Images are widely used a data type for sharing information through the Internet. Designing and exploring security mechanisms to protect the image data during communication are matters of great interest among researchers and industry experts. Encrypting the images is a commonly used mechanism of securing them from different types of attacks. In this work, various image encryption algorithms employing chaotic map techniques are compared. It includes various security parameters in respect of chaotic maps and encryption algorithms for images. Chaotic maps are verified using tools like bifurcation and Lyapunov diagrams. Image encryption algorithms need to satisfy a comprehensive set of security parameters and tests—visual analysis, key sensitivity, keyspace, correlation coefficient, and histogram analysis. Finally, a tabular comparison of different encryption schemes is done using ‘NPCR’ and ‘UACI.’ Another comparison provides the different schemes’ correlation coefficients for horizontal, vertical, and diagonal adjacencies.
CITATION STYLE
Sharma, M., Ranjan, R. K., & Bharti, V. (2022). Image Encryption Using Chaotic Maps: A Survey. In Lecture Notes in Networks and Systems (Vol. 425, pp. 835–844). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-19-0707-4_75
Mendeley helps you to discover research relevant for your work.