Subject Review: Image Encryption Techniques based on Chaotic Systems

Donia Fadhil Chalob, Zynab M. Jasim, Z. M. Essa, Ziad M. Abood
{"title":"Subject Review: Image Encryption Techniques based on Chaotic Systems","authors":"Donia Fadhil Chalob, Zynab M. Jasim, Z. M. Essa, Ziad M. Abood","doi":"10.31695/ijerat.2021.3727","DOIUrl":null,"url":null,"abstract":"The interchange of information over the internet and networks has grown fast. The Digital images occupy an important role in multimedia communications. Images are utilized in a variety of discipline, including biometric authentication, military, medical science; hence, their security become a major concern. The best solution for securing the data (in any form) is encryption. The recent encryption trend is chaos-based encryption. Image encryption approaches based on chaos have essential merits l. This paper surveys various aspects and approaches of chaos maps image encryption like PWLCM (piecewise linear chaotic map), logistic map, skew tent map. Considering security measurements like correlation analysis and keyspace when comparing image encryption techniques that use different chaotic maps.","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"237 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Engineering Research and Advanced Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31695/ijerat.2021.3727","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The interchange of information over the internet and networks has grown fast. The Digital images occupy an important role in multimedia communications. Images are utilized in a variety of discipline, including biometric authentication, military, medical science; hence, their security become a major concern. The best solution for securing the data (in any form) is encryption. The recent encryption trend is chaos-based encryption. Image encryption approaches based on chaos have essential merits l. This paper surveys various aspects and approaches of chaos maps image encryption like PWLCM (piecewise linear chaotic map), logistic map, skew tent map. Considering security measurements like correlation analysis and keyspace when comparing image encryption techniques that use different chaotic maps.
主题综述:基于混沌系统的图像加密技术
互联网和网络上的信息交换发展迅速。数字图像在多媒体通信中占有重要地位。图像被用于各种学科,包括生物识别认证、军事、医学;因此,他们的安全成为一个主要问题。保护数据(任何形式)的最佳解决方案是加密。最近的加密趋势是基于混沌的加密。基于混沌的图像加密方法有其本质的优点1 .本文综述了混沌映射图像加密的各个方面和方法,如分段线性混沌映射(PWLCM)、逻辑映射、斜帐篷映射。在比较使用不同混沌映射的图像加密技术时,考虑相关分析和键空间等安全度量。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信