Loading [a11y]/accessibility-menu.js
Chaos based image encryption using two step iterated logistic map | IEEE Conference Publication | IEEE Xplore

Chaos based image encryption using two step iterated logistic map


Abstract:

Information is sent over internet very frequently. Images are one of the major sources of information growing over internet. Images may contain sensitive information. So,...Show More

Abstract:

Information is sent over internet very frequently. Images are one of the major sources of information growing over internet. Images may contain sensitive information. So, security of images is major issue. Cryptography is one of the major techniques for security of images. Because of various features of Chaos it is used in encryption process. Different techniques of image encryption based on chaos defined. Multiple iterations are used by encryption algorithms mostly. There is need to design an image encryption algorithm which encrypts the image in single scan and uses proper mix of confusion and diffusion. The proposed image encryption technique uses the two step iterative logistic map. It uses large key space. The result comes out through experiment show that the proposed system has better security and performance respective to other techniques.
Date of Conference: 23-25 December 2016
Date Added to IEEE Xplore: 08 June 2017
ISBN Information:
Print ISSN: 5090-2806
Conference Location: Jaipur, India

References

References is not available for this document.