z-logo
open-access-imgOpen Access
Secure Surveillance System Using Chaotic Image Encryption Technique
Author(s) -
Gopal Ghosh,
. Kavita,
Sahil Verma,
N. Z. Jhanjhi,
Mohammad Talib
Publication year - 2020
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/993/1/012062
Subject(s) - chaotic , encryption , computer science , ergodicity , digital image , data mining , image (mathematics) , transmission (telecommunications) , field (mathematics) , computer vision , theoretical computer science , algorithm , artificial intelligence , computer security , real time computing , computer engineering , image processing , mathematics , telecommunications , statistics , pure mathematics
In the current data transmission situation, digital images constitute a large part of visual communication. Their security is thus an essential field of concern. This paper analyses several chaotic maps for the encryption of images and discusses their advantages and disadvantages. The characteristics of chaotic maps such as stochastic, ergodicity and highly sensitive initial conditions allow them reliable to encrypt images. Many of the previously proposed imaging approaches used chaotic, low-dimensional charts that display the lowest security and have very less potential to handle force and attacks. To solve this challenge, scientists have proposed multiple broad chaotic charts. In this paper the characteristics and techniques of some chaotic maps used to encrypt images were reviewed. Also for images like boat, airplane, peppers, lake, house chaotic encryption is applied and analysed.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here