Abstract

Chaotic cryptography pronounces the use of chaos theory in specific physical dynamical systems working in chaotic system as measure of communication techniques and computation algorithms to accomplish dissimilar cryptographic tasks in a cryptographic system. We have reviewed some of the recent work on chaos-based cryptography in this piece of work. Cryptography methodologies are critically important for storage of secured media content and transmission over exposed systems, for example, the web. For high security, encryption is one the approach to guard the information from leakage. Image encryption is transformation of image to an inaccurate form so that it can be secured from unauthorized users. To explore application of encryption in time samples pattern, we have recommended a secured approach to code input signals by introducing a new encryption algorithm. The algorithm mechanism is such that the transmitter, an input signal was received and coded into a lengthier series of numbers. At the receiver, the coded signal by the transmitter was received and changed back into its original values. This was done based on the idea that the hidden input signal samples using a specific pattern, could only recoverable by a trusted receiver.

Highlights

  • Cryptography is the skill or art of securing data, the skill of analyzing and breaking secure communication is considered as cryptanalysis

  • Chaos hypothesis is the investigation of nonlinear dynamical frameworks that are display compelling affectability to starting conditions and have arbitrary like practices, founded by Edward Lorenz in 1963 [27], an impact which is prominently alluded to as the butterfly impact that has a definition: Does the fold of a butterfly's wings in Brazil set off a tornado in Texas? The fluttering wings speak to a little change in the starting state of the framework, which causes a bind of occasions prompting extensive scale phenomena

  • Chaotic systems are executed with deterministic Non-Linear Dynamical Systems (NLDS), having the capacity to deliver the deterministic pseudo-haphazardness needed in cryptography

Read more

Summary

INTRODUCTION

Information that can be read and implicit without any special procedures or method is termed as plaintext or clear text. The technique of concealing plaintext in order to hide its particular material is called encryption. The impression of encryption is to make a message incomprehensible, except to the receiver. Data encryption technology is used to benefit protection against loss, exploitation or alteration of private information. Encrypting plaintext results in indecipherable rubbish called cipher text. Encryption is used to guarantee the hidden information from anyone of concern not intended to, even those who can comprehend the encrypted data. The procedure of backsliding cipher text to its original plaintext is considered as decryption

Cryptography
Cryptography Algorithm
Conventional Cryptography
Case In Point
Encryption Methods
Public Key Cryptography
IMAGE ENCRYPTION
Classic Image Encryption
Public Key Image Encryption
Compression and Encryption
Selective Encryption
Chaos Theory And Cryptography
Digital Signature for Image Authentication
SECURITY ANALYSIS OF ENCRYPTED IMAGE
Statistical Analysis
Correlation Analysis
Chaos System
Chaos and Cryptography
Basic Properties of Chaotic Systems
Non-Linear Dynamical Systems (NLDS)
Connection between Chaos and Cryptography
Comparison of Chaotic and Cryptographic Properties
Review of Chaos Based Encryption Techniques
Architecture of Chaotic Image Cryptosystems
Selection of Right Chaotic Map
Chaotic Maps Used For Image Encryption
Chaotic Image Encryption
Review of Parameters for Existing Chaotic Encryption Schemes
2.10.1 The Chaotic Feature of Trigonometric Function and Its Use for Image Encryption, 2011
2.10.3 Cryptanalysis of a Multi-Chaotic Systems Based Image Cryptosystem, 2010
2.10.4 Image Encryption Based On Diffusion and Multiple Chaotic Maps, 2011
2.10.5 Image Encryption Based On the General Approach for Multiple Chaotic Systems, 2011
2.10.6 New Image Encryption Algorithm Based On Logistic Map and Hyper-Chaos, 2013
2.10.7 Digital Image Encryption Algorithm Based On Chaos and Improved DES, 2013
2.10.8 A Modified Image Encryption Scheme Based On 2D Chaotic Map, 2010
2.10.9 An Improved Image Encryption Algorithm Based On Chaotic System, 2009
A Novel Image Encryption Scheme Based On Dynamical Multiple Chaos And
2.11 Performance Parameters
Image Encryption Using Linear Congruential Generator
Image Encryption Using Chaotic Logistic Map
Proposed Work
Second Paper in Consideration (100)
Henon Map
Logistic Map
Confusion Stage
Diffusion Stage
Key Space Analysis
Key Sensitivity
3.2.10 Information Entropy Analysis
3.2.11 Peak Signal To Noise Ratio (PSNR)
Image Permutation Using Discretized Baker Map
Correlation of adjacent pixels
Key sensitivity analysis
Differential Analysis
Number of Pixel Change Rate (NPCR)
Entropy
IMPLEMENTATION
Hiding Samples in a random Signal
Coding Parameters
Test Bench
Findings
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call