Implementation of Chaotic based Image Encryption Algorithm with the application of Bhramgupta-Bhaskara equation
Journal: International Journal of Engineering and Technical Research (www.erpublication.org) (Vol.1, No. 3)Publication Date: 2013-05-31
Authors : Sanjay.R.chaudhari; Himanshu Arora; Dipak Dembla;
Page : 5-8
Keywords : erpublication; IJETR;
Abstract
Cryptography is just about presence of an adversary. It encompasses many problems like encryption, authentication, and key distribution to name a few. The field of modern cryptography provides a theoretical foundation based on which one can understand what exactly these problems are, how to evaluate algorithm that purport to solve them and how to build algorithm in whose security one can have confidence. Advanced digital technologies have made multimedia data widely available. Recently, multimedia applications become common in practice and thus security of multimedia data has become main concern. The basic issues pertaining to the problem of encryption has been discussed and also a survey on image encryption techniques based on chaotic schemes has been dealt in the present communication. The chaotic image encryption can be developed by using properties of chaos including deterministic dynamics, unpredictable behavior and non-linear transform. [3].Generally chaotic based cryptography is not suitable for practical application [1][3]. It does not secure algorithm due to dependency of initial condition, which can be easily broken. So this algorithm optimize by using (Brahmagupta-Bhaskara) equation for finding out the roots of pixel values. This gives unique values for different pixels. This concept leads to techniques that can simultaneously provide security functions and an overall visual check, which might be suitable in some applications. Digital images are widely used in various applications, that include military, legal and medical systems and these applications need to control access to images and provide the means to verify integrity of images [3]. This algorithm proved insecure against plain-text attack by brute force way of an attack [3].this problem subsequently resolve in [10].
Other Latest Articles
- STUDY OF DIFFERENTIAL BEVEL GEAR THROUGH MACHINING METHOD
- Study of Architectural Design of VLSI
- Comparative Study of Dispersion between Conventional PCF and Honeycomb PCF
- Design and Implementation of µc/Os II Based Embedded System Using ARM Controller
- Engineering for a Changing World: Future of Engineering Practice, Research, & Education
Last modified: 2017-06-24 19:23:37