Amrita International Conference of Women in Computing - 2013 |
Foundation of Computer Science USA |
AICWIC - Number 2 |
January 2013 |
Authors: Ephin M, Judy Ann Joy, N. A. Vasanthi |
6887c7da-ed6a-4ce6-8e15-fad4bd880839 |
Ephin M, Judy Ann Joy, N. A. Vasanthi . Survey of Chaos based Image Encryption and Decryption Techniques. Amrita International Conference of Women in Computing - 2013. AICWIC, 2 (January 2013), 1-5.
Nowadays security becomes an important issue of communication and storage of images. One of the method used to ensure the high security of images is encryption. Images are used in many fields such as biometric authentication, medical science, military; they are stored or transferred through the network and the security of such image data is important. Due to some intrinsic features of the images, such as bulk data capacity and high correlation among pixels the earlier encryption techniques such as AES, DES, RSA, etc are not suitable for practical applications. The latest trend in encryption is chaos based. It has many unique characteristics such as the sensitive dependence on initial conditions, nonperiodicity, nonconvergence, and control parameters. In this paper survey of different chaos-based image encryption techniques has been discussed.