Survey of 3D Chaotic Map Techniques for Image Encryption
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 123 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015

Survey of 3D Chaotic Map Techniques for Image Encryption

Lokesh P. Gagnani, Dr. Sunita Varjani

Encryption of images is different from that of texts due to some intrinsic features of images such as bulk data capacity and high redundancy, which are generally difficult to handle by traditional encryption methods. Due to the exceptionally desirable properties of mixing and sensitivity to initial conditions and parameters of chaotic maps, chaos-based encryption has suggested a new and efficient way to deal with the intractable problem of fast and highly secure image encryption. In this paper, the two-dimensional chaotic cat map is generalized to 3D for designing a real-time secure symmetric encryption. Various parameters for key sensitivity analysis, Statistical analysis and Differential analysis are discussed.

Keywords: Chaotic system, Cryptography, Arnold Cat Map, Key Senstiivty analysis, Statistical analysis, Differential analysis

Edition: Volume 4 Issue 12, December 2015

Pages: 1000 - 1004

Share this Article

How to Cite this Article?

Lokesh P. Gagnani, Dr. Sunita Varjani, "Survey of 3D Chaotic Map Techniques for Image Encryption", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV152193, Volume 4 Issue 12, December 2015, 1000 - 1004

Enter Your Registered Email Address





Similar Articles with Keyword 'Chaotic system'

Downloads: 119 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2114 - 2117

Image Cryptography Technique based on FFT

Mudiyala. Akila Sowndarya, Damodara V V S Phani Kumar

Share this Article

Downloads: 121 | Weekly Hits: ⮙4 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, Iraq, Volume 3 Issue 6, June 2014

Pages: 2004 - 2009

Image Encryption Based on Pixel Shuffling with 3D Chaotic System

Asia Mahdi Naser Alzubaidi

Share this Article

Downloads: 123 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1000 - 1004

Survey of 3D Chaotic Map Techniques for Image Encryption

Lokesh P. Gagnani, Dr. Sunita Varjani

Share this Article

Downloads: 123 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, Iraq, Volume 8 Issue 8, August 2019

Pages: 650 - 652

New Technique for Internet of Things Security based on the Hybrid Mcrypton - Blowfish and Chaotic System

Haider K. Hoomod, Ahmed A. Ali

Share this Article

Downloads: 151 | Weekly Hits: ⮙3 | Monthly Hits: ⮙18

Research Paper, Computer Science & Engineering, Iraq, Volume 7 Issue 2, February 2018

Pages: 903 - 917

Proposed Email System Security based Bio-Chaos Modified Hash and Modified AES

Dr. Haider K. Hoomod, Arkan Mohammed Radi

Share this Article

Similar Articles with Keyword 'Cryptography'

Downloads: 8 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 91 | Weekly Hits: ⮙4 | Monthly Hits: ⮙16

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Downloads: 93 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Downloads: 99 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Downloads: 101 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Similar Articles with Keyword 'Arnold Cat Map'

Downloads: 108 | Weekly Hits: ⮙2 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 5, May 2017

Pages: 2588 - 2590

Permuting Convergence Overcomingof Genetic Algorithm Using Arnold Cat Map

Ruwaida Mohammed Yas

Share this Article

Downloads: 121 | Weekly Hits: ⮙4 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, Iraq, Volume 3 Issue 6, June 2014

Pages: 2004 - 2009

Image Encryption Based on Pixel Shuffling with 3D Chaotic System

Asia Mahdi Naser Alzubaidi

Share this Article

Downloads: 123 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1000 - 1004

Survey of 3D Chaotic Map Techniques for Image Encryption

Lokesh P. Gagnani, Dr. Sunita Varjani

Share this Article

Downloads: 128 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, Iraq, Volume 3 Issue 7, July 2014

Pages: 336 - 343

Color Image Encryption and Decryption Based Pixel Shuffling with 3D Blowfish Algorithm

Asia Mahdi Naser Alzubaidi, Noor Dhia Kadhm Al-Shakarchy

Share this Article

Downloads: 152 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 11, November 2015

Pages: 607 - 612

Classical Image Encryption and Decryption

Noor Dhia Kadhm Al-Shakarchy, Hiba Jabbar Al- Eqabie, Huda Fawzi Al- Shahad

Share this Article

Similar Articles with Keyword 'Statistical analysis'

Downloads: 82 | Monthly Hits: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 165 - 167

Statistical Analysis of DCT Coefficients for Ascertaining Ears Biometrics

Nisha, Jatinder Kansal, JPS Raina

Share this Article

Downloads: 108 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1183 - 1187

Memory Management in BigData

Yanish Pradhananga, Shridevi C. Karande

Share this Article

Downloads: 108 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1983 - 1986

An Improved Hierarchical Technique for Document Clustering

Priti B. Kudal, Prof. Manisha Naoghare

Share this Article

Downloads: 109 | Weekly Hits: ⮙2 | Monthly Hits: ⮙13

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1990 - 1992

Techniques of OLAP and Association Rule Mining

Gunwanti R. Bawane, Prarthana Deshkar

Share this Article

Downloads: 113 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1285 - 1287

Noise Analysis and Reconstruction of PET Image

Manolekshmi. I

Share this Article



Top