An experimental comparison of chaotic and non-chaotic image encryption schemes

Jawad Ahmad, Seong Oun Hwang, Ali Arshad

Research output: Contribution to journalArticle

31 Citations (Scopus)

Abstract

During last few years, transmission of digital multimedia data (images, audios and videos) over Internet, wireless cell phones, television broadcasting etc., has been significantly evolved. The provision of security to store and transmit data with confidentiality, integrity, and authentication for multimedia data over wireless medium is attaining importance these days. Over a few decades, a number of image encryption schemes have been implemented, each with various features, pros and cons. So there is a need to carry out security analysis of these schemes through some standard parameters. In this paper, an effort is being made for comparison of traditional encryption algorithms via some security parameters rather than using just visual inspection. Through these security parameters, one can determine a better and highly secure image encryption scheme. Comparative analysis of Advanced Encryption Standard, Compression Friendly Encryption Scheme, Chaotically Coupled Chaotic Map Encryption Scheme and a Bernoulli Map Based Encryption Scheme are done. Results are finally compiled to conclude the optimum scheme to be used feasibly with high security level.

Original languageEnglish
Pages (from-to)901-918
Number of pages18
JournalWireless Personal Communications
Volume84
Issue number2
DOIs
Publication statusPublished - 14 Sep 2015

Keywords

  • AES
  • CFES
  • chaos
  • image encryption
  • MCFES

Fingerprint Dive into the research topics of 'An experimental comparison of chaotic and non-chaotic image encryption schemes'. Together they form a unique fingerprint.

  • Cite this