Fast Chaotic Encryption Using Circuits for Mobile and Cloud Computing: Investigations Under the Umbrella of Cryptography

Fast Chaotic Encryption Using Circuits for Mobile and Cloud Computing: Investigations Under the Umbrella of Cryptography

Shalini Stalin, Priti Maheshwary, Piyush Kumar Shukla, Akhilesh Tiwari, Ankur Khare
ISBN13: 9781799877059|ISBN10: 1799877051|EISBN13: 9781799877486
DOI: 10.4018/978-1-7998-7705-9.ch039
Cite Chapter Cite Chapter

MLA

Stalin, Shalini, et al. "Fast Chaotic Encryption Using Circuits for Mobile and Cloud Computing: Investigations Under the Umbrella of Cryptography." Research Anthology on Artificial Intelligence Applications in Security, edited by Information Resources Management Association, IGI Global, 2021, pp. 848-872. https://doi.org/10.4018/978-1-7998-7705-9.ch039

APA

Stalin, S., Maheshwary, P., Shukla, P. K., Tiwari, A., & Khare, A. (2021). Fast Chaotic Encryption Using Circuits for Mobile and Cloud Computing: Investigations Under the Umbrella of Cryptography. In I. Management Association (Ed.), Research Anthology on Artificial Intelligence Applications in Security (pp. 848-872). IGI Global. https://doi.org/10.4018/978-1-7998-7705-9.ch039

Chicago

Stalin, Shalini, et al. "Fast Chaotic Encryption Using Circuits for Mobile and Cloud Computing: Investigations Under the Umbrella of Cryptography." In Research Anthology on Artificial Intelligence Applications in Security, edited by Information Resources Management Association, 848-872. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-7705-9.ch039

Export Reference

Mendeley
Favorite

Abstract

In last few decades, a lot of work has been done in the field of cryptography; it is being considered one of the safe methods to protect data. It was first used to protect communication by individuals, armies, and organizational companies. With the help encryption method, anyone can protect their data from a third-party attack. Images are used in various areas like biometric authentication, medical science, military, etc., where they are being stored or transferred over the network and the safety of such images are very important. The newest movement in encryption is chaos-based, which is a better encryption technique than AES, DES, RSA, etc. It consists of different property such as sensitive independence on original situation, non-periodicity, non-convergence, etc. In recent times, many chaos-based image encryption algorithms have been proposed, but most of them are not sufficient to provide full protection to data. In this chapter, a survey of different chaos-based image encryption techniques is discussed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.