Image Encryption Techniques using Fractal Geometry: A Comparative Study

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5

Abstract

Abstract: Data security has become an important issue in recent times. Confidential data needs to be protected from unauthorized users. Various image encryption techniques have been proposed for the secure transmission of images to protect the authenticity, integrity and confidentiality of images. Fractal images can be used as a strong key for the encryption due to the random and chaotic nature of fractals. The infinite boundaries of fractals provide highly complex structure that leads to confusion and it becomes a tedious task for an unauthenticated user to crack the exact secret fractal key. In this paper, a review of various techniques used for image encryption using fractal geometry has been illustrated. All these techniques have their own advantages and disadvantages in terms of execution time, key generation time and Peak Signal to Noise Ratio.

Authors and Affiliations

Swati Gupta , Nishu Bansal

Keywords

Related Articles

 Investigating DHCP and DNS Protocols Using Wireshark

For different computers to communicate on the same network or on different networks they need to know one another’s IP address or MAC address. Involving the IP address and MAC address has led to a challenging task for a...

 Energy Efficiency in IEEE 802.11 standard WLAN through  MWTPP

 The main goal of this work is to achieve the energy efficiency in 802.11 WLAN through minimizing the energy consumption in the network. In this proposed study, we introduced a modification in PCF for enhancing...

Extracting Repitative Patterns from Fuzzy Temporal Data

Abstract: Association rules mining from temporal dataset is to find associations between items that hold within certain time frame but not throughout the dataset. This problem involves first discovering frequent itemsets...

 A Novel Approach for intrusion Detection in Heterogeneous Wireless Sensor Networks using multipath Routing

 Abstract: The key concept of my redundancy management is to exploit the tradeoff between energy consumption vs. to the gain of reliability, timeliness, and also security for maximizing the system useful lifetime...

Download PDF file
  • EP ID EP147573
  • DOI 10.9790/0661-16513135
  • Views 124
  • Downloads 0

How To Cite

Swati Gupta, Nishu Bansal (2014).  Image Encryption Techniques using Fractal Geometry: A Comparative Study. IOSR Journals (IOSR Journal of Computer Engineering), 16(5), 31-35. https://europub.co.uk/articles/-A-147573