In the current scenario, the exchange of information over open network and internet have grown rapidly. Digital images constitute a major role in the multimedia communication. Hence their security becomes a major concern. The well-known solution for securing the data (in any form) is encryption. The traditional encryption techniques such as AES, DES, RSA, etc., exhibits a low level of security and significantly low level of resistance to the attacks. This problem can be overcome by chaotic image encryption techniques as they have a high level of randomness in key generation. This paper attempts to study various chaos-based image encryption algorithms and techniques and to compare their performance in various environments.
Chaos, Chaotic Maps, Cryptography, Encryption Techniques, Image Encryption, Secure Communication, Security
Bispecific antibody characterization by a combination of intact and site-specific/chain-specific LC/MS techniques.
Duivelshof BL, Beck A, Guillarme D, D'Atri V
Talanta. 2022; 236(): 122836
Hypoxia and Proton microbeam: Role of Gap Junction Intercellular Communication in Inducing Bystander Responses on Human Lung Cancer Cells and Normal Cells.
Autsavapromporn N, Kobayashi A, Liu C, Jaikang C, Ahmad TAT, Oikawa M, Konishi T
Radiation research. 2022; ():
Using the Automated Botanical Contact Device (ABCD) to Deliver Reproducible, Intermittent Touch Stimulation to Plants.
Fitzgerald C, Vens CS, Miller N, Barker R, Westphall M, Lombardino J, Miao J, Swanson SJ, Gilroy S
Methods in molecular biology (Clifton, N.J.). 2022; 2368(): 81-94
Super-Resolution Imaging of the Actin Cytoskeleton in Living Cells Using TIRF-SIM.
W├Âllert T, Langford GM
Methods in molecular biology (Clifton, N.J.). 2022; 2364(): 3-24
Assessment of structural brain changes in patients with type 2 diabetes mellitus using the MRI-based brain atrophy and lesion index.
Zhao H, Wang F, Luo GH, Lei H, Peng F, Ren QP, Chen W, Wu YF, Yin LC, Liu JC, Pan SN
Neural regeneration research. 2022; 17(3): 618-624