IMAGE ENCRYPTION USING CHAOTIC MAPS OF VARIOUS DIMENSIONS: REVIEW
نویسندگان
چکیده
منابع مشابه
Image Encryption Using Chaotic Maps of Various Dimensions: Review
Information Security is an important problem in communication. Information includes text, audio, video, image etc. When information is transferred through various networks, there is high chance of unauthorized access. In many fields such as medical science, military, geographic satellite images etc, high security of information is guaranteed using encryption. As a result, the data confidentiali...
متن کاملIntertwining Chaotic Maps Based Image Encryption
In any communication system, including the satellite and the Internet, it is almost impossible to prevent unauthorized people from eavesdropping. When information is broadcast from a satellite or transmitted through the Internet, there is a risk of information interception. Security of image and video data has become increasingly important for many applications, including video conferencing, se...
متن کاملImage encryption using DNA complementary rule and chaotic maps
This paper proposes a novel confusion and diffusion method for image encryption. One innovation is to confuse the pixels by transforming the nucleotide into its base pair for random times, the other is to generate the new keys according to the plain image and the common keys, which can make the initial conditions of the chaotic maps change automatically in every encryption process. For any size...
متن کاملA Highly Secure Image Encryption Scheme using Compound Chaotic Maps
During the last two decades various chaotic image encryption algorithms have been proposed, but most of them encountered some defects like small key space, low speed, lack of robustness and weak security. This paper proposes a chaos-based image encryption scheme with a permutation–diffusion mechanism, where six skew tent maps and one sixdimensional Arnold map are utilized to generate one hybrid...
متن کاملAn Improved Image Encryption Scheme Using Chaotic Logistic Maps
Chaos theory has significantly contributed towards the development of fast and secure image encryption algorithms. Authors in [1] proposed an efficient and secure approach for image encryption based on chaotic logistic maps. The algorithm uses an 80-bit secret key and two chaotic logistic maps, whose initial conditions are derived using the secret key. Depending upon the outcome of logistic map...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Research in Engineering and Technology
سال: 2016
ISSN: 2321-7308,2319-1163
DOI: 10.15623/ijret.2016.0504019