A Survey on Image Encryption Using Chaotic Maps

Authors

  • Marakumbi Prakash R

Keywords:

Cryptography, Chaos, Chaotic Maps, Encryption Techniques, Image Encryption, Security, Secure Communication.

Abstract

Authentication plays an important role in protecting image against unauthorized access. Digital images are transmitted over insecure channels such as the internet. Images must be protected against attempts to manipulate them; such manipulation could tamper the decisions based on these images. To protect the authenticity of images several methods have been proposed. Image authentication methods have gained attention due to their significance in the areas of multimedia communications and multimedia networking applications. The traditional encryption techniques exhibits a low level of security and significantly low level of resistance to the attacks. This problem can be overcome by chaotic image encryption techniques as they have a high level of randomness in key generation. This paper attempts to study various chaos-based image encryption algorithms and techniques and to compare their performance in various environments.

Downloads

Download data is not yet available.

Downloads

Published

2021-02-16

How to Cite

Marakumbi Prakash R. (2021). A Survey on Image Encryption Using Chaotic Maps. International Journal of Progressive Research in Science and Engineering, 2(2), 1–7. Retrieved from https://journals.grdpublications.com/index.php/ijprse/article/view/228

Issue

Section

Articles