Professional Documents
Culture Documents
Compre
Compre
Title
Slide 2
Slide 3
Contents page
Slide 4
Image Encryption
To secure information present in the image during transmission and storage
By changing pixel positions or by changing contents of pixels
Techniques used are cryptography, steganography, compression, digital watermarking etc
Slide 5
Chaotic Cryptography
Involves use of chaotic maps for generating confusion and diffusion
Chaotic maps are pseudo random no generators
o which can be used as a key in image encryption
Characterized by: unpredictability, ergodicity and initial value sensitivity
Slide 6
Slide 7
Challenges
o 1D chaotic maps have limited chaotic range and non-uniform data distribution of output chaotic
sequences
o MD maps are difficult to implement, as they have complex structure, multiple parameters, and high
computational cost
Slide 8
Challenges
o finding an image encryption algorithm with the following characteristics:
o low time complexity,
o low correlation between pixels in encrypted image,
o key sensitivity and
o entropy of the encrypted image
Slide 9
Challenges
Chaotic cryptography uses symmetric key and so Key distribution is a big challenge.
Authentication and integrity are very crucial especially in the case of medical images.
Slide 10
Literature Survey
Sl Authors & Contributions Enhancements Limitations
No Publication
. Year