International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 118 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers | Information Security | India | Volume 6 Issue 4, April 2017


A Review of Image Encryption Using Chaos based Techniques

Shourya Chand | Ritik Aggarwal | Ekansh Dubey


Abstract: In open communication network, it is utmost crucial to keep sensitive information protected from becoming vulnerable to unauthorized access. Encryption process provides high security to the digital data content. Chaos theory has been broadly serviceable for encrypting image due to its multiple features. The discrete chaotic cryptographic system approaches are established on block and stream encryption schemes. If these two are combined the security level is significantly advanced. Chaos is used for expanding confusion and diffusion in images. Chaotic map gives benefits of large key space and high level security. In this paper, the survey of various chaos-based image encrypting techniques is done based on existing works. The paper also lays emphasis on the methodology of different techniques in detail.


Keywords: chaos theory, image encryption, decryption, cipher, cryptography


Edition: Volume 6 Issue 4, April 2017,


Pages: 1871 - 1875


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Shourya Chand, Ritik Aggarwal, Ekansh Dubey, "A Review of Image Encryption Using Chaos based Techniques", International Journal of Science and Research (IJSR), Volume 6 Issue 4, April 2017, pp. 1871-1875, https://www.ijsr.net/get_abstract.php?paper_id=ART20172322

Similar Articles with Keyword 'decryption'

Downloads: 3

Research Paper, Information Security, India, Volume 11 Issue 1, January 2022

Pages: 807 - 812

Deriving Ransomware Formulation Complexity and Compromisation Topology

Ujas Dhami [4] | Nisarg Shah [5]

Share this Article

Downloads: 221 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Security, India, Volume 6 Issue 6, June 2017

Pages: 2628 - 2630

Improvement of Diffie-Hellman Key Exchange Algorithm

Gurshid

Share this Article
Top