{"title":"An implementation and performance evaluation of an improved chaotic image encryption approach","authors":"Gaytri, Shelza Suri, R. Vijay","doi":"10.1109/ICACCI.2016.7732253","DOIUrl":null,"url":null,"abstract":"With the advent of digitization, digital data took over the market with tremendous rate and changed the world into a digital one where digital data is considered to be the atomic mode of communication. Digital data which could be in the form of written matter or image is transmitted over the network within countless arenas such as armed forces, secret agencies, medical sciences, entertainment and many more. Being digital data as a fundamental source to a multimedia platform, today's multimedia generation is recklessly growing which have blended together technology with skills to form various applications which could be used in the digital devices. But due to some unscrupulous elements of the society various malicious attempts are made to craft a phobia to the mankind. Thus security is a crucial need for today's trend of technology. Ensuring about the current necessities of the society this paper formulates algorithms which could be used to protect the digital images. This paper scrutinized chaotic encryption techniques and articulated algorithms using the approach. Meticulously results in terms of security exploration and implementation are provided.","PeriodicalId":371328,"journal":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACCI.2016.7732253","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
With the advent of digitization, digital data took over the market with tremendous rate and changed the world into a digital one where digital data is considered to be the atomic mode of communication. Digital data which could be in the form of written matter or image is transmitted over the network within countless arenas such as armed forces, secret agencies, medical sciences, entertainment and many more. Being digital data as a fundamental source to a multimedia platform, today's multimedia generation is recklessly growing which have blended together technology with skills to form various applications which could be used in the digital devices. But due to some unscrupulous elements of the society various malicious attempts are made to craft a phobia to the mankind. Thus security is a crucial need for today's trend of technology. Ensuring about the current necessities of the society this paper formulates algorithms which could be used to protect the digital images. This paper scrutinized chaotic encryption techniques and articulated algorithms using the approach. Meticulously results in terms of security exploration and implementation are provided.