Open Access
Subscription Access
Open Access
Subscription Access
Analysis and Implementation of Optimized Image Encryption Algorithm Using Bhramgupta-Bhaskara Equation
Subscribe/Renew Journal
In today’s era advanced digital technologies have made multimedia data widely available. Recently, multimedia applications become common in practice and thus security of multimedia data has become main concern. The basic issues pertaining to the problem of encryption has been discussed and also a detailed analysis on image encryption techniques based on chaotic schemes has been dealt in the present communication. The chaotic image encryption can be developed by using properties of chaos including deterministic dynamics, unpredictable behavior and non-linear transform. Generally chaotic based cryptography is not suitable for practical application. It does not secure algorithm due to dependency of initial condition, which can be easily broken. This Algorithm is optimizing by B.B equation. Modern cryptography provides a theoretical foundation based on which one can understand what exactly these problems are, how to evaluate algorithm that purport to solve them and how to build algorithm in whose security one can have confidence. This concept leads to techniques that can simultaneously provide security functions and an overall visual check, which might be suitable in some applications. The performance is analyzed against different encryption algorithm such as A.E.S, D.E.S and X-OR, a regular well-behaved DSR network is used as a reference. The experimental results are being studied under DVPB-HD is a rapid development platform based on TITMS320DM6467 DaVinciTM Technology. Simulation experiments have been carried out in order to evaluate performance of proposed algorithm under different input images in (k.b).
This algorithm proved secure against brute-force and plain-text attack resolve in [10].
This algorithm proved secure against brute-force and plain-text attack resolve in [10].
Keywords
B-B Equation, Chaos, Cryptography, Image Encryption, Image Decryption.
User
Subscription
Login to verify subscription
Font Size
Information
Abstract Views: 265
PDF Views: 2