Approaches of Chaotic Image Encryption models in Enlightening Image Storage and Security systems
Journal: International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE) (Vol.10, No. 2)Publication Date: 2021-04-09
Authors : Pradheep Manisekaran Prachi Dhankhar Parveen Kumar;
Page : 997-1005
Keywords : Chaotic systems; Space-Time diagrams; KS entropy density; bifurcation diagram; Space-Amplitude diagram.;
Abstract
The present life scenario has become completely digital and intelligent in all aspects, including the way of communication, production methodologies, medical sciences and other entertainment domains. Out of all domains, communication plays a vital role in every human life and the same is valid for corporates who handle bulk amount of data to be transmitted. This may include a multimedia data transfer between defense authorities of various countries or between a commercial information sharing centers. Under these circumstances, such information is to be transmitted in a secured channel. Unfortunately, secured fiber optic or any other wired communication is highly expensive and not affordable for infinite number of users. Hence, most of the communications among people are only through wireless channels. Due to the tremendous developments in communication standards up to 5G, people prefer wireless communications to cover the whole part of the world. As the information is freely available to anyone in the form of electromagnetic waves, it is impossible to share privately through a common wireless network due to week encryption methodologies. Simultaneously key space is not abundant. This has been highly inspired to pursue research in a different direction to a greater degree and to develop the measurements of current cryptography protocols and procedures. Choosing a chaotic encryption domain has several compelling explanations as described here.
Other Latest Articles
- A Survey on Currency Identification System for Blind and Visually Impaired
- IoT Based Digital Wattmeter
- Security Awareness on Ransomware Threats Detection and their Protection Techniques
- Numerical Analysis of Unsteady Laminar Flow past a Pentagonal Obstacle
- Design and Implementation of Quantum half Adder and Full adder Using IBM Quantum Experience
Last modified: 2021-04-12 15:54:16