Impact Factor (2025): 6.9
DOI Prefix: 10.47001/IRJIET
Since its
introduction in image encryption methods, chaos has proven to be an extremely
powerful cryptographic tool. The evolutionary path of chaos-based picture
encryption algorithms is thoroughly examined in this article, covering a range
of topics including symmetric and asymmetric algorithms, block cyphers, stream
cyphers, and their combination with other technologies. The unique properties
of chaos, including its pseudo-randomness, topological transitivity, and
sensitivity to beginning conditions, make it an ideal subject for
interdisciplinary research and provide opportunities to improve image
encryption techniques through cross-disciplinary connections. Moreover, the
discussion delves into real-world uses, explaining many contexts in which
chaotic picture encryption is useful. The thorough examination of chaotic image
encryption's current difficulties as well as its useful applications serves as
a call to action for researchers. This paper seeks to stimulate further efforts
in improving and augmenting the current approaches by providing an overview of
the state of the field. Furthermore, it aims to establish a foundation for
further developments in chaos-based picture encryption, providing a path for
potential growth in this rapidly evolving subject.
Country : Iraq
IRJIET, Volume 7, Issue 12, December 2023 pp. 271-280