Image Encryption Techniques using Fractal Geometry: A Comparative Study
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: Data security has become an important issue in recent times. Confidential data needs to be protected from unauthorized users. Various image encryption techniques have been proposed for the secure transmission of images to protect the authenticity, integrity and confidentiality of images. Fractal images can be used as a strong key for the encryption due to the random and chaotic nature of fractals. The infinite boundaries of fractals provide highly complex structure that leads to confusion and it becomes a tedious task for an unauthenticated user to crack the exact secret fractal key. In this paper, a review of various techniques used for image encryption using fractal geometry has been illustrated. All these techniques have their own advantages and disadvantages in terms of execution time, key generation time and Peak Signal to Noise Ratio.
Authors and Affiliations
Swati Gupta , Nishu Bansal
Charge Pump Phase Locked Loop Synchronization Technique in Grid Connected Solar Photovoltaic Systems
In this paper, an attempt to design and simulate charge pump phase locked loop method of synchronization in grid connected solar photovoltaic system has been made. Delivery of power with high quality to t...
Recommender Systems to Address New User Cold-Start Problem with User Side Information
Abstract: Due to exponential growth of Internet, users are facing the problem of Information overloading. Recommender Systems (RS) serve as an indispensible tool to solve information overloading problem. Due totheir grea...
A Secure and Efficient Two-Server Password Only Authenticated Key Exchange
Abstract: Password-authenticated key exchange (PAKE) is an authentication mechanism where a client and a server who share a password and authenticate each other with that password and hence both will agree on a cry...
A Hierarchical Clustering Algorithm Based Computer Aided Molecular Modeling with Haematoxylin & Eosin Images of Colon Cancer
Color Image segmentation plays a crucial role in many medical imaging applications. In this paper we present a novel algorithm for computer aided molecular modeling in MATLAB R2012, a real time simulation e...
Improved Data Sharing Security with Dual-MAC Address Verification and SHCS
Abstract: For the easy and secure sharing of an unknown private data, an algorithm is developed. The proposed algorithm has improved the data sharing security with MAC address and SHCS verifications. This technique...