Donia Fadhil Chalob, Zynab M. Jasim, Z. M. Essa, Ziad M. Abood
{"title":"Subject Review: Image Encryption Techniques based on Chaotic Systems","authors":"Donia Fadhil Chalob, Zynab M. Jasim, Z. M. Essa, Ziad M. Abood","doi":"10.31695/ijerat.2021.3727","DOIUrl":null,"url":null,"abstract":"The interchange of information over the internet and networks has grown fast. The Digital images occupy an important role in multimedia communications. Images are utilized in a variety of discipline, including biometric authentication, military, medical science; hence, their security become a major concern. The best solution for securing the data (in any form) is encryption. The recent encryption trend is chaos-based encryption. Image encryption approaches based on chaos have essential merits l. This paper surveys various aspects and approaches of chaos maps image encryption like PWLCM (piecewise linear chaotic map), logistic map, skew tent map. Considering security measurements like correlation analysis and keyspace when comparing image encryption techniques that use different chaotic maps.","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"237 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Engineering Research and Advanced Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31695/ijerat.2021.3727","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The interchange of information over the internet and networks has grown fast. The Digital images occupy an important role in multimedia communications. Images are utilized in a variety of discipline, including biometric authentication, military, medical science; hence, their security become a major concern. The best solution for securing the data (in any form) is encryption. The recent encryption trend is chaos-based encryption. Image encryption approaches based on chaos have essential merits l. This paper surveys various aspects and approaches of chaos maps image encryption like PWLCM (piecewise linear chaotic map), logistic map, skew tent map. Considering security measurements like correlation analysis and keyspace when comparing image encryption techniques that use different chaotic maps.