ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Encryption algorithms using chebyshev chaotic map: a survey

Journal: International Journal of Innovative Research & Growth (Vol.11, No. 1)

Publication Date:

Authors : ;

Page : 17-19

Keywords : Encryption; Decryption; Chebyshev chaotic map; Chaotic map; Image Encryption.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Nowadays the use of Internet is increasing exponentially. Most of the people use Internet for running social media apps and websites. People use these social media apps to share images and videos. These images and videos contain personal information of the user and needs to be protected. Several encryption algorithms have been developed to maintain the privacy and security of the user. This work describes the various encryption algorithms based on Chebyshev chaotic map. By using this work, researchers can get a detailed overview of Chebyshev chaotic map in different encryption algorithms.

Last modified: 2023-02-05 22:05:20