Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Survey on Chaos Based Encryption Technique

A Survey on Chaos Based Encryption Technique
View Sample PDF
Author(s): Anandkumar R (Pondicherry Engineering College, India) and Kalpana R. (Pondicherry Engineering College, India)
Copyright: 2019
Pages: 19
Source title: Enabling Technologies and Architectures for Next-Generation Networking Capabilities
Source Author(s)/Editor(s): Mahmoud Elkhodr (Central Queensland University, Australia)
DOI: 10.4018/978-1-5225-6023-4.ch007


View A Survey on Chaos Based Encryption Technique on the publisher's website for pricing and purchasing information.


Information security is an important field among the pervasive use of applications namely internet banking, mobile services, emails, viz., chaos-based encryption techniques play an important role in many security processes, namely: military systems, robotics, and other real time computing services. The secure transmission of audio, image and video are processed with unique characteristic of a third-party which makes the encryption and decryption highly secure for the users. In this chapter, a detailed survey on the various chaos-based encryption techniques is discussed and analyzed.

Related Content

Chi Maher. © 2022. 17 pages.
Laura Ingrid Maria Colm. © 2022. 18 pages.
Andrey I. Pilipenko, Zoya A. Pilipenko, Olga I. Pilipenko. © 2022. 32 pages.
Caglar Dogru. © 2022. 27 pages.
Yusuf Bayraktutan, Ali Rıza Solmaz. © 2022. 20 pages.
Aslisah Senak, Nuray Girginer. © 2022. 22 pages.
Andrea Girardi. © 2022. 15 pages.
Body Bottom