Image Encryption Techniques PPT Covers detailed explanation about project design details like class diagram, sequence diagram , flow chart, data flow diagram, screen shots, exiting and proposed system.

Image Encryption Techniques

Chaotic Image Encryption Algorithm Project Introduction:

Advances in space science, data analysis, and communication technologies present new opportunities for users to increase productivity, reduce cost, facilitate innovation and create virtual collaborative environments for addressing new challenges. In such processes data sharing is usually based on CD/DVD-ROM hardcopy or on shared network environment (Internet, LAN, WAN etc) , so there exists inherent security risk of unauthorized access or use of the product. To fulfil such security and privacy needs in various applications, encryption of such data is very important to minimize malicious attacks from unauthorized parties and to safeguard sensitive data.

From the study of the above traditional and chaos-based image encryption techniques; it is quit clear that traditional image encryption techniques DES, Triple-DES and IDEA have some limitations such as these algorithms have high security level under CBC mode but requires large data size, long computational time and high computing power.

On the other hand chaos-based cryptographic scheme provides high security level, less computational time and power in reliable and efficient way to deal with balky, difficult and intractable data that why many researchers recommends that it is more suitable for multimedia data, especially for images . Chaos-based system have many properties to achieve high security level, such as sensitivity to change initial conditions and parameters, ergodicity (a system that tends in probability to a limiting form that is independent of the initial conditions), random behaviour and unstable periodic orbits with long periods. It has very high diffusion and confusion properties that are desirable for cryptosystem.

Download Image Encryption Techniques PPT