DSpace logo

Please use this identifier to cite or link to this item: http://dspace.bits-pilani.ac.in:8080/jspui/xmlui/handle/123456789/8419
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRajput, Amitesh Singh-
dc.date.accessioned2023-01-10T03:54:09Z-
dc.date.available2023-01-10T03:54:09Z-
dc.date.issued2013-
dc.identifier.urihttps://ieeexplore.ieee.org/document/6637214-
dc.identifier.urihttp://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/8419-
dc.description.abstractThis paper is simply the gathering of recent developments in the field of image security and presents further improvements in the same field. Images are the most important utility of our life. They are used in many applications. There are two main goals of image security: image encryption and authentication. During the past years, several image encryption and authentication algorithms have been proposed. Image encryption techniques scramble the pixels of the image and decrease the correlation among the pixels, such that the encrypted image cannot be accessed by unauthorized user. Chaotic encryption method seems to be much better day by day. Chaotic encryption technique is the new way of cryptography. Many chaos-based encryption methods have been proposed in the last decade. This paper presents a survey of different chaotic image encryption schemes proposed in the last decade. The paper also presents different image encryption and authentication schemes and discusses the problems and resolution associated with them. Emphasizing the image security, the paper discusses a hybrid scheme for image encryption and authentication, such that further advances in the field of image security can be enhanced.en_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.subjectComputer Scienceen_US
dc.subjectImage encryptionen_US
dc.subjectImage Authenticationen_US
dc.subjectChaotic Schemesen_US
dc.titleTowards the growth of image encryption and authentication schemesen_US
dc.typeArticleen_US
Appears in Collections:Department of Computer Science and Information Systems

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.