Proceedings of the 3rd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2022, 24-25 March 2022, New Delhi, India

Research Article

Analysis of Various Chaos Based Image Encryption Methods

Download191 downloads
  • @INPROCEEDINGS{10.4108/eai.24-3-2022.2318552,
        author={Amita  Yadav and Apurav  Poriya and Raj  Kumar and Sachet  Gulia and Mihir  Sharma},
        title={ Analysis of Various Chaos Based Image Encryption Methods},
        proceedings={Proceedings of the 3rd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2022, 24-25 March 2022, New Delhi, India},
        publisher={EAI},
        proceedings_a={ICIDSSD},
        year={2023},
        month={5},
        keywords={encryption chaos image encryption cryptography security},
        doi={10.4108/eai.24-3-2022.2318552}
    }
    
  • Amita Yadav
    Apurav Poriya
    Raj Kumar
    Sachet Gulia
    Mihir Sharma
    Year: 2023
    Analysis of Various Chaos Based Image Encryption Methods
    ICIDSSD
    EAI
    DOI: 10.4108/eai.24-3-2022.2318552
Amita Yadav1,*, Apurav Poriya1, Raj Kumar1, Sachet Gulia1, Mihir Sharma2
  • 1: Maharaja Surajmal Institute of Technology, Delhi
  • 2: Maharaja Surajmal Institute of Technology
*Contact email: amita.yadav@msit.in

Abstract

In today's data transfer environment images are one of the major parts of Internet and online interaction. As a result, there is intrusive. Different type of chaotic maps which are utilized for image encryption are analyzed in the paper, along with their advantages and disadvantages. Chaotic maps are advantageous for image encryption because of their unexpected, exponential, and very sensitive initial circumstances, which results in more trustworthy image encryption. Numerous previous suggested image encryption systems rely on low dimensional chaotic maps, which provides a poor amount of security and are especially susceptible to most common cyber attacks. To tackle this issue, various chaotic maps were designed. The objective of this review article is to discuss the properties and methodology of numerous chaotic maps that have been utilized for image encryption.