Lakshya Gupta, Prateek Jaiswal, Ishita Lather, R. Agarwal, Anita Thakur
{"title":"Image Encryption using Chaotic maps: State of the art","authors":"Lakshya Gupta, Prateek Jaiswal, Ishita Lather, R. Agarwal, Anita Thakur","doi":"10.1109/CONIT59222.2023.10205829","DOIUrl":null,"url":null,"abstract":"Due to the swift growth of the internet and the increasing flow of data across public networks, data security is becoming more and more crucial. One potential resolution to this issue is encrypting the information which might take the form of text, images, audio, video, etc. Today, photographs are used in the majority of multimedia applications. AES, DES, RSA, and other early picture encryption algorithms have low levels of security and poor anti-attack capabilities. By adopting chaos-based cryptography, this issue was solved. The chaotic systems have the potential to be used in image encryption because they are sensitive to the starting conditions and control variables. Many research endeavors have been focused on investigating image encryption. An overview of the components and methods of the image encryption design is attempted in this work. We used statistical analyses, such as entropy and pixel correlation, as well as differential analyses, such as unified averaged altered intensity (UACI) and number of changing pixel rate (NPCR), in order to assess the security against various cryptographic assaults. Analyses of key sensitivity and key space are also carried out to thwart brute force assaults. The randomness of the proposed encryption system was further examined through entropy and NIST randomness suit tests.","PeriodicalId":377623,"journal":{"name":"2023 3rd International Conference on Intelligent Technologies (CONIT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Intelligent Technologies (CONIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONIT59222.2023.10205829","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Due to the swift growth of the internet and the increasing flow of data across public networks, data security is becoming more and more crucial. One potential resolution to this issue is encrypting the information which might take the form of text, images, audio, video, etc. Today, photographs are used in the majority of multimedia applications. AES, DES, RSA, and other early picture encryption algorithms have low levels of security and poor anti-attack capabilities. By adopting chaos-based cryptography, this issue was solved. The chaotic systems have the potential to be used in image encryption because they are sensitive to the starting conditions and control variables. Many research endeavors have been focused on investigating image encryption. An overview of the components and methods of the image encryption design is attempted in this work. We used statistical analyses, such as entropy and pixel correlation, as well as differential analyses, such as unified averaged altered intensity (UACI) and number of changing pixel rate (NPCR), in order to assess the security against various cryptographic assaults. Analyses of key sensitivity and key space are also carried out to thwart brute force assaults. The randomness of the proposed encryption system was further examined through entropy and NIST randomness suit tests.