2021
DOI: 10.1088/1742-6596/1818/1/012086
|View full text |Cite
|
Sign up to set email alerts
|

Robust Encryption System Based Watermarking Theory by Using Chaotic Algorithms: A Reviewer Paper

Abstract: In the previous decade, the mixing between chaotic supposition and cryptography frames considers a significant field of data security. Chaos-based image encryption is given a lot of attention in the exploration of data security moreover a great deal of picture encrypting calculations have been proposed concerning chaotic maps. Because of some inveterate highlights of media like information limit and high information excess, the encryption of images not quite the same as that of texts; accordingly it is hard to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 53 publications
0
1
0
Order By: Relevance
“…Turbulent way of behaving, in this specific circumstance, alludes to a framework that is profoundly delicate to starting circumstances, shows aperiodic and flighty directions, and displays a specific level of haphazardness. Tumultuous guides have tracked down applications in different logical and designing fields, including cryptography, picture handling, and arbitrary number age [13]. Table (1) shows chaotic maps.…”
Section: Chaotic Systemsmentioning
confidence: 99%
“…Turbulent way of behaving, in this specific circumstance, alludes to a framework that is profoundly delicate to starting circumstances, shows aperiodic and flighty directions, and displays a specific level of haphazardness. Tumultuous guides have tracked down applications in different logical and designing fields, including cryptography, picture handling, and arbitrary number age [13]. Table (1) shows chaotic maps.…”
Section: Chaotic Systemsmentioning
confidence: 99%