Academia.eduAcademia.edu

AI-generated Abstract

This paper reviews various chaotic map-based cryptographic techniques focusing on their efficacy in encrypting visual information, particularly in the context of image security. It investigates different diffusion and permutation methods based on chaotic maps like the logistic map and Chebyshev map, emphasizing their robustness against various types of attacks including brute-force assaults. The analysis indicates that while the architectures of these algorithms are largely similar, the choice of chaotic maps and configuration variations play a significant role in enhancing the strength of encryption.