Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A Review on Chaotic Scheme-Based Image Encryption Techniques

  • Conference paper
  • First Online:
Intelligent Computing and Innovation on Data Science

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 248))

  • 994 Accesses

Abstract

In the face of an adversary, cryptography is a matter of coordination. It addresses a variety of topics such as confidentiality, authentication, and several vital distributions. Modern cryptography offers the framework for knowing precisely what these concerns are, how to test protocols intended to address them, and how to create protocols that you can trust in their protection. Advanced computer technology can access multimedia easily. Multimedia technologies have recently become popular in operation, and multimedia data protection has become the key concern. In this correspondence, the fundamental problems related to the problem of cryptography were addressed, and surveys of imaging strategies focused on disorderly schemes were also discussed. The chaotic cryptography of images can be accomplished with chaos properties, including deterministic dynamics, unpredictable action, and nonlinear transformation. This definition contributes to approaches that can simultaneously provide protection functionality and an overall visual check that might be acceptable for such applications. In different implementations, including military, legal, and medical processes, digital photographs are commonly used. These applications must monitor the access to images and include ways of checking the accuracy of images. In this paper, a detailed review of chaotic Scheme-based image encryption techniques is presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Stinson DR, Paterson M (2018) Cryptography: theory and practice. CRC Press

    Book  Google Scholar 

  2. Fridrich J (1997) Image encryption based on chaotic maps. In: 1997 IEEE international conference on systems, man, and cybernetics. Computational cybernetics and simulation, vol 2. IEEE, pp 1105–1110

    Google Scholar 

  3. Yang G, Jan MA, Rehman AU, Babar M, Aimal MM, Verma S (2020) Interoperability and data storage in internet of multimedia things: investigating current trends, research challenges and future directions. IEEE Access 8:124382–124401

    Article  Google Scholar 

  4. Sobhy MI, Shehata AE (2001) Methods of attacking chaotic encryption and countermeasures. In: 2001 IEEE international conference on acoustics, speech, and signal processing. Proceedings (Cat. No. 01CH37221), vol. 2. IEEE, pp 1001–1004

    Google Scholar 

  5. Belkhouche F, Qidwai U (2003) Binary image encoding using 1D chaotic maps. In: Annual technical conference IEEE region 5. IEEE, pp 39–43

    Google Scholar 

  6. Ghosh G, Verma S, Jhanjhi NZ, Talib MN (2020) Secure surveillance system using chaotic image encryption technique. In: IOP conference series: materials science and engineering, vol 993, no 1. IOP Publishing, p 012062

    Google Scholar 

  7. Ahmad M, Zaman N, Jung LT, Ilyas M, Rohaya DA (2014) An integrated approach for medical image enhancement using wavelet transforms and image filtering. Life Sci J 11(6):445–449

    Google Scholar 

  8. Kumar S, Shanker R, Verma S (2018) Context aware dynamic permission model: a retrospect of privacy and security in android system. In: 2018 international conference on intelligent circuits and systems (ICICS). IEEE, pp 324–329

    Google Scholar 

  9. Vijayalakshmi B, Ramar K, Jhanjhi NZ, Verma S, Kaliappan M, Vijayalakshmi K, Ghosh U (2021) An attention-based deep learning model for traffic flow prediction using spatiotemporal features towards sustainable smart city. Int J Commun Syst 34(3):e4609

    Google Scholar 

  10. Kaur M, Kumar V (2018) Colour image encryption technique using differential evolution in non-subsampled contourlet transform domain. IET Image Proc 12(7):1273–1283

    Article  Google Scholar 

  11. He J, Huang S, Tang S, Huang J (2018) JPEG image encryption with improved format compatibility and file size preservation. IEEE Trans Multimedia 20(10):2645–2658

    Article  Google Scholar 

  12. Ghosh G, Sood M, Verma S (2020) Internet of things based video surveillance systems for security applications. J Comput Theor Nanosci 17(6):2582–2588

    Article  Google Scholar 

  13. Yen JC, Guo JI (2000) A new chaotic mirror-like image encryption algorithm and its VLSI architecture. Pattern Recogn Image Anal (Adv Math Theory Appl) 10(2):236–247

    Google Scholar 

  14. Guo JI (2000) A new chaotic key-based design for image encryption and decryption. In: 2000 IEEE international symposium on circuits and systems (ISCAS), vol 4. IEEE, pp 49–52

    Google Scholar 

  15. Sinha A, Singh K (2003) A technique for image encryption using digital signature. Optics Commun 218(4–6):229–234

    Article  Google Scholar 

  16. Shin CM, Seo DH, Cho KB, Lee HW, Kim SJ (2003) Multilevel image encryption by binary phase XOR operations. In: CLEO/Pacific Rim 2003. The 5th pacific rim conference on lasers and electro-optics (IEEE Cat. No. 03TH8671), vol 2. IEEE, p 426

    Google Scholar 

  17. Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61

    Article  Google Scholar 

  18. Huang R, Rhee KH, Uchida S (2014) A parallel image encryption method based on compressive sensing. Multimedia Tools Appl 72(1):71–93

    Article  Google Scholar 

  19. Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear–non-linear coupled map lattice. Inf Sci 273:329–351

    Article  Google Scholar 

  20. Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kavita .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ghosh, G., Anand, D., Kavita, Verma, S., Jhanjhi, N.Z., Talib, M.N. (2021). A Review on Chaotic Scheme-Based Image Encryption Techniques. In: Peng, SL., Hsieh, SY., Gopalakrishnan, S., Duraisamy, B. (eds) Intelligent Computing and Innovation on Data Science. Lecture Notes in Networks and Systems, vol 248. Springer, Singapore. https://doi.org/10.1007/978-981-16-3153-5_50

Download citation

Publish with us

Policies and ethics