Authors :
Jashwant Samar; Shailja Sharma; Ankur Khare
Volume/Issue :
Volume 9 - 2024, Issue 7 - July
Google Scholar :
https://tinyurl.com/4zm2pmrd
Scribd :
https://tinyurl.com/mr46kupf
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24JUL1510
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
The rising abundance of vibrant networks, like
Mobile Ad-hoc Networks (MANETs), Wireless Sensor
Networks (WSNs), and Flying Ad-hoc Networks
(FANETs) requires sophisticated cryptographic solutions
to protect multimedia information delivery. This paper
offers a thorough review of computationally competent
and random key-based image cryptography adapted for
vibrant network circumstances. We search the
background of image cryptography alongside an emphasis
on algorithms and strategies that highlight computational
competence and the utilization of random keys for
improved protection. Key ranges enclosed comprise
conventional symmetric and asymmetric encryption
schemes, trivial cryptography, and logistic system related
key production schemes. The paper explores the
capabilities and restraints of these schemes based on
encryption time, key administration and protection
strength. An exhaustive examination of several random
key production schemes is offered, exhibiting how these
schemes cause to enhance randomness and vigour in
cryptography. We deliberate the incorporation of these
schemes in vibrant networks where systems frequently
tackle restrictions such as rare processing energy, storage
and power. The paper also discusses the issues
impersonated through such circumstances, containing the
requirement for real-time information processing,
flexibility and compliance to modify network situations.
The paper calculates the strength of latest techniques
utilizing performance vectors like encryption speed, key
sensibility and resilience to cryptanalysis attacks.
Keywords :
Cryptographic, Vibrant Network, Symmetric, Asymmetric, Encryption Time.
References :
- D. E. Mfungo, X. Fu, Y. Xian and X. Wang, “A Novel Image Encryption Scheme using Chaotic Maps and Fuzzy Numbers for Secure Transmission of Information”, Applied Sciences, MDPI, Vol. 13(7113), pp. 1-25, 2023.
- F. Elamrawy, M. Sharkas, and A. M. Nasser, “An image encryption based on DNA coding and 2DLogistic chaotic map”, International Journal of Signal Processing, Vol. 3, pp-27-32, 2018.
- W. Yao, K. Gao, Z. Zhang, L. Cui and J. Zhang, “An Image Encryption Algorithm based on a 3D Chaotic Hopfield Neural Network and Random Row-Column Permutation”, Frontiers in Physics, Vol. 11, pp. 1-14, 2023.
- G. Ye, K. Jiao, C. Pan, and X. Huang, “An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map”, Hindawi Security and Communication Networks, pp-1-11, 2018. (https://doi.org/10.1155/2018/8402578)
- Y. Shen, J. Huang, L. Chen, T. Wen, T. Li and G. Zhang, “Fast and Secure Image Encryption Algorithm with Simultaneous Shuffling and Diffusion based on a Time Delayed Combinatorial Hyperchaos Map”, Entropy, MDPI, Vol. 25(753), pp. 1-22, 2023.
- M. Akraam, T. Rashid and S. Zafar, “A Chaos based Image Encryption Scheme is Proposed using Multiple Chaotic Maps”, Mathematical Problems in Engineering, Hindawi, Vol 2023, pp. 1-13, 2023.
- S. Shao, J. Li, P. Shao, and G. Xu, “Chaotic Image Encryption using Piecewise-Logistic-Sine Map”, IEEE Access, Vol. 11, pp. 27477-27488, 2023.
- Y. Tian, and Z. Lu, “Novel permutation-diffusion image encryption algorithm with chaotic dynamic S-box and DNA sequence operation”, AIP Advances, pp-1-23, 2017.
- C. Song and Y. Qiao, “A Novel Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos”, MDPI, Entropy, vol. 17, pp-6954-6968, 2015. (doi:10.3390/e17106954)
- A. H. Alrubaie, M. A. A. Khodher and A. T. Abdulameer, “Image Encryption based on 2DNA Encoding and Chaotic 2D Logistic Map”, Journal of Engineering and Applied Science, Springer, Vol. 70 (60), pp. 1-21, 2023.
- M. Usama, and N. Zakaria, “Chaos-Based Simultaneous Compression and Encryption for Hadoop”, PLoS ONE, vol. 12(1), pp-1-29, 2017. (doi:10.1371/journal.pone.0168207)
- O. Reyad, Z. Kotulski and W. M. A. Elhafiez, “Image Encryption using Chaos-Driven Elliptic Curve Pseudo-Random Number Generators”, Appl. Math. Inf. Sci., Vol. 10, No. 4, pp-1283-1292, 2016. (http://dx.doi.org/10.18576/amis/100407)
- P. K. Shukla, A. Khare, M. A. Rizvi, S. Stalin and S. Kumar, “Applied Cryptography Using Chaos Function for Fast Digital Logic-Based Systems in Ubiquitous Computing”, Entropy, MDPI, vol. 17, pp-1387 1410, 2015. (doi:10.3390/e17031387)
- S. Y. Wang, J. F. Zhao, X. F. Li and L. T. Zhang, “Image Blocking Encryption Algorithm Based on Laser Chaos Synchronization”, Journal of Electrical and Computer Engineering, Hindawi, pp-1-15, 2016.
- T. S. Kumar and R. Venkatesan, “A new Image Encryption Method Based on Knight’s Travel path and True random number”, Journalof Information Science and Engineering, vol. 32, pp-133-152, 2016.
- X. Tong, Y. Liu, M. Zhang, H. Xu and Z. Wang, “An Image Encryption Scheme Based on Hyperchaotic Ra, binovich and Exponential Chaos Maps”, Entropy, MDPI, 17, pp-181-196, 2015. (doi:10.3390/e17010181)
The rising abundance of vibrant networks, like
Mobile Ad-hoc Networks (MANETs), Wireless Sensor
Networks (WSNs), and Flying Ad-hoc Networks
(FANETs) requires sophisticated cryptographic solutions
to protect multimedia information delivery. This paper
offers a thorough review of computationally competent
and random key-based image cryptography adapted for
vibrant network circumstances. We search the
background of image cryptography alongside an emphasis
on algorithms and strategies that highlight computational
competence and the utilization of random keys for
improved protection. Key ranges enclosed comprise
conventional symmetric and asymmetric encryption
schemes, trivial cryptography, and logistic system related
key production schemes. The paper explores the
capabilities and restraints of these schemes based on
encryption time, key administration and protection
strength. An exhaustive examination of several random
key production schemes is offered, exhibiting how these
schemes cause to enhance randomness and vigour in
cryptography. We deliberate the incorporation of these
schemes in vibrant networks where systems frequently
tackle restrictions such as rare processing energy, storage
and power. The paper also discusses the issues
impersonated through such circumstances, containing the
requirement for real-time information processing,
flexibility and compliance to modify network situations.
The paper calculates the strength of latest techniques
utilizing performance vectors like encryption speed, key
sensibility and resilience to cryptanalysis attacks.
Keywords :
Cryptographic, Vibrant Network, Symmetric, Asymmetric, Encryption Time.