Affiliation:
1. Aisect University, India
2. University Instituter of Technology RGPV, India
3. Madhav Institute of Technology, India
4. M. K. Ponda College of Business and Management, India
Abstract
In last few decades, a lot of work has been done in the field of cryptography; it is being considered one of the safe methods to protect data. It was first used to protect communication by individuals, armies, and organizational companies. With the help encryption method, anyone can protect their data from a third-party attack. Images are used in various areas like biometric authentication, medical science, military, etc., where they are being stored or transferred over the network and the safety of such images are very important. The newest movement in encryption is chaos-based, which is a better encryption technique than AES, DES, RSA, etc. It consists of different property such as sensitive independence on original situation, non-periodicity, non-convergence, etc. In recent times, many chaos-based image encryption algorithms have been proposed, but most of them are not sufficient to provide full protection to data. In this chapter, a survey of different chaos-based image encryption techniques is discussed.
Reference71 articles.
1. “Image encryption based on DNA sequence coding and Logistic map”, Advances in Natural and Applied Sciences;A.Abirami;American-Eurasian Network for Scientific Information,2015
2. An Enhanced Image Encryption Algorithm Using Fractional Chaotic Systems
3. Akhvan, A., Samsudin, A., & Akhshani, A. (2013). A novel parallel hash function based on 3D chaotic map. EURASIP Journal on Advances in Signal Processing, 1-12.
4. Alvarez, G., & Li, S. (2006). Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems. International Journal of Bifurcation and Chaos, 16(8), 2129-2151.
5. Alvarez, G., Montoya, F., Romera, M., & Pastor, G. (2000). Cryptanalysis of A Chaotic Encryption System. Physics Letters, 276, 191-196.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献