Author:
Samar Jashwant,Sharma Shailja,Khare Ankur
Abstract
The rising abundance of vibrant networks, like Mobile Ad-hoc Networks (MANETs), Wireless Sensor Networks (WSNs), and Flying Ad-hoc Networks (FANETs) requires sophisticated cryptographic solutions to protect multimedia information delivery. This paper offers a thorough review of computationally competent and random key-based image cryptography adapted for vibrant network circumstances. We search the background of image cryptography alongside an emphasis on algorithms and strategies that highlight computational competence and the utilization of random keys for improved protection. Key ranges enclosed comprise conventional symmetric and asymmetric encryption schemes, trivial cryptography, and logistic system related key production schemes. The paper explores the capabilities and restraints of these schemes based on encryption time, key administration and protection strength. An exhaustive examination of several random key production schemes is offered, exhibiting how these schemes cause to enhance randomness and vigour in cryptography. We deliberate the incorporation of these schemes in vibrant networks where systems frequently tackle restrictions such as rare processing energy, storage and power. The paper also discusses the issues impersonated through such circumstances, containing the requirement for real-time information processing, flexibility and compliance to modify network situations. The paper calculates the strength of latest techniques utilizing performance vectors like encryption speed, key sensibility and resilience to cryptanalysis attacks.
Publisher
International Journal of Innovative Science and Research Technology
Reference38 articles.
1. D. E. Mfungo, X. Fu, Y. Xian and X. Wang, “A Novel Image Encryption Scheme using Chaotic Maps and Fuzzy Numbers for Secure Transmission of Information”, Applied Sciences, MDPI, Vol. 13(7113), pp. 1-25, 2023.
2. F. Elamrawy, M. Sharkas, and A. M. Nasser, “An image encryption based on DNA coding and 2DLogistic chaotic map”, International Journal of Signal Processing, Vol. 3, pp-27-32, 2018.
3. W. Yao, K. Gao, Z. Zhang, L. Cui and J. Zhang, “An Image Encryption Algorithm based on a 3D Chaotic Hopfield Neural Network and Random Row-Column Permutation”, Frontiers in Physics, Vol. 11, pp. 1-14, 2023.
4. G. Ye, K. Jiao, C. Pan, and X. Huang, “An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map”, Hindawi Security and Communication Networks, pp-1-11, 2018. (https://doi.org/10.1155/2018/8402578)
5. Y. Shen, J. Huang, L. Chen, T. Wen, T. Li and G. Zhang, “Fast and Secure Image Encryption Algorithm with Simultaneous Shuffling and Diffusion based on a Time Delayed Combinatorial Hyperchaos Map”, Entropy, MDPI, Vol. 25(753), pp. 1-22, 2023.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献