• Tidak ada hasil yang ditemukan

A Review on Chaotic Scheme-Based Image Encryption Techniques

N/A
N/A
Nguyễn Gia Hào

Academic year: 2023

Membagikan "A Review on Chaotic Scheme-Based Image Encryption Techniques"

Copied!
3
0
0

Teks penuh

(1)

A Review on Chaotic Scheme-Based Image Encryption Techniques

Gopal Ghosh, Divya Anand, Kavita, Sahil Verma, N. Z. Jhanjhi, and M. N. Talib

Abstract In the face of an adversary, cryptography is a matter of coordination. It addresses a variety of topics such as con

dentiality, authentication, and several vital distributions. Modern cryptography offers the framework for knowing precisely what these concerns are, how to test protocols intended to address them, and how to create protocols that you can trust in their protection. Advanced computer tech- nology can access multimedia easily. Multimedia technologies have recently become popular in operation, and multimedia data protection has become the key concern. In this correspondence, the fundamental problems related to the problem of cryptography were addressed, and surveys of imaging strategies focused on disorderly schemes were also discussed. The chaotic cryptography of images can be accomplished with chaos properties, including deterministic dynamics, unpre- dictable action, and nonlinear transformation. This de

nition contributes to approaches that can simultaneously provide protection functionality and an overall visual check that might be acceptable for such applications. In different imple- mentations, including military, legal, and medical processes, digital photographs are commonly used. These applications must monitor the access to images and include ways of checking the accuracy of images. In this paper, a detailed review of chaotic Scheme-based image encryption techniques is presented.

G. GhoshD. Anand

School of Computer Science and Engineering, Lovely Professional University, Phagwara, India

Kavita (&)S. Verma

Department of Computer Science and Engineering, Chandigarh University, Mohali, India e-mail:kavita@ieee.org

S. Verma

e-mail:sahilverma@ieee.org N. Z. Jhanjhi

School of Computer Science and Engineering, Taylor’s University, Subang Jaya, Malaysia e-mail:NoorZaman.Jhanjhi@taylors.edu.my

M. N. Talib

Papua New Guinea University of Technology, Lae, Papua New Guinea e-mail:muhammad.talib@pnguot.ac.pg

©The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 S.-L. Peng et al. (eds.),Intelligent Computing and Innovation on Data Science, Lecture Notes in Networks and Systems 248,

https://doi.org/10.1007/978-981-16-3153-5_50

473

(2)

7 Conclusion

The current vast number of encryption techniques have been addressed in this paper. The initial survey

s emphasis was on the already developed image encryp- tion algorithms; however, the best way to secure multimedia data such as images and video is with the naive algorithm, encrypting the entire multimedia bit series using a standard cipher method. Many previous and current works aim at crypto- graphic operations that encrypt only a carefully selected portion of the picture bitstream to ensure a high-security standard. Many of the systems evaluated were only able to attain a moderate to low degree of safety, where systems under which partial failure is likely may be established. However, such techniques provide only super

cial security in certain media implementations. There have been numerous proposed measures aimed at chaotic networks. The problem was slightly illustrated in section three of the survey report. Particular emphasis should be made on a cryptosystem that is well studied, quick, and secure.

References

1. Stinson DR, Paterson M (2018) Cryptography: theory and practice. CRC Press

2. Fridrich J (1997) Image encryption based on chaotic maps. In: 1997 IEEE international conference on systems, man, and cybernetics. Computational cybernetics and simulation, vol 2. IEEE, pp 1105–1110

3. Yang G, Jan MA, Rehman AU, Babar M, Aimal MM, Verma S (2020) Interoperability and data storage in internet of multimedia things: investigating current trends, research challenges and future directions. IEEE Access 8:124382–124401

4. Sobhy MI, Shehata AE (2001) Methods of attacking chaotic encryption and countermeasures.

In: 2001 IEEE international conference on acoustics, speech, and signal processing.

Proceedings (Cat. No. 01CH37221), vol. 2. IEEE, pp 1001–1004

5. Belkhouche F, Qidwai U (2003) Binary image encoding using 1D chaotic maps. In: Annual technical conference IEEE region 5. IEEE, pp 39–43

6. Ghosh G, Verma S, Jhanjhi NZ, Talib MN (2020) Secure surveillance system using chaotic image encryption technique. In: IOP conference series: materials science and engineering, vol 993, no 1. IOP Publishing, p 012062

7. Ahmad M, Zaman N, Jung LT, Ilyas M, Rohaya DA (2014) An integrated approach for medical image enhancement using wavelet transforms and image filtering. Life Sci J 11 (6):445–449

8. Kumar S, Shanker R, Verma S (2018) Context aware dynamic permission model: a retrospect of privacy and security in android system. In: 2018 international conference on intelligent circuits and systems (ICICS). IEEE, pp 324–329

9. Vijayalakshmi B, Ramar K, Jhanjhi NZ, Verma S, Kaliappan M, Vijayalakshmi K, Ghosh U (2021) An attention-based deep learning model for trafficflow prediction using spatiotem- poral features towards sustainable smart city. Int J Commun Syst 34(3):e4609

10. Kaur M, Kumar V (2018) Colour image encryption technique using differential evolution in non-subsampled contourlet transform domain. IET Image Proc 12(7):1273–1283

11. He J, Huang S, Tang S, Huang J (2018) JPEG image encryption with improved format compatibility andfile size preservation. IEEE Trans Multimedia 20(10):2645–2658

480 G. Ghosh et al.

(3)

12. Ghosh G, Sood M, Verma S (2020) Internet of things based video surveillance systems for security applications. J Comput Theor Nanosci 17(6):2582–2588

13. Yen JC, Guo JI (2000) A new chaotic mirror-like image encryption algorithm and its VLSI architecture. Pattern Recogn Image Anal (Adv Math Theory Appl) 10(2):236–247 14. Guo JI (2000) A new chaotic key-based design for image encryption and decryption. In: 2000

IEEE international symposium on circuits and systems (ISCAS), vol 4. IEEE, pp 49–52 15. Sinha A, Singh K (2003) A technique for image encryption using digital signature. Optics

Commun 218(4–6):229–234

16. Shin CM, Seo DH, Cho KB, Lee HW, Kim SJ (2003) Multilevel image encryption by binary phase XOR operations. In: CLEO/Pacific Rim 2003. The 5th pacific rim conference on lasers and electro-optics (IEEE Cat. No. 03TH8671), vol 2. IEEE, p 426

17. Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61

18. Huang R, Rhee KH, Uchida S (2014) A parallel image encryption method based on compressive sensing. Multimedia Tools Appl 72(1):71–93

19. Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear–non-linear coupled map lattice. Inf Sci 273:329–351

20. Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25

A Review on Chaotic Scheme-Based Image Encryption Techniques 481

Referensi

Dokumen terkait

Integrated with Course Scheduling Information System", IOP Conference Series: Materials Science and Engineering,