Review on 3D Chaotic Map Encryption and Data Hiding Technique

Provided by: Auricle Technologies
Topic: Security
Format: PDF
Transmission of important data like text, images, video, etc. over the internet is increases now-a-days, hence it's necessary to use of secure methods for multimedia data. Image encryption is most secure than other multimedia components encryption because some inherent properties, such as huge data capacity and high correlation between pixels. The older encryption techniques such as AES, DES and RTS are not suitable for highly secure data transmission on wireless media. Thus the authors combine the chaotic theory and cryptography to form a valuable technique for information security.

Find By Topic