{"title":"基于混沌的彩色图像加密算法综述","authors":"Ghofran Shraida, Hameed A. Younis","doi":"10.56714/bjrs.48.2.8","DOIUrl":null,"url":null,"abstract":"The protection of multimedia information is becoming very essential due to the significant advancements in communication networks, particularly the Internet network, which is utilized by many individuals to transmit various kinds of data. The safety of this multimedia information may be performed with encryption and decryption methods. There are such a lot of special strategies need to be used to guard personal image from unauthorized access, chaotic encryption systems are one of these technologies that have recently become popular. Many ways for encrypting images using a chaotic map have been proposed due to various advantages, such as, ease of implementation, better encryption speed, and resistance to assaults. Many image encryption techniques based on chaotic maps have been proposed due to their great sensitivity to beginning circumstances, unpredictability, and random-like behavior. This paper reviews various image encryption algorithms based on chaos theory that give good security.","PeriodicalId":377834,"journal":{"name":"Basrah Researches Sciences","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Chaotic-Based Color Image Encryption Algorithms: A Review\",\"authors\":\"Ghofran Shraida, Hameed A. Younis\",\"doi\":\"10.56714/bjrs.48.2.8\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The protection of multimedia information is becoming very essential due to the significant advancements in communication networks, particularly the Internet network, which is utilized by many individuals to transmit various kinds of data. The safety of this multimedia information may be performed with encryption and decryption methods. There are such a lot of special strategies need to be used to guard personal image from unauthorized access, chaotic encryption systems are one of these technologies that have recently become popular. Many ways for encrypting images using a chaotic map have been proposed due to various advantages, such as, ease of implementation, better encryption speed, and resistance to assaults. Many image encryption techniques based on chaotic maps have been proposed due to their great sensitivity to beginning circumstances, unpredictability, and random-like behavior. This paper reviews various image encryption algorithms based on chaos theory that give good security.\",\"PeriodicalId\":377834,\"journal\":{\"name\":\"Basrah Researches Sciences\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Basrah Researches Sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.56714/bjrs.48.2.8\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Basrah Researches Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.56714/bjrs.48.2.8","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Chaotic-Based Color Image Encryption Algorithms: A Review
The protection of multimedia information is becoming very essential due to the significant advancements in communication networks, particularly the Internet network, which is utilized by many individuals to transmit various kinds of data. The safety of this multimedia information may be performed with encryption and decryption methods. There are such a lot of special strategies need to be used to guard personal image from unauthorized access, chaotic encryption systems are one of these technologies that have recently become popular. Many ways for encrypting images using a chaotic map have been proposed due to various advantages, such as, ease of implementation, better encryption speed, and resistance to assaults. Many image encryption techniques based on chaotic maps have been proposed due to their great sensitivity to beginning circumstances, unpredictability, and random-like behavior. This paper reviews various image encryption algorithms based on chaos theory that give good security.