Image Encryption Techniques using Fractal Geometry: A Comparative Study
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: Data security has become an important issue in recent times. Confidential data needs to be protected from unauthorized users. Various image encryption techniques have been proposed for the secure transmission of images to protect the authenticity, integrity and confidentiality of images. Fractal images can be used as a strong key for the encryption due to the random and chaotic nature of fractals. The infinite boundaries of fractals provide highly complex structure that leads to confusion and it becomes a tedious task for an unauthenticated user to crack the exact secret fractal key. In this paper, a review of various techniques used for image encryption using fractal geometry has been illustrated. All these techniques have their own advantages and disadvantages in terms of execution time, key generation time and Peak Signal to Noise Ratio.
Authors and Affiliations
Swati Gupta , Nishu Bansal
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
In organizations sensitive data transaction is having less security because there may be a misusability of data from one to other from past years. In previous methods they calculated how much data is leaked...
Influence of Socioeconomic Status and Expectations among Completely Edentulous Patients on Conventional Complete Denture Treatment
Objective: The purpose of this study was to determine the effect of socioeconomic status on patient expectation from the treatment through a Questionnaire based survey. Material and Method: The Present study was conducte...
Image Based Authentication for Folder Security using Persuasive Cued Click-Points and SHA
Abstract: In this paper Image Based Authentication application is applied on folder’s (folders that are confidential to user) ,since the studies till date have shown that textual passwords are more prone that the...
Monitoring Wireless Sensor Network using Android based Smart Phone Application
Abstract: Wireless Sensor Network application’s is use in detection of natural calamities like forest fire detection, flood detection, , earth quick early detection ,snow detection, traffic congestion and various o...
An Enhanced Authentication System Using Face and Fingerprint Technologies
Abstract: The primary aim of this paper is to develop an enhanced authentication system using a CascadedLink Feed-Forward Neural Networks. In the end, the system overcomes some limitations of face recognition and fingerp...