The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
A Survey on Chaos Based Encryption Technique
Abstract
Information security is an important field among the pervasive use of applications namely internet banking, mobile services, emails, viz., chaos-based encryption techniques play an important role in many security processes, namely: military systems, robotics, and other real time computing services. The secure transmission of audio, image and video are processed with unique characteristic of a third-party which makes the encryption and decryption highly secure for the users. In this chapter, a detailed survey on the various chaos-based encryption techniques is discussed and analyzed.
Related Content
Stojan Kitanov, Borislav Popovski, Toni Janevski.
© 2019.
36 pages.
|
Noman Islam, Ainuddin Wahid Abdul Wahab.
© 2019.
34 pages.
|
Ashraf Aboshosha, Mohamed B. El-Mashade, Ehab A. Hegazy.
© 2019.
19 pages.
|
Adam Wong Yoon Khang, Mohamed Elshaikh Elobaid, Arnidza Ramli, Nadiatulhuda Zulkifli, Sevia Mahdaliza Idrus.
© 2019.
15 pages.
|
Hesham Mohammed Ali Abdullah, A.V. Senthil Kumar.
© 2019.
20 pages.
|
Elisavet Grigoriou.
© 2019.
22 pages.
|
Anandkumar R, Kalpana R..
© 2019.
19 pages.
|
|
|