{"title":"基于混沌的图像加密技术综述","authors":"Kanika Suneja, Shelza Dua, M. Dua","doi":"10.1109/ICCMC.2019.8819860","DOIUrl":null,"url":null,"abstract":"In the current scenario of data transmissions, digital images constitute a major part of multimedia communication. Hence, their security is a great area of concern. In this paper, various chaotic maps, which are used in image encryption, are reviewed and their merits and demerits are discussed. The properties of chaotic maps like stochastic, ergodicity and highly sensitive to initial situations make them reliable for image encryption. Many of the earlier proposed image encryption techniques used low dimensional chaotic maps, which exhibit lowest level of security and have very less ability to handle brute force and statistical attacks. To solve this problem, researchers have established various high dimensional chaotic maps. In this review paper, an effort has been made to highlight the features and techniques of different chaotic maps used for image encryption.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"22","resultStr":"{\"title\":\"A Review of Chaos based Image Encryption\",\"authors\":\"Kanika Suneja, Shelza Dua, M. Dua\",\"doi\":\"10.1109/ICCMC.2019.8819860\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the current scenario of data transmissions, digital images constitute a major part of multimedia communication. Hence, their security is a great area of concern. In this paper, various chaotic maps, which are used in image encryption, are reviewed and their merits and demerits are discussed. The properties of chaotic maps like stochastic, ergodicity and highly sensitive to initial situations make them reliable for image encryption. Many of the earlier proposed image encryption techniques used low dimensional chaotic maps, which exhibit lowest level of security and have very less ability to handle brute force and statistical attacks. To solve this problem, researchers have established various high dimensional chaotic maps. In this review paper, an effort has been made to highlight the features and techniques of different chaotic maps used for image encryption.\",\"PeriodicalId\":232624,\"journal\":{\"name\":\"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"22\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCMC.2019.8819860\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMC.2019.8819860","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In the current scenario of data transmissions, digital images constitute a major part of multimedia communication. Hence, their security is a great area of concern. In this paper, various chaotic maps, which are used in image encryption, are reviewed and their merits and demerits are discussed. The properties of chaotic maps like stochastic, ergodicity and highly sensitive to initial situations make them reliable for image encryption. Many of the earlier proposed image encryption techniques used low dimensional chaotic maps, which exhibit lowest level of security and have very less ability to handle brute force and statistical attacks. To solve this problem, researchers have established various high dimensional chaotic maps. In this review paper, an effort has been made to highlight the features and techniques of different chaotic maps used for image encryption.