Donia Fadhil Chalob, Zynab M. Jasim, Z. M. Essa, Ziad M. Abood
{"title":"主题综述:基于混沌系统的图像加密技术","authors":"Donia Fadhil Chalob, Zynab M. Jasim, Z. M. Essa, Ziad M. Abood","doi":"10.31695/ijerat.2021.3727","DOIUrl":null,"url":null,"abstract":"The interchange of information over the internet and networks has grown fast. The Digital images occupy an important role in multimedia communications. Images are utilized in a variety of discipline, including biometric authentication, military, medical science; hence, their security become a major concern. The best solution for securing the data (in any form) is encryption. The recent encryption trend is chaos-based encryption. Image encryption approaches based on chaos have essential merits l. This paper surveys various aspects and approaches of chaos maps image encryption like PWLCM (piecewise linear chaotic map), logistic map, skew tent map. Considering security measurements like correlation analysis and keyspace when comparing image encryption techniques that use different chaotic maps.","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"237 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Subject Review: Image Encryption Techniques based on Chaotic Systems\",\"authors\":\"Donia Fadhil Chalob, Zynab M. Jasim, Z. M. Essa, Ziad M. Abood\",\"doi\":\"10.31695/ijerat.2021.3727\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The interchange of information over the internet and networks has grown fast. The Digital images occupy an important role in multimedia communications. Images are utilized in a variety of discipline, including biometric authentication, military, medical science; hence, their security become a major concern. The best solution for securing the data (in any form) is encryption. The recent encryption trend is chaos-based encryption. Image encryption approaches based on chaos have essential merits l. This paper surveys various aspects and approaches of chaos maps image encryption like PWLCM (piecewise linear chaotic map), logistic map, skew tent map. Considering security measurements like correlation analysis and keyspace when comparing image encryption techniques that use different chaotic maps.\",\"PeriodicalId\":424923,\"journal\":{\"name\":\"International Journal of Engineering Research and Advanced Technology\",\"volume\":\"237 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Engineering Research and Advanced Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31695/ijerat.2021.3727\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Engineering Research and Advanced Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31695/ijerat.2021.3727","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Subject Review: Image Encryption Techniques based on Chaotic Systems
The interchange of information over the internet and networks has grown fast. The Digital images occupy an important role in multimedia communications. Images are utilized in a variety of discipline, including biometric authentication, military, medical science; hence, their security become a major concern. The best solution for securing the data (in any form) is encryption. The recent encryption trend is chaos-based encryption. Image encryption approaches based on chaos have essential merits l. This paper surveys various aspects and approaches of chaos maps image encryption like PWLCM (piecewise linear chaotic map), logistic map, skew tent map. Considering security measurements like correlation analysis and keyspace when comparing image encryption techniques that use different chaotic maps.