z-logo
open-access-imgOpen Access
Chaos Image Encryption Methods: A Survey Study
Author(s) -
Sabah Fadhel,
Mohd Shafry,
Omar Farook
Publication year - 2017
Publication title -
bulletin of electrical engineering and informatics
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.251
H-Index - 12
ISSN - 2302-9285
DOI - 10.11591/eei.v6i1.599
Subject(s) - encryption , chaos (operating system) , multiple encryption , 40 bit encryption , probabilistic encryption , computer science , 56 bit encryption , on the fly encryption , link encryption , image (mathematics) , disk encryption theory , client side encryption , disk encryption , data transmission , transmission (telecommunications) , watermarking attack , theoretical computer science , computer security , attribute based encryption , computer vision , computer network , public key cryptography , telecommunications
With increasing dependence on communications over internet and networks, secure data transmission is coming under threat. One of the best solutions to ensure secure data transmissions is encryption. Multiple forms of data, such as text, audio, image, and video can be digitally transmitted, nowadays images being the most popular and old encryption techniques such as: AES,DES,RSA etc., show low security level when used for image encryption. This problem was resolved by using of chaos encryption which is an acceptable form of encryption for image data. The sensitivity to initial conditions and control parameters make chaos encryption suitable for image applications. This study discusses various chaos encryption techniques.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom