An experimental comparison of chaotic and non-chaotic image encryption schemes

Jawad Ahmad, Seong Oun Hwang*, Arshad Ali

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

41 Citations (Scopus)

Abstract

During last few years, transmission of digital multimedia data (images, audios and videos) over Internet, wireless cell phones, television broadcasting etc., has been significantly evolved. The provision of security to store and transmit data with confidentiality, integrity, and authentication for multimedia data over wireless medium is attaining importance these days. Over a few decades, a number of image encryption schemes have been implemented, each with various features, pros and cons. So there is a need to carry out security analysis of these schemes through some standard parameters. In this paper, an effort is being made for comparison of traditional encryption algorithms via some security parameters rather than using just visual inspection. Through these security parameters, one can determine a better and highly secure image encryption scheme. Comparative analysis of Advanced Encryption Standard, Compression Friendly Encryption Scheme, Chaotically Coupled Chaotic Map Encryption Scheme and a Bernoulli Map Based Encryption Scheme are done. Results are finally compiled to conclude the optimum scheme to be used feasibly with high security level.

Original languageEnglish
Pages (from-to)901-918
Number of pages18
JournalWireless Personal Communications
Volume84
Early online date13 May 2015
DOIs
Publication statusPublished - Sep 2015

Keywords

  • chaos
  • AES
  • CFES
  • MCFES
  • image encryption

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'An experimental comparison of chaotic and non-chaotic image encryption schemes'. Together they form a unique fingerprint.

Cite this