logo

COMPARATIVE SYSTEM OF PRIVACY PRESERVING IMAGE BASED ENCRYPTION

Authors

  • Meenu Harikumar

    St.Joseph’s College of Engineering and Technology, Palai
    Author
  • Navya Sajeev

    St.Joseph’s College of Engineering and Technology, Palai
    Author
  • Sayoojya Saji

    St.Joseph’s College of Engineering and Technology, Palai
    Author
  • Sona Sunny

    St.Joseph’s College of Engineering and Technology, Palai
    Author
  • Prof.Thushara Sukumar

    St.Joseph’s College of Engineering and Technology, Palai
    Author

Abstract

Secure data transmission in the virtual world is becoming increasingly difficult. It is due to the activities of hackers on confidential and sensitive information. To avoid hacking at various levels, there exists a significant number of techniques for data transmission. Cryptography plays a significant role in transferring images securely. A secret key increases the security and complexity of the cryptographic algorithms. The proposed system, will compare the encryption algorithms such as Image Encryption Algorithm Based on Henon chaotic map and Image Encryption Algorithm Based on Logistic and Two-Dimensional Lorenz. This comparison will be performed based on time taken for data encryption and decryption, efficiency in terms of Correlation Coefficient Analysis, Key Sensitivity Analysis, Peak Signal to Noise Ratio(PSNR), Number of Pixels Change Rate(NPCR), Unified Average Changing Intensity(UACI) and Entropy. In this system, the image is an input to encryption to get the encrypted image and then input it to decryption to get the
original image. The system could be used for effective image data encryption and key generation, where sensitive and confidential
data needs to be transmit- ted along with the image.

Keywords:

Image Encryption, Cryptography, Henon Chaotic Map, Logistic and Two-Dimentional Lorenz
Views 7
Downloads 3

Published

16-07-2025

Issue

Section

Articles

How to Cite

[1]
M. Harikumar, N. Sajeev, S. Saji, S. Sunny, and P. Sukumar, “COMPARATIVE SYSTEM OF PRIVACY PRESERVING IMAGE BASED ENCRYPTION”, IJERA, vol. 3, no. 1, pp. 14–20, Jul. 2025, Accessed: Aug. 13, 2025. [Online]. Available: https://ijera.in/index.php/IJERA/article/view/15

Similar Articles

1-10 of 46

You may also start an advanced similarity search for this article.