Downloads: 118 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers | Information Security | India | Volume 6 Issue 4, April 2017
A Review of Image Encryption Using Chaos based Techniques
Shourya Chand | Ritik Aggarwal | Ekansh Dubey
Abstract: In open communication network, it is utmost crucial to keep sensitive information protected from becoming vulnerable to unauthorized access. Encryption process provides high security to the digital data content. Chaos theory has been broadly serviceable for encrypting image due to its multiple features. The discrete chaotic cryptographic system approaches are established on block and stream encryption schemes. If these two are combined the security level is significantly advanced. Chaos is used for expanding confusion and diffusion in images. Chaotic map gives benefits of large key space and high level security. In this paper, the survey of various chaos-based image encrypting techniques is done based on existing works. The paper also lays emphasis on the methodology of different techniques in detail.
Keywords: chaos theory, image encryption, decryption, cipher, cryptography
Edition: Volume 6 Issue 4, April 2017,
Pages: 1871 - 1875
Similar Articles with Keyword 'decryption'
Downloads: 3
Research Paper, Information Security, India, Volume 11 Issue 1, January 2022
Pages: 807 - 812Deriving Ransomware Formulation Complexity and Compromisation Topology
Ujas Dhami [4] | Nisarg Shah [5]
Downloads: 221 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Security, India, Volume 6 Issue 6, June 2017
Pages: 2628 - 2630Improvement of Diffie-Hellman Key Exchange Algorithm
Gurshid