# Survey on CHAOS Based Image Encryption Techniques

@inproceedings{Kamath2017SurveyOC, title={Survey on CHAOS Based Image Encryption Techniques}, author={S. Sowmya Kamath}, year={2017} }

Now a days exchange of data over the network is keep on increasing, we using the for data exchange like open networks and internet. In data exchange security of the data is one of the major concern. We can encrypt the data before exchange like we can secure the data. The data can be in the format of text, image, audio and video etc.. Most of the multimedia applications includes images. Earlier AES, DES, RSA etc image encryption techniques were used, it contains low level of security and others…

## 8 Citations

### SECURE IMAGE CRYPTOSYSTEM BASED ON HENON MAP AND ADJUSTED SINE LOGISTIC MAP

- Computer Science
- 2020

The proposed 2D HM-ALSM color image encryption scheme is subjected to a series of security tests to study and investigate its security with respect to several attacks like entropy, histogram, correlation coefficient, differential, occlusion, and noise resistance attacks.

### Automata-Derived Chaotic Image Encryption Scheme

- Computer Science2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST)
- 2022

This work introduces an encryption scheme for gray-scale plain-text images, which is based on a chaotic map, which in combination with the aforementioned PRBG defines the encryption strategy, that is, the order in which the rows and columns are encrypted.

### Multi-Stage RGB Image Encryption

- Computer Science2022 International Telecommunications Conference (ITC-Egypt)
- 2022

A comparison of the proposed scheme to the state-of-the-art also shows that it is superior, and the suggested image encryption is appropriate for real-time applications.

### Construction of one-way hash functions with increased key space using adaptive chaotic maps

- Computer Science, Mathematics
- 2020

### Chaotification of One-Dimensional Maps Based on Remainder Operator Addition

- Computer ScienceMathematics
- 2022

It is shown that by an appropriate parameter choice, the resulting map can achieve a higher Lyapunov exponent compared to its seed map, and all periodic orbits of any period will be unstable, leading to robust chaos.

### Perturbed Chaotic Map with Varying Number of Iterations and Application in Image Encryption

- Physics2020 IEEE Eighth International Conference on Communications and Electronics (ICCE)
- 2021

In this paper, the model of perturbed chaotic map with varying number of iterations (PCM-VNI) is proposed, in which values of chaotic states and control parameters are represented in the format of…

### Security Framework for Sharing Data in Fog Computing

- Computer Science
- 2017

Fog computing is a criterion which extends the cloud computing and its services to the network edge by providing the security in the cloud atmosphere and it eliminates the overhead to the centralized computing system.

### Recent Advances in Selective Image Encryption and its Indispensability due to COVID-19

- Computer Science2020 IEEE Recent Advances in Intelligent Computational Systems (RAICS)
- 2020

The calamitous effects of the pandemic on the world population and how their changes in multimedia consumption have led to an urgent need for the development and deployment of secure and fast image encryption, especially selective image encryption techniques are discussed.

## References

SHOWING 1-10 OF 15 REFERENCES

### An Ethical Approach of Block Based Image Encryption Using Chaotic Map

- Computer Science
- 2015

The proposed image encryption algorithm by using chaotic map has encouragingly succeeded to pass most of them like key sensitivity analysis, statistical analysis, differential analysis, entropy analysis, which make the proposed algorithm good enough for real time secure communication.

### Image encryption using chaotic logistic map

- Computer Science, MathematicsImage Vis. Comput.
- 2006

### Image Encryption Algorithm Based on Chaotic Economic Model

- Computer Science
- 2015

The proposed algorithm can successfully encrypt and decrypt the images with the same security keys and shows that the encrypted images have good information entropy and very low correlation coefficients and the distribution of the gray values of the encrypted image has random-like behavior.

### A New Chaotic Algorithm for Image Encryption and Decryption of Digital Color Images

- Computer Science
- 2011

A new image encryption scheme which employs one of the three dynamic chaotic systems (Lorenz or Chen or LU chaotic system selected based on 16-byte key) to shuffle the position of the image pixels and uses another one the same three chaotic maps to confuse the relationship between the cipher image and the plain-image thereby significantly increasing the resistance to attacks.

### A new chaotic algorithm for image encryption

- Computer Science2008 International Conference on Audio, Language and Image Processing
- 2008

### A Secure and Efficient Fingerprint Images Encryption Scheme

- Computer Science, Mathematics2008 The 9th International Conference for Young Computer Scientists
- 2008

The results of several experimental, statistical analysis and key sensitivity tests show that the proposed image encryption scheme provides an efficient and secure way for fingerprint images encryption and storage.

### A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps

- Computer ScienceInt. J. Bifurc. Chaos
- 2004

Experimental results show that this three-dimensional baker map is 2–3 times faster than the two-dimensional one, showing its great potential in real-time image encryption applications.

### New Approach for Fast Color Image Encryption Using Chaotic Map

- Computer ScienceJ. Information Security
- 2011

A technique which replaces the traditional preprocessing complex system and utilizes the basic operations like confusion, diffusion which provide same or better encryption using cascading of 3D standard and 3D cat map is presented.