Image Encryption Techniques using Fractal Geometry: A Comparative Study
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: Data security has become an important issue in recent times. Confidential data needs to be protected from unauthorized users. Various image encryption techniques have been proposed for the secure transmission of images to protect the authenticity, integrity and confidentiality of images. Fractal images can be used as a strong key for the encryption due to the random and chaotic nature of fractals. The infinite boundaries of fractals provide highly complex structure that leads to confusion and it becomes a tedious task for an unauthenticated user to crack the exact secret fractal key. In this paper, a review of various techniques used for image encryption using fractal geometry has been illustrated. All these techniques have their own advantages and disadvantages in terms of execution time, key generation time and Peak Signal to Noise Ratio.
Authors and Affiliations
Swati Gupta , Nishu Bansal
Investigating DHCP and DNS Protocols Using Wireshark
For different computers to communicate on the same network or on different networks they need to know one another’s IP address or MAC address. Involving the IP address and MAC address has led to a challenging task for a...
Energy Efficiency in IEEE 802.11 standard WLAN through MWTPP
The main goal of this work is to achieve the energy efficiency in 802.11 WLAN through minimizing the energy consumption in the network. In this proposed study, we introduced a modification in PCF for enhancing...
Estimation Theory
Extracting Repitative Patterns from Fuzzy Temporal Data
Abstract: Association rules mining from temporal dataset is to find associations between items that hold within certain time frame but not throughout the dataset. This problem involves first discovering frequent itemsets...
A Novel Approach for intrusion Detection in Heterogeneous Wireless Sensor Networks using multipath Routing
Abstract: The key concept of my redundancy management is to exploit the tradeoff between energy consumption vs. to the gain of reliability, timeliness, and also security for maximizing the system useful lifetime...