Lakshya Gupta, Prateek Jaiswal, Ishita Lather, R. Agarwal, Anita Thakur
{"title":"使用混沌映射的图像加密:最先进的技术","authors":"Lakshya Gupta, Prateek Jaiswal, Ishita Lather, R. Agarwal, Anita Thakur","doi":"10.1109/CONIT59222.2023.10205829","DOIUrl":null,"url":null,"abstract":"Due to the swift growth of the internet and the increasing flow of data across public networks, data security is becoming more and more crucial. One potential resolution to this issue is encrypting the information which might take the form of text, images, audio, video, etc. Today, photographs are used in the majority of multimedia applications. AES, DES, RSA, and other early picture encryption algorithms have low levels of security and poor anti-attack capabilities. By adopting chaos-based cryptography, this issue was solved. The chaotic systems have the potential to be used in image encryption because they are sensitive to the starting conditions and control variables. Many research endeavors have been focused on investigating image encryption. An overview of the components and methods of the image encryption design is attempted in this work. We used statistical analyses, such as entropy and pixel correlation, as well as differential analyses, such as unified averaged altered intensity (UACI) and number of changing pixel rate (NPCR), in order to assess the security against various cryptographic assaults. Analyses of key sensitivity and key space are also carried out to thwart brute force assaults. The randomness of the proposed encryption system was further examined through entropy and NIST randomness suit tests.","PeriodicalId":377623,"journal":{"name":"2023 3rd International Conference on Intelligent Technologies (CONIT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Image Encryption using Chaotic maps: State of the art\",\"authors\":\"Lakshya Gupta, Prateek Jaiswal, Ishita Lather, R. Agarwal, Anita Thakur\",\"doi\":\"10.1109/CONIT59222.2023.10205829\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to the swift growth of the internet and the increasing flow of data across public networks, data security is becoming more and more crucial. One potential resolution to this issue is encrypting the information which might take the form of text, images, audio, video, etc. Today, photographs are used in the majority of multimedia applications. AES, DES, RSA, and other early picture encryption algorithms have low levels of security and poor anti-attack capabilities. By adopting chaos-based cryptography, this issue was solved. The chaotic systems have the potential to be used in image encryption because they are sensitive to the starting conditions and control variables. Many research endeavors have been focused on investigating image encryption. An overview of the components and methods of the image encryption design is attempted in this work. We used statistical analyses, such as entropy and pixel correlation, as well as differential analyses, such as unified averaged altered intensity (UACI) and number of changing pixel rate (NPCR), in order to assess the security against various cryptographic assaults. Analyses of key sensitivity and key space are also carried out to thwart brute force assaults. The randomness of the proposed encryption system was further examined through entropy and NIST randomness suit tests.\",\"PeriodicalId\":377623,\"journal\":{\"name\":\"2023 3rd International Conference on Intelligent Technologies (CONIT)\",\"volume\":\"83 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 3rd International Conference on Intelligent Technologies (CONIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CONIT59222.2023.10205829\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Intelligent Technologies (CONIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONIT59222.2023.10205829","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Image Encryption using Chaotic maps: State of the art
Due to the swift growth of the internet and the increasing flow of data across public networks, data security is becoming more and more crucial. One potential resolution to this issue is encrypting the information which might take the form of text, images, audio, video, etc. Today, photographs are used in the majority of multimedia applications. AES, DES, RSA, and other early picture encryption algorithms have low levels of security and poor anti-attack capabilities. By adopting chaos-based cryptography, this issue was solved. The chaotic systems have the potential to be used in image encryption because they are sensitive to the starting conditions and control variables. Many research endeavors have been focused on investigating image encryption. An overview of the components and methods of the image encryption design is attempted in this work. We used statistical analyses, such as entropy and pixel correlation, as well as differential analyses, such as unified averaged altered intensity (UACI) and number of changing pixel rate (NPCR), in order to assess the security against various cryptographic assaults. Analyses of key sensitivity and key space are also carried out to thwart brute force assaults. The randomness of the proposed encryption system was further examined through entropy and NIST randomness suit tests.