DocumentCode
3582136
Title
Image encryption technique based on chaotic system and hash function
Author
Mishra, Manish ; Pandit, Shraddha
Author_Institution
ICOT, Bhopal, India
fYear
2014
Firstpage
63
Lastpage
67
Abstract
Internet is an extensively used medium to share information in the form of text, audio, videos and images. Sharing of information in a large network at a long distance demands security to protect the information from unauthorized access. Network security plays an essential role in securing the information on an unreliable network. For securing the data on network, many encryption schemes have been found out and new innovative encryption schemes has been in demand because e-commerce, e-banking and multimedia applications are being accessed on internet on daily basis. Recently, cryptographic coding techniques are mostly used in securing the information on an unreliable network from unauthorized access. Several cryptographic techniques have been found by the researchers for securing and safely transmitting the information on an unreliable network. Among all the cryptographic techniques Image Encryption techniques is widely used to share images on an unreliable network. The objective of this paper is to represent the few encryption techniques which is used for the encrypting the image on an unreliable network. This paper proposes a new encryption technique to encrypt the image. The proposed method encrypts the image using Chaotic System, Wavelet Transform, along with that the fingerprint of the image is created using Hash Function which is to be transmitted to the receiver. The proposed method along with the privacy also maintains integrity of the image.
Keywords
cryptography; data privacy; image processing; wavelet transforms; Internet; chaotic system; cryptographic coding technique; data security; encryption scheme; hash function; image encryption technique; image integrity; image privacy; information sharing; network security; wavelet transform; Chaotic communication; Encryption; Fingerprint recognition; Wavelet transforms; Chaotic System; Fingerprints; Hash Function; Image Encryption; Wavelet Transform;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Communication and Systems, 2014 International Conference on
Print_ISBN
978-1-4799-3671-7
Type
conf
DOI
10.1109/ICCCS.2014.7068169
Filename
7068169
Link To Document