Abstract
In the face of an adversary, cryptography is a matter of coordination. It addresses a variety of topics such as confidentiality, authentication, and several vital distributions. Modern cryptography offers the framework for knowing precisely what these concerns are, how to test protocols intended to address them, and how to create protocols that you can trust in their protection. Advanced computer technology can access multimedia easily. Multimedia technologies have recently become popular in operation, and multimedia data protection has become the key concern. In this correspondence, the fundamental problems related to the problem of cryptography were addressed, and surveys of imaging strategies focused on disorderly schemes were also discussed. The chaotic cryptography of images can be accomplished with chaos properties, including deterministic dynamics, unpredictable action, and nonlinear transformation. This definition contributes to approaches that can simultaneously provide protection functionality and an overall visual check that might be acceptable for such applications. In different implementations, including military, legal, and medical processes, digital photographs are commonly used. These applications must monitor the access to images and include ways of checking the accuracy of images. In this paper, a detailed review of chaotic Scheme-based image encryption techniques is presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Stinson DR, Paterson M (2018) Cryptography: theory and practice. CRC Press
Fridrich J (1997) Image encryption based on chaotic maps. In: 1997 IEEE international conference on systems, man, and cybernetics. Computational cybernetics and simulation, vol 2. IEEE, pp 1105–1110
Yang G, Jan MA, Rehman AU, Babar M, Aimal MM, Verma S (2020) Interoperability and data storage in internet of multimedia things: investigating current trends, research challenges and future directions. IEEE Access 8:124382–124401
Sobhy MI, Shehata AE (2001) Methods of attacking chaotic encryption and countermeasures. In: 2001 IEEE international conference on acoustics, speech, and signal processing. Proceedings (Cat. No. 01CH37221), vol. 2. IEEE, pp 1001–1004
Belkhouche F, Qidwai U (2003) Binary image encoding using 1D chaotic maps. In: Annual technical conference IEEE region 5. IEEE, pp 39–43
Ghosh G, Verma S, Jhanjhi NZ, Talib MN (2020) Secure surveillance system using chaotic image encryption technique. In: IOP conference series: materials science and engineering, vol 993, no 1. IOP Publishing, p 012062
Ahmad M, Zaman N, Jung LT, Ilyas M, Rohaya DA (2014) An integrated approach for medical image enhancement using wavelet transforms and image filtering. Life Sci J 11(6):445–449
Kumar S, Shanker R, Verma S (2018) Context aware dynamic permission model: a retrospect of privacy and security in android system. In: 2018 international conference on intelligent circuits and systems (ICICS). IEEE, pp 324–329
Vijayalakshmi B, Ramar K, Jhanjhi NZ, Verma S, Kaliappan M, Vijayalakshmi K, Ghosh U (2021) An attention-based deep learning model for traffic flow prediction using spatiotemporal features towards sustainable smart city. Int J Commun Syst 34(3):e4609
Kaur M, Kumar V (2018) Colour image encryption technique using differential evolution in non-subsampled contourlet transform domain. IET Image Proc 12(7):1273–1283
He J, Huang S, Tang S, Huang J (2018) JPEG image encryption with improved format compatibility and file size preservation. IEEE Trans Multimedia 20(10):2645–2658
Ghosh G, Sood M, Verma S (2020) Internet of things based video surveillance systems for security applications. J Comput Theor Nanosci 17(6):2582–2588
Yen JC, Guo JI (2000) A new chaotic mirror-like image encryption algorithm and its VLSI architecture. Pattern Recogn Image Anal (Adv Math Theory Appl) 10(2):236–247
Guo JI (2000) A new chaotic key-based design for image encryption and decryption. In: 2000 IEEE international symposium on circuits and systems (ISCAS), vol 4. IEEE, pp 49–52
Sinha A, Singh K (2003) A technique for image encryption using digital signature. Optics Commun 218(4–6):229–234
Shin CM, Seo DH, Cho KB, Lee HW, Kim SJ (2003) Multilevel image encryption by binary phase XOR operations. In: CLEO/Pacific Rim 2003. The 5th pacific rim conference on lasers and electro-optics (IEEE Cat. No. 03TH8671), vol 2. IEEE, p 426
Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61
Huang R, Rhee KH, Uchida S (2014) A parallel image encryption method based on compressive sensing. Multimedia Tools Appl 72(1):71–93
Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear–non-linear coupled map lattice. Inf Sci 273:329–351
Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ghosh, G., Anand, D., Kavita, Verma, S., Jhanjhi, N.Z., Talib, M.N. (2021). A Review on Chaotic Scheme-Based Image Encryption Techniques. In: Peng, SL., Hsieh, SY., Gopalakrishnan, S., Duraisamy, B. (eds) Intelligent Computing and Innovation on Data Science. Lecture Notes in Networks and Systems, vol 248. Springer, Singapore. https://doi.org/10.1007/978-981-16-3153-5_50
Download citation
DOI: https://doi.org/10.1007/978-981-16-3153-5_50
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-3152-8
Online ISBN: 978-981-16-3153-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)