keyboard_arrow_up
Comprehensive Performance Analysis of Chaotic Colour Image Encryption Algorithms Based on its Cryptographic Requirements

Authors

K.S.Tamilkodi and N.Rama, Presidency College, India

Abstract

As we live and revel in a digital age, the day to day transmission of multimedia data over the internet is beyond our imaginations. Consequently, the increased risk of losing or altering the data during transit is more. Protection of this multimedia data (audio/speech, image, and video) becomes one of the major security concerns, because millions of Internet users worldwide, are infringing digital rights daily, by downloading multimedia content illegally from the Internet. The image protection is very important, as the image transmission covers the highest percentage of the multimedia data. Image encryption is one of the ways out to achieve this. Our world, built upon the concept of progression and advancement, has entered a new scientific realm known as Chaos theory. Chaotic encryption is one of the best alternative ways to ensure security. Many image encryption schemes using chaotic maps have been proposed, because of its extreme sensitivity to initial conditions, unpredictability and random like behaviors. Each one of them has its own strength and weakness. In this paper, some existing chaos based colour image encryption schemes are classified and analyzed with respect to various parameters like implementation, key management, security analysis and channel issues to fulfill some basic cryptographic requirements for chaos based image encryption algorithms from the year 2010 to 2014.

Keywords

Chaotic algorithms, Cryptography and Chaotic maps.

Full Text  Volume 5, Number 5