Review on Different Chaotic Based Image Encryption Techniques
نویسندگان
چکیده
In present times, Due to the rapidly growth of digital and multimedia applications, more multimedia data are developed and transmitted through the networks in ,art, entertainment, advertising, education, training and commercial areas, which may have important information that should not be accessed by the general users. Therefore issue of protecting the confidentiality, integrity, security, privacy as well as the authenticity of images has become an important issue for communication and storage of images. In recent years, various encryption techniques are developed and applied to protect the confidential images from unauthorized users. This paper has a review on the aspects and existing different image encryption techniques based on chaos to design an image cryptosystem. In this paper, first a general introduction given for cryptography and images encryption and followed by discussion of different chaotic based image encryption techniques and related works for each technique reviewed. Finally, The main purpose of this paper is to help in design of new chaotic based image encryption techniques in future by studying the behavior of several existing chaotic based image encryption algorithms.
منابع مشابه
A New Method for Encryption of Color Images based on Combination of Chaotic Systems
This paper presents a new method for encryption of color images based on a combination of chaotic systems, which makes the image encryption more efficient and robust. The proposed algorithm generated three series of data, ranged between 0 and 255, using a chaotic Chen system. Another Chen system was then started with different initial values, which were converted to three series of numbers from...
متن کاملImage encryption based on chaotic tent map in time and frequency domains
The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...
متن کاملA stack-based chaotic algorithm for encryption of colored images
In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four i...
متن کاملImage Encryption Using Chaotic Maps of Various Dimensions: Review
Information Security is an important problem in communication. Information includes text, audio, video, image etc. When information is transferred through various networks, there is high chance of unauthorized access. In many fields such as medical science, military, geographic satellite images etc, high security of information is guaranteed using encryption. As a result, the data confidentiali...
متن کاملImage Based Encryption Techniques: A Review
Now a day’s rapid increasing growth of internet and multimedia data, security is main problem in storage and communication of images. The solution of this multimedia data can be solved by using encryption. There are various techniques available to protect the image data from unauthorized access. In this paper, authors reviewed different existing techniques of image encryption and also discussed...
متن کامل