2015
DOI: 10.3923/ajsr.2015.359.366
|View full text |Cite
|
Sign up to set email alerts
|

Chain of Shuffling and Chaos: A Tied Encryptic Approach

Abstract: The intellectual growth of computer communication lead to drastic improvement in wireless technology and shrunken the world into palms of the user which paved the path for the security attack issues. The development of the security system became the ultimate. Popular technique widely used in present scenario that provides a better security to secret information is image encryption. Multiple encryption technique has been adopted in this study. The secret image is block shuffled and then chaotic maps such as bak… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2016
2016
2017
2017

Publication Types

Select...
5

Relationship

3
2

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…In this modern world, digital communication has wide range of applications for information security which could be classified as Steganography [5][6][7][8][9][10][11][12][13][14][15][16][17], Watermarking [2,6], Spread Spectrum [18][19][20][21][22] and Encryption [23][24][25][26][27][28][29][30][31][32][33][34][35].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…In this modern world, digital communication has wide range of applications for information security which could be classified as Steganography [5][6][7][8][9][10][11][12][13][14][15][16][17], Watermarking [2,6], Spread Spectrum [18][19][20][21][22] and Encryption [23][24][25][26][27][28][29][30][31][32][33][34][35].…”
Section: Introductionmentioning
confidence: 99%
“…Hence various techniques have been introduced to maintain the secrecy of the information transferred. The most popular technique thus used is image encryption [23][24][25][26][27][28][29][30][31][32][33][34][35].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Information hiding techniques [7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26] can be classified into reversible [20] and irreversible information hiding [21]. In irreversible technique, extraction of the message alone is concentrated leaving behind the cover.…”
Section: Introductionmentioning
confidence: 99%
“…Out of the various data hiding schemes, the encryption is the popular technique which is the process of modifying the secret data in such a manner that no one could read the data before decryption [17][18][19].…”
Section: Introductionmentioning
confidence: 99%