Visible to the public An Approach Towards Data Security Based on DCT and Chaotic Map

TitleAn Approach Towards Data Security Based on DCT and Chaotic Map
Publication TypeConference Paper
Year of Publication2022
AuthorsDebnath, Sristi, Kar, Nirmalya
Conference Name2022 2nd Asian Conference on Innovation in Technology (ASIANCON)
Keywordschaos theory, chaotic communication, chaotic cryptography, cryptography, data privacy, discrete cosine transform, Encryption, Metrics, pubcrawl, resilience, Resiliency, Robustness, Satellites, Scalability, steganography, Streaming media, Technological innovation
AbstractCurrently, the rapid development of digital communication and multimedia has made security an increasingly prominent issue of communicating, storing, and transmitting digital data such as images, audio, and video. Encryption techniques such as chaotic map based encryption can ensure high levels of security of data and have been used in many fields including medical science, military, and geographic satellite imagery. As a result, ensuring image data confidentiality, integrity, security, privacy, and authenticity while transferring and storing images over an unsecured network like the internet has become a high concern. There have been many encryption technologies proposed in recent years. This paper begins with a summary of cryptography and image encryption basics, followed by a discussion of different kinds of chaotic image encryption techniques and a literature review for each form of encryption. Finally, by examining the behaviour of numerous existing chaotic based image encryption algorithms, this paper hopes to build new chaotic based image encryption strategies in the future.
DOI10.1109/ASIANCON55314.2022.9908893
Citation Keydebnath_approach_2022