Performance Analysis of Chaotic based Encryption Algorithm

Provided by: Creative Commons
Topic: Security
Format: PDF
As the image exchange in electronic way is rapidly growing, it is also important to protect the confidentiality of image from unauthorized access. This paper presents a chaotic scheme for image encryption. Illegal data access has become prevalent in communication networks. Recently, the use of chaotic signals for secure image transmission has shown significant growth in developing chaotic encryption and decryption algorithms. Chaotic maps have been widely used in the image encryption and decryption. Various chaos map based encryption and decryption algorithms are used but they are less secured.

Find By Topic