.com/articleinfo/2/show/1809