Image Encryption Using Chaotic Maps: A Survey

3Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Images are widely used a data type for sharing information through the Internet. Designing and exploring security mechanisms to protect the image data during communication are matters of great interest among researchers and industry experts. Encrypting the images is a commonly used mechanism of securing them from different types of attacks. In this work, various image encryption algorithms employing chaotic map techniques are compared. It includes various security parameters in respect of chaotic maps and encryption algorithms for images. Chaotic maps are verified using tools like bifurcation and Lyapunov diagrams. Image encryption algorithms need to satisfy a comprehensive set of security parameters and tests—visual analysis, key sensitivity, keyspace, correlation coefficient, and histogram analysis. Finally, a tabular comparison of different encryption schemes is done using ‘NPCR’ and ‘UACI.’ Another comparison provides the different schemes’ correlation coefficients for horizontal, vertical, and diagonal adjacencies.

Cite

CITATION STYLE

APA

Sharma, M., Ranjan, R. K., & Bharti, V. (2022). Image Encryption Using Chaotic Maps: A Survey. In Lecture Notes in Networks and Systems (Vol. 425, pp. 835–844). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-19-0707-4_75

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free