Image Encryption Techniques using Fractal Geometry: A Comparative Study
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: Data security has become an important issue in recent times. Confidential data needs to be protected from unauthorized users. Various image encryption techniques have been proposed for the secure transmission of images to protect the authenticity, integrity and confidentiality of images. Fractal images can be used as a strong key for the encryption due to the random and chaotic nature of fractals. The infinite boundaries of fractals provide highly complex structure that leads to confusion and it becomes a tedious task for an unauthenticated user to crack the exact secret fractal key. In this paper, a review of various techniques used for image encryption using fractal geometry has been illustrated. All these techniques have their own advantages and disadvantages in terms of execution time, key generation time and Peak Signal to Noise Ratio.
Authors and Affiliations
Swati Gupta , Nishu Bansal
Reducing Energy Consumption with Dvfs for Real-Time Services in Cloud Computing
Abstract: Cloud computing has revolutionized the information technology industry by enabling elastic on demand provisioning of computing resources. The increase of Cloud computing has resulted in the organization of larg...
Web-Based System for Software Requirements Quality Analysis Using Case-Based Reasoning and Neural Network
The overall success of a software project depends on the quality of its software requirements specifications (SRS). Hence, it is very important to get the requirements correct from the onset of the project. This...
Algorithm for routing encrypted information in ad-hoc networkwith optimized gossip routing protocol using Bluetooth
Abstract: The paper describes an optimized gossip routing protocol between nodes in an ad-hoc network. Thebackbone of the application is based on an algorithm which is used for routing information in an ad-hocnetwo...
Resource-Diversity Tolerant: Resource Allocation in the Cloud Infrastructure Services
Abstract: The cloud offers data processing, data centers to process and preserve the transactional data of the clients. Dynamic capacity provisioning is promising approach for reducing energy consumption by dynamicallych...
The impact of using Gregorian calendar dates in systems that adapt localization: In the case of Ethiopia
Ethiopian calendar has 13 months in which 12 months have 30 days equal and the 13th month has 5 or 6 days length. Date is one of the inputs for web or desktop applications. Java Development Kit(JDK) and JodaTime Date Tim...