Research Article
Analysis of Various Chaos Based Image Encryption Methods
@INPROCEEDINGS{10.4108/eai.24-3-2022.2318552, author={Amita Yadav and Apurav Poriya and Raj Kumar and Sachet Gulia and Mihir Sharma}, title={ Analysis of Various Chaos Based Image Encryption Methods}, proceedings={Proceedings of the 3rd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2022, 24-25 March 2022, New Delhi, India}, publisher={EAI}, proceedings_a={ICIDSSD}, year={2023}, month={5}, keywords={encryption chaos image encryption cryptography security}, doi={10.4108/eai.24-3-2022.2318552} }
- Amita Yadav
Apurav Poriya
Raj Kumar
Sachet Gulia
Mihir Sharma
Year: 2023
Analysis of Various Chaos Based Image Encryption Methods
ICIDSSD
EAI
DOI: 10.4108/eai.24-3-2022.2318552
Abstract
In today's data transfer environment images are one of the major parts of Internet and online interaction. As a result, there is intrusive. Different type of chaotic maps which are utilized for image encryption are analyzed in the paper, along with their advantages and disadvantages. Chaotic maps are advantageous for image encryption because of their unexpected, exponential, and very sensitive initial circumstances, which results in more trustworthy image encryption. Numerous previous suggested image encryption systems rely on low dimensional chaotic maps, which provides a poor amount of security and are especially susceptible to most common cyber attacks. To tackle this issue, various chaotic maps were designed. The objective of this review article is to discuss the properties and methodology of numerous chaotic maps that have been utilized for image encryption.