Detailed Information

Cited 25 time in webofscience Cited 33 time in scopus
Metadata Downloads

An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes

Full metadata record
DC Field Value Language
dc.contributor.authorAhmad, Jawad-
dc.contributor.authorHwang, Seong Oun-
dc.contributor.authorAli, Arshad-
dc.date.available2020-07-10T07:01:27Z-
dc.date.created2020-07-06-
dc.date.issued2015-09-
dc.identifier.issn0929-6212-
dc.identifier.urihttps://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/9498-
dc.description.abstractDuring last few years, transmission of digital multimedia data (images, audios and videos) over Internet, wireless cell phones, television broadcasting etc., has been significantly evolved. The provision of security to store and transmit data with confidentiality, integrity, and authentication for multimedia data over wireless medium is attaining importance these days. Over a few decades, a number of image encryption schemes have been implemented, each with various features, pros and cons. So there is a need to carry out security analysis of these schemes through some standard parameters. In this paper, an effort is being made for comparison of traditional encryption algorithms via some security parameters rather than using just visual inspection. Through these security parameters, one can determine a better and highly secure image encryption scheme. Comparative analysis of Advanced Encryption Standard, Compression Friendly Encryption Scheme, Chaotically Coupled Chaotic Map Encryption Scheme and a Bernoulli Map Based Encryption Scheme are done. Results are finally compiled to conclude the optimum scheme to be used feasibly with high security level.-
dc.language영어-
dc.language.isoen-
dc.publisherSPRINGER-
dc.subjectWATERMARKING-
dc.titleAn Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes-
dc.typeArticle-
dc.contributor.affiliatedAuthorHwang, Seong Oun-
dc.identifier.doi10.1007/s11277-015-2667-9-
dc.identifier.scopusid2-s2.0-84938996446-
dc.identifier.wosid000359420800006-
dc.identifier.bibliographicCitationWIRELESS PERSONAL COMMUNICATIONS, v.84, no.2, pp.901 - 918-
dc.relation.isPartOfWIRELESS PERSONAL COMMUNICATIONS-
dc.citation.titleWIRELESS PERSONAL COMMUNICATIONS-
dc.citation.volume84-
dc.citation.number2-
dc.citation.startPage901-
dc.citation.endPage918-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusWATERMARKING-
dc.subject.keywordAuthorChaos-
dc.subject.keywordAuthorAES-
dc.subject.keywordAuthorCFES-
dc.subject.keywordAuthorMCFES-
dc.subject.keywordAuthorImage encryption-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Science and Technology > Department of Computer and Information Communications Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE