Image Encryption Techniques using Fractal Geometry: A Comparative Study
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: Data security has become an important issue in recent times. Confidential data needs to be protected from unauthorized users. Various image encryption techniques have been proposed for the secure transmission of images to protect the authenticity, integrity and confidentiality of images. Fractal images can be used as a strong key for the encryption due to the random and chaotic nature of fractals. The infinite boundaries of fractals provide highly complex structure that leads to confusion and it becomes a tedious task for an unauthenticated user to crack the exact secret fractal key. In this paper, a review of various techniques used for image encryption using fractal geometry has been illustrated. All these techniques have their own advantages and disadvantages in terms of execution time, key generation time and Peak Signal to Noise Ratio.
Authors and Affiliations
Swati Gupta , Nishu Bansal
Performance Analysis for Audio Streaming in Cloud
Abstract: Audio streaming has been a major application, which has become popular in past few years especially amongst youth both in professional and personal lives. Various organizations to develop and deploythei...
Scalable Schedule Routing and Minimizing Delay in Tolerant Networks
There are many routing strategies for message delivery in Delay Tolerant Networks. Among them Multicopying routing strategies have been considered the most applicable DTNs. Epidemic routing and two-hop forwarding r...
Critical Path Method in the Network Analysis with Parametric Fuzzy Activity
In this paper, a method is presented to find fuzzy critical path using parametric interval valued function. Here network model has been developed in fuzzy environment. All activities are considered as a Trapezoidal fuzzy...
Data Protection Based On Dynamic Encryption for Secure Cloud Computing
Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared poo...
Adaptive Shared Channel Assignment Scheme for CellularNetwork to Improve the Quality of the Handoff Calls
Abstract: In this paper, an adaptive channel assignment scheme is proposed to ensure the quality of servicesfor the wireless networks. The proposed scheme divides the channels into two categories, the guard channel...