
Investigation on Image Encryption Using Chaos Based Techniques
Author(s) -
Dr.C.Priya. Dr.M.Vidhyalakshmi Dr.S.Saranya; Dr.R.Premkumar.
Publication year - 2021
Publication title -
international journal of modern trends in science and technology
Language(s) - English
Resource type - Journals
ISSN - 2455-3778
DOI - 10.46501/ijmtst0705025
Subject(s) - encryption , computer science , chaos (operating system) , computer security , probabilistic encryption , cryptography , multiple encryption , on the fly encryption , disk encryption , client side encryption , 40 bit encryption , hash function , 56 bit encryption , theoretical computer science
As the trading of information over the open systems and internet is quickly developing, security of theinformation turns into a major concern. One conceivable answer for this issue is to encode the information.Chaos has been generally utilized for image encryption for its diverse elements. There are numerous chaoticbased encryption procedures for information concealing like validation, hashing, cryptography have beencreated and are in practice nowadays. This paper moreover investigates the properties of various mappingtechniques that stretches out to the execution parameters utilized as a part of encryption forms. Every one ofthe strategies checked on appeared inside the most recent years and are observed to be valuable for thepresent day encryption applications. Every system is one of a kind in its own specific manner, which may bereasonable for various applications. Over the long haul, new encryption strategies are advancing. Hence,quick and secure traditional encryption systems will be required in applications requiring high rate ofsecurity.