COMPARATIVE SYSTEM OF PRIVACY PRESERVING IMAGE BASED ENCRYPTION
Abstract
Secure data transmission in the virtual world is becoming increasingly difficult. It is due to the activities of hackers on confidential and sensitive information. To avoid hacking at various levels, there exists a significant number of techniques for data transmission. Cryptography plays a significant role in transferring images securely. A secret key increases the security and complexity of the cryptographic algorithms. The proposed system, will compare the encryption algorithms such as Image Encryption Algorithm Based on Henon chaotic map and Image Encryption Algorithm Based on Logistic and Two-Dimensional Lorenz. This comparison will be performed based on time taken for data encryption and decryption, efficiency in terms of Correlation Coefficient Analysis, Key Sensitivity Analysis, Peak Signal to Noise Ratio(PSNR), Number of Pixels Change Rate(NPCR), Unified Average Changing Intensity(UACI) and Entropy. In this system, the image is an input to encryption to get the encrypted image and then input it to decryption to get the
original image. The system could be used for effective image data encryption and key generation, where sensitive and confidential
data needs to be transmit- ted along with the image.
Keywords:
Image Encryption, Cryptography, Henon Chaotic Map, Logistic and Two-Dimentional LorenzPublished
Issue
Section
License
Copyright (c) 2023 International Journal on Emerging Research Areas

This work is licensed under a Creative Commons Attribution 4.0 International License.
All published work in this journal is licensed under the Creative Commons Attribution 4.0 International License (CC BY 4.0). This license permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
How to Cite
Similar Articles
- Meenu Harikumar, Navya Sajeev, Sayoojya Saji, Sona Sunny, Prof Thushara Sukumar, COMPARATIVE SYSTEM OF PRIVACY PRESERVING IMAGE BASED ENCRYPTION , International Journal on Emerging Research Areas: Vol. 3 No. 1 (2023): IJERA
- Akil Saji, Sreeyuktha Ramesh, Aabel Jacob, Saumya Sadanadan, Rosmartina Shaju, Dr S N Kumar, Enhancing Image Security with Introduction to Blockchain , International Journal on Emerging Research Areas: Vol. 3 No. 1 (2023): IJERA
- Fr Jins Sebastian, Manu Tom Sebastian, Minnu Elsa Baby, Niya Mary Viby, Image Encryption Using Different Cryptographic Algorithms : A Survey Paper , International Journal on Emerging Research Areas: Vol. 3 No. 1 (2023): IJERA
- Aleena Joseph, Diya Paramesh G, Elza Mary Thomas, Gayathri V, Anu V Kottath, A Review on Comparison of VGG-16 and DenseNet algorithms for analysing brain tumor in MRI image , International Journal on Emerging Research Areas: Vol. 3 No. 1 (2023): IJERA
- Mekha Jose, Jocelyn Anthony, Jose V Joseph, Joshwa Thomas, Sharon Baby Thomas, A Review of Machine Learning and Deep Learning Approaches for Offensive Text Detection , International Journal on Emerging Research Areas: Vol. 4 No. 2 (2024): IJERA
- Anishamol Abraham, Niya Joseph, State-of-the-Art Techniques for Image Forgery Detection: A Review , International Journal on Emerging Research Areas: Vol. 3 No. 1 (2023): IJERA
- Parvathy S Kurup, Pranav P Nair, Sai Kishor, Aryan S Nair, Pranav P, Face Image Synthesis , International Journal on Emerging Research Areas: Vol. 4 No. 1 (2024): IJERA
- Athulya Anilkumar, Abhinav V V, Aneeta Shajan, Anjana S Nair, Bini M Issac, R Neenu, Image Descriptor For Visually Impaired , International Journal on Emerging Research Areas: Vol. 3 No. 1 (2023): IJERA
- Rintu Jose, Study on Separable Reversible Data Hiding in Encrypted Images , International Journal on Emerging Research Areas: Vol. 3 No. 1 (2023): IJERA
- Adhil Salim, Advaith Manoj, Alan Thomas Shaji, The Future of Encryption in the Face of Advancing Quantum Computing Technology , International Journal on Emerging Research Areas: Vol. 3 No. 1 (2023): IJERA
You may also start an advanced similarity search for this article.