Image Encryption using Chaotic maps: State of the art

Lakshya Gupta, Prateek Jaiswal, Ishita Lather, R. Agarwal, Anita Thakur
{"title":"Image Encryption using Chaotic maps: State of the art","authors":"Lakshya Gupta, Prateek Jaiswal, Ishita Lather, R. Agarwal, Anita Thakur","doi":"10.1109/CONIT59222.2023.10205829","DOIUrl":null,"url":null,"abstract":"Due to the swift growth of the internet and the increasing flow of data across public networks, data security is becoming more and more crucial. One potential resolution to this issue is encrypting the information which might take the form of text, images, audio, video, etc. Today, photographs are used in the majority of multimedia applications. AES, DES, RSA, and other early picture encryption algorithms have low levels of security and poor anti-attack capabilities. By adopting chaos-based cryptography, this issue was solved. The chaotic systems have the potential to be used in image encryption because they are sensitive to the starting conditions and control variables. Many research endeavors have been focused on investigating image encryption. An overview of the components and methods of the image encryption design is attempted in this work. We used statistical analyses, such as entropy and pixel correlation, as well as differential analyses, such as unified averaged altered intensity (UACI) and number of changing pixel rate (NPCR), in order to assess the security against various cryptographic assaults. Analyses of key sensitivity and key space are also carried out to thwart brute force assaults. The randomness of the proposed encryption system was further examined through entropy and NIST randomness suit tests.","PeriodicalId":377623,"journal":{"name":"2023 3rd International Conference on Intelligent Technologies (CONIT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Intelligent Technologies (CONIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONIT59222.2023.10205829","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Due to the swift growth of the internet and the increasing flow of data across public networks, data security is becoming more and more crucial. One potential resolution to this issue is encrypting the information which might take the form of text, images, audio, video, etc. Today, photographs are used in the majority of multimedia applications. AES, DES, RSA, and other early picture encryption algorithms have low levels of security and poor anti-attack capabilities. By adopting chaos-based cryptography, this issue was solved. The chaotic systems have the potential to be used in image encryption because they are sensitive to the starting conditions and control variables. Many research endeavors have been focused on investigating image encryption. An overview of the components and methods of the image encryption design is attempted in this work. We used statistical analyses, such as entropy and pixel correlation, as well as differential analyses, such as unified averaged altered intensity (UACI) and number of changing pixel rate (NPCR), in order to assess the security against various cryptographic assaults. Analyses of key sensitivity and key space are also carried out to thwart brute force assaults. The randomness of the proposed encryption system was further examined through entropy and NIST randomness suit tests.
使用混沌映射的图像加密:最先进的技术
随着互联网的快速发展和公共网络上数据流量的增加,数据安全变得越来越重要。这个问题的一个潜在解决方案是对可能采用文本、图像、音频、视频等形式的信息进行加密。今天,照片在大多数多媒体应用程序中使用。AES、DES、RSA等早期的图片加密算法安全性较低,抗攻击能力较差。采用基于混沌的密码学解决了这一问题。混沌系统对初始条件和控制变量敏感,具有应用于图像加密的潜力。许多研究工作都集中在研究图像加密上。本文概述了图像加密设计的组成和方法。我们使用统计分析,如熵和像素相关性,以及差分分析,如统一平均改变强度(UACI)和变化像素率(NPCR),以评估对各种加密攻击的安全性。此外,我们亦会分析密码键的敏感度及密码键的空间,以挫败蛮力攻击。通过熵和NIST随机套装测试进一步检验了所提出的加密系统的随机性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信