A Survey on Image Encryption Using Chaotic Maps
Keywords:Cryptography, Chaos, Chaotic Maps, Encryption Techniques, Image Encryption, Security, Secure Communication.
Authentication plays an important role in protecting image against unauthorized access. Digital images are transmitted over insecure channels such as the internet. Images must be protected against attempts to manipulate them; such manipulation could tamper the decisions based on these images. To protect the authenticity of images several methods have been proposed. Image authentication methods have gained attention due to their significance in the areas of multimedia communications and multimedia networking applications. The traditional encryption techniques exhibits a low level of security and significantly low level of resistance to the attacks. This problem can be overcome by chaotic image encryption techniques as they have a high level of randomness in key generation. This paper attempts to study various chaos-based image encryption algorithms and techniques and to compare their performance in various environments.
How to Cite
Copyright (c) 2021 Marakumbi Prakash R
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.