CFP last date
20 January 2025
Reseach Article

A Review on Multiple Chaotic Maps for Image Encryption with Cryptographic Technique

by Govind Chandra, Naveen Chandra, Swati Verma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 121 - Number 13
Year of Publication: 2015
Authors: Govind Chandra, Naveen Chandra, Swati Verma
10.5120/21598-4702

Govind Chandra, Naveen Chandra, Swati Verma . A Review on Multiple Chaotic Maps for Image Encryption with Cryptographic Technique. International Journal of Computer Applications. 121, 13 ( July 2015), 6-9. DOI=10.5120/21598-4702

@article{ 10.5120/21598-4702,
author = { Govind Chandra, Naveen Chandra, Swati Verma },
title = { A Review on Multiple Chaotic Maps for Image Encryption with Cryptographic Technique },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 121 },
number = { 13 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 6-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume121/number13/21598-4702/ },
doi = { 10.5120/21598-4702 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:08:18.412470+05:30
%A Govind Chandra
%A Naveen Chandra
%A Swati Verma
%T A Review on Multiple Chaotic Maps for Image Encryption with Cryptographic Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 121
%N 13
%P 6-9
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the present time, Due to the rapid growth of digital communication and multimedia application, security becomes an important issue of communication, storage and transmission of digital data such as image, audio and video. Chaotic map based encryption is one of the ways to ensure high security of the image data. Encryption technique are used in many fields such as medical science, military, geographic satellite images. Thus due to this protecting the image data confidentiality, integrity, security, privacy as well as the authenticity has become an important issue for communication and storage of images via insecure channel like internet. Modern cryptography technique provides essential techniques for securing information and protecting multimedia data. In recent years, many encryption technology have been proposed. In this paper, first a general introduction given for cryptography and images encryption and followed by discussion of different type of chaotic based image encryption techniques and reviewed the related works for each technique. , At last, The main purpose of this paper is to help in design of new chaotic based image encryption techniques in future by studying the behavior of several existing chaotic based image encryption algorithms.

References
  1. Asia Mahdi, Naser Alzubaidi, "Selective Image Encryption with Diffusion and Confusion Mechanism", International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) - Volume 4, Issue 7, July 2014
  2. Bremnavas1, B. Poorna2 and I. Raja Mohamed, "Secured medical image transmission using chaotic map", Computer Science and Engineering Elixir Comp. Sci. Engg. 54 (2013) 12598-12602
  3. Chinchu Thampi1, Dona Jose," More Secure Color Image Encryption Scheme Based on 3D Chaotic Maps", International Journal For Advance Research In Engineering And Technology-Vol. 1, Issue IX, Oct. 2013
  4. Lalita Gupta1, Rahul Gupta and Manoj Sharma, "Low Complexity Efficient Image Encryption Technique Based on Chaotic Map", International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 11 (2014), pp. 1029-1034
  5. Rajinder Kaur1, Er. Kanwalpreet Singh, "Comparative Analysis and Implementation of Image Encryption Algorithms", International Journal of Computer Science and Mobile Computing (IJCSMC) - Vol. 2, Issue. 4, April 2013, pg. 170 – 176
  6. Shoaib Ansari1, Neelesh Gupta2, Sudhir Agrawal, "An Image Encryption Approach Using Chaotic Map in Frequency Domain", International Journal of Emerging Technology and Advanced Engineering-Volume 2, Issue 8, August 2012
  7. Pawan N. Khade and Prof. Manish Narnaware, "3D Chaotic Functions for Image Encryption", IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 3, No 1, May 2012
  8. Ramesh Kumar yadava, Dr. B. K. singh*, S. K. sinha*, K. K. pandey, "A New Approach of Colour Image Encryption Based on Henon like Chaotic Map", Journal of Information Engineering and Applications ISSN 2224-5782 (print) ISSN 2225-0506 (online)-Vol. 3, No. 6, 2013
  9. Priyanka Gupta, Sonia Singh and Isha Mangal, "Image Encryption Based On Arnold Cat Map and S-Box", International Journal of Advanced Research in Computer Science and Software Engineering-Volume 4, Issue 8, August 2014
  10. Kwok-Wo Wong, Bernie Sin-Hung Kwok, "An Efficient Diffusion Approach for Chaos-based Image Encryption", Journal of Information Engineering and Applications ISSN 2224-5782 (print) ISSN 2235-0516 (online)-Vol. 3, No. 7, 2014
  11. Wadia Faid Hassan Al-Shameri, "Dynamical Properties of the Hénon Mapping", Int. Journal of Math. Analysis, Vol. 6, 2012, no. 49, 2419 - 2430
  12. Nilesh Y. Choudhary, Ravindra K. Gupta, "Partial Image Encryption based on Block wise Shuffling using Arnold Map", International Journal of Computer Applications (0975 – 8887) Volume 97– No. 10, July 2014
  13. Mayank Mishra, Prashant Singh, Chinmay Garg, "A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping", International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 7 (2014), pp. 741-746
  14. Xuelian Sun, Kuifeng Zheng1, Lidong Wang1, Wei Zhao1, Xuefeng Sun2, "Chaos Of Henon Map Based On The Coupled Networks", Journal Of Theoretical And Applied Information Technology 10th January 201 3. Vol. 47 No. 1
  15. Reema Rhine, Nikhila T Bhuvan, "Image Scrambling Methods for Image Hiding: A Survey", IJCSNS International Journal of Computer Science and Network Security, VOL. 1 5 No. 2, February 2015.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Decryption Encryption Image Encryption.