scispace - formally typeset
Proceedings ArticleDOI

Image Encryption Using Chaotic Maps: A Survey

Reads0
Chats0
TLDR
An attempt has been made to review the aspects and approaches of the design used for image encryption.
Abstract
As the exchange of data over the open networks and Internet is rapidly growing, security of the data becomes a major concern. One possible solution to this problem is to encrypt the data. The data can be text, image, audio, video etc.. In today's world most of the multimedia applications involve images. Earlier image encryption techniques like AES,DES,RSA etc. exhibit low levels of security and also weak anti attack ability. This problem was overcome by using chaos based cryptography. The chaotic systems are very sensitive to initial conditions and control parameters which make them suitable for image encryption. Many works have been done in the field of chaos based image encryption. In this survey paper an attempt has been made to review the aspects and approaches of the design used for image encryption.

read more

Citations
More filters
Journal ArticleDOI

Color image chaos encryption algorithm combining CRC and nine palace map

TL;DR: A color image chaos encryption algorithm combining Cyclic Redundancy Check (CRC) and nine palace map that has the advantages of large key space, high key sensitivity, anti-robust attack, and feasible encryption efficiency is proposed.
Journal ArticleDOI

Medical Image Encryption Based on Hybrid Chaotic DNA Diffusion

TL;DR: Experimental results of statistical, differential and key analyses demonstrate that the proposed scheme is robust and provides resistance to various forms of attacks.
Journal ArticleDOI

A novel grayscale image encryption approach based on chaotic maps and image blocks

TL;DR: A comparison in the coefficient correlation values is drawn to evaluate the performance of the proposed algorithm with respect to many lately proposed image encryption schemes.
Journal ArticleDOI

Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains

TL;DR: A survey on the most up-to-date chaos-based image encryption techniques and classifies them into spatial, temporal and spatio-temporal domains for better understanding is presented in this paper .
Journal ArticleDOI

Hyperchaotic system-based pseudorandom number generator

Yang Liu, +1 more
TL;DR: A new hyperchaotic system with bigger Lyapunov exponent is constructed and the self-shrinking generator, which is superior to many other linear feedback shift register-based generators, is used to perturb the hyperchaotics to decrease the period degeneration and improve the performance of the sequences.
References
More filters
Journal ArticleDOI

A chaos-based digital image encryption scheme with an improved diffusion strategy.

TL;DR: A novel bidirectional diffusion strategy is proposed to promote the efficiency of the most widely investigated permutation-diffusion type image cipher and has a satisfactory security level with a low computational complexity, which renders it a good candidate for real-time secure image transmission applications.

A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping

TL;DR: The experimental results show that the proposed algorithm can successfully encrypt/decrypt the images with same secret keys, and the algorithm has good encryption effect, large key space and high sensitivity to a small change in secret keys.
Journal ArticleDOI

A New Chaotic Algorithm for Image Encryption and Decryption of Digital Color Images

TL;DR: A new image encryption scheme which employs one of the three dynamic chaotic systems (Lorenz or Chen or LU chaotic system selected based on 16-byte key) to shuffle the position of the image pixels and uses another one the same three chaotic maps to confuse the relationship between the cipher image and the plain-image thereby significantly increasing the resistance to attacks.
Journal Article

An image encryption approach using chaos and stream cipher

TL;DR: Experimental results illustrate that the scheme is highly key sensitive and shows a good resistance against brute-force and statistical attacks.
Journal ArticleDOI

A new chaos-based image-encryption and compression algorithm

TL;DR: The results of several experiments show that the proposed algorithm for image cryptosystems provides an efficient and secure approach to real-time image encryption and transmission.
Related Papers (5)