Secure Encrypted Data Transmission Via Multiple Chaotic Maps

Encryption is carried out for private sharing of confidential data. It is used to avoid data breach. The process involves randomising the image pixels using three chaotic sequences namely masking, swapping and permutation sequence. XOR is done between the image pixels and the masking sequence. The masked sequence is then shuffled using the permutation sequence. This is then diffused using the swapping sequence. This encrypted data is more randomised using four different permutation sequence namely discrete chaos, continuous chaos, dynamic random growth and coupled map lattice. The image is divided into four parts, and each part is encrypted using XOR based on the chess-based horse move algorithm. The strength of the image encryption process is calculated using the different encryption metrics.