z-logo
open-access-imgOpen Access
Robust Encryption System Based Watermarking Theory by Using Chaotic Algorithms: A Reviewer Paper
Author(s) -
Heba Abdul-Jaleel Al-Asady,
Osama Qasim Jumah Al-Thahab,
Saad S. Hreshee
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1818/1/012086
Subject(s) - encryption , chaotic , computer science , cryptography , fibonacci number , algorithm , digital watermarking , theoretical computer science , chaos (operating system) , image (mathematics) , logistic map , watermarking attack , limit (mathematics) , field (mathematics) , probabilistic encryption , data mining , computer security , mathematics , artificial intelligence , deterministic encryption , discrete mathematics , mathematical analysis , pure mathematics
In the previous decade, the mixing between chaotic supposition and cryptography frames considers a significant field of data security. Chaos-based image encryption is given a lot of attention in the exploration of data security moreover a great deal of picture encrypting calculations have been proposed concerning chaotic maps. Because of some inveterate highlights of media like information limit and high information excess, the encryption of images not quite the same as that of texts; accordingly it is hard to deal with them by conventional encryption strategies. This paper presents a short review of robust digital watermarking systems that used chaotic algorithms such as Logistic, Tent, Baker, Hyper, Fibonacci, and Arnold maps for encryption of the data presented in several years.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here