International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 134 - Issue 10 |
Published: January 2016 |
Authors: Deepshikha Rathore, Anil Suryavanshi |
![]() |
Deepshikha Rathore, Anil Suryavanshi . A proficient Image Encryption using Chaotic Map Approach. International Journal of Computer Applications. 134, 10 (January 2016), 20-24. DOI=10.5120/ijca2016908122
@article{ 10.5120/ijca2016908122, author = { Deepshikha Rathore,Anil Suryavanshi }, title = { A proficient Image Encryption using Chaotic Map Approach }, journal = { International Journal of Computer Applications }, year = { 2016 }, volume = { 134 }, number = { 10 }, pages = { 20-24 }, doi = { 10.5120/ijca2016908122 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2016 %A Deepshikha Rathore %A Anil Suryavanshi %T A proficient Image Encryption using Chaotic Map Approach%T %J International Journal of Computer Applications %V 134 %N 10 %P 20-24 %R 10.5120/ijca2016908122 %I Foundation of Computer Science (FCS), NY, USA
Important information for general users, advanced data and multimedia, arts, entertainment, advertising, education, training and business sectors have, the faster and more digital and multimedia applications development are transmitted through the network that can be accessed by should not be. Therefore confidentiality, integrity, security, confidentiality, authenticity of the images as well as the issue of communication and storage of images has become an important issue for the defense. In recent years, the technology to protect confidential images are applied have developed various encryption and unauthorized users. Letter aspects and chaotic map based on a review of existing different image encryption technology. This paper introduces a general discussion of a technology for the first time to review and image encryption chaotic system and various chaotic image encryption technology based and related tasks. Finally, the main objective of this paper is designed to help new chaotic image encryption technology based on the future behavior of the current chaos-based image encryption algorithms studied.