Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Survey on Chaos Based Encryption Technique

A Survey on Chaos Based Encryption Technique
View Sample PDF
Author(s): Anandkumar R (Pondicherry Engineering College, India) and Kalpana R. (Pondicherry Engineering College, India)
Copyright: 2019
Pages: 19
Source title: Enabling Technologies and Architectures for Next-Generation Networking Capabilities
Source Author(s)/Editor(s): Mahmoud Elkhodr (Central Queensland University, Australia)
DOI: 10.4018/978-1-5225-6023-4.ch007


View A Survey on Chaos Based Encryption Technique on the publisher's website for pricing and purchasing information.


Information security is an important field among the pervasive use of applications namely internet banking, mobile services, emails, viz., chaos-based encryption techniques play an important role in many security processes, namely: military systems, robotics, and other real time computing services. The secure transmission of audio, image and video are processed with unique characteristic of a third-party which makes the encryption and decryption highly secure for the users. In this chapter, a detailed survey on the various chaos-based encryption techniques is discussed and analyzed.

Related Content

S. Vijay Anand, Sathis Kumar B.. © 2023. 12 pages.
Sudarson Rama Perumal, Muthumanikandan V., Sushmitha J.. © 2023. 30 pages.
Sipra Swain, Biswa Ranjan Senapati, Pabitra Mohan Khilar. © 2023. 31 pages.
Uma Mageswari R., Nallarasu Krishnan, Mohammed Sirajudeen Yoosuf, Murugan K., Sankar Ram C.. © 2023. 20 pages.
Divya L., Pradeep Kumar T. S.. © 2023. 15 pages.
Pradeep Kumar T. S., Vetrivelan P.. © 2023. 15 pages.
Vanitha Veerasamy, Rajathi Natarajan. © 2023. 16 pages.
Body Bottom