{"title":"A Survey on Image Encryption using Chaos-based Techniques","authors":"G. Veena, M. Ramakrishna","doi":"10.14569/IJACSA.2021.0120145","DOIUrl":null,"url":null,"abstract":"Encryption methods such as AES (Advanced Encryption Standard), DES (Data Encryption Standard), etc. cannot be used for image encryption as images contain a huge amount of redundant data, a high correlation between neighboring pixels and size of the image is very large. Chaos- based techniques have suitable properties that are required for image encryption. The properties include sensitivity to initial conditions, pseudorandom number, ergodicity, and density of periodic orbits. In this paper, a survey of image encryption using chaos-maps such as a logistic map, piecewise linear chaotic map (PWLCM), tent map, etc. is done in order to choose best map for image encryption. Comparison of image encryption using different chaotic maps is done by considering parameters such as key-space and correlation analysis.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"70 1","pages":""},"PeriodicalIF":0.9000,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Advanced Computer Science and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14569/IJACSA.2021.0120145","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 11
Abstract
Encryption methods such as AES (Advanced Encryption Standard), DES (Data Encryption Standard), etc. cannot be used for image encryption as images contain a huge amount of redundant data, a high correlation between neighboring pixels and size of the image is very large. Chaos- based techniques have suitable properties that are required for image encryption. The properties include sensitivity to initial conditions, pseudorandom number, ergodicity, and density of periodic orbits. In this paper, a survey of image encryption using chaos-maps such as a logistic map, piecewise linear chaotic map (PWLCM), tent map, etc. is done in order to choose best map for image encryption. Comparison of image encryption using different chaotic maps is done by considering parameters such as key-space and correlation analysis.
期刊介绍:
IJACSA is a scholarly computer science journal representing the best in research. Its mission is to provide an outlet for quality research to be publicised and published to a global audience. The journal aims to publish papers selected through rigorous double-blind peer review to ensure originality, timeliness, relevance, and readability. In sync with the Journal''s vision "to be a respected publication that publishes peer reviewed research articles, as well as review and survey papers contributed by International community of Authors", we have drawn reviewers and editors from Institutions and Universities across the globe. A double blind peer review process is conducted to ensure that we retain high standards. At IJACSA, we stand strong because we know that global challenges make way for new innovations, new ways and new talent. International Journal of Advanced Computer Science and Applications publishes carefully refereed research, review and survey papers which offer a significant contribution to the computer science literature, and which are of interest to a wide audience. Coverage extends to all main-stream branches of computer science and related applications