You are on page 1of 2

Slide 1

Title

Slide 2

Course work data sheet

Slide 3

Contents page

Slide 4

Image Encryption
 To secure information present in the image during transmission and storage
 By changing pixel positions or by changing contents of pixels
 Techniques used are cryptography, steganography, compression, digital watermarking etc

Slide 5
Chaotic Cryptography
 Involves use of chaotic maps for generating confusion and diffusion
 Chaotic maps are pseudo random no generators
o which can be used as a key in image encryption
 Characterized by: unpredictability, ergodicity and initial value sensitivity

Slide 6

Slide 7
Challenges
o 1D chaotic maps have limited chaotic range and non-uniform data distribution of output chaotic
sequences
o MD maps are difficult to implement, as they have complex structure, multiple parameters, and high
computational cost

Slide 8
Challenges
o finding an image encryption algorithm with the following characteristics:
o low time complexity,
o low correlation between pixels in encrypted image,
o key sensitivity and
o entropy of the encrypted image

Slide 9
Challenges
Chaotic cryptography uses symmetric key and so Key distribution is a big challenge.
Authentication and integrity are very crucial especially in the case of medical images.

Slide 10
Literature Survey
Sl Authors & Contributions Enhancements Limitations
No Publication
. Year

1. Chanil Pak 1D Chaotic Combination of a. More complex than


et.al map 1D chaotic maps a 2D chaotic map
b. Each pixel depends
on the previous pixel
2. Chunyan 1D Chaotic Modified logistic Grayscale images are
Han map map considered

You might also like