CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Chaotic Neural Network for Cryptography in Image Processing

Published on November 2011 by Shweta B. Suryawanshi, Devesh D. Nawgaje
2nd National Conference on Information and Communication Technology
Foundation of Computer Science USA
NCICT - Number 3
November 2011
Authors: Shweta B. Suryawanshi, Devesh D. Nawgaje
4de49574-b5fc-4e5a-b16b-4aa7cba70df1

Shweta B. Suryawanshi, Devesh D. Nawgaje . Chaotic Neural Network for Cryptography in Image Processing. 2nd National Conference on Information and Communication Technology. NCICT, 3 (November 2011), 29-33.

@article{
author = { Shweta B. Suryawanshi, Devesh D. Nawgaje },
title = { Chaotic Neural Network for Cryptography in Image Processing },
journal = { 2nd National Conference on Information and Communication Technology },
issue_date = { November 2011 },
volume = { NCICT },
number = { 3 },
month = { November },
year = { 2011 },
issn = 0975-8887,
pages = { 29-33 },
numpages = 5,
url = { /proceedings/ncict/number3/4292-ncict022/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 2nd National Conference on Information and Communication Technology
%A Shweta B. Suryawanshi
%A Devesh D. Nawgaje
%T Chaotic Neural Network for Cryptography in Image Processing
%J 2nd National Conference on Information and Communication Technology
%@ 0975-8887
%V NCICT
%N 3
%P 29-33
%D 2011
%I International Journal of Computer Applications
Abstract

Cryptography is the exchange of information among the users without leakage of information to others. Many public key cryptography are available which are based on number theory but it has the drawback of requirement of large computational power, complexity and time consumption during generation of key. To overcome these drawbacks, a neural network can be used to generate secret key. The chaotic neural network is used for encryption and decryption of information.

References
  1. T.Godhavari, ‘Cryptography using neural network’, IEEE Indicon 2005 Conference, Chennai, India, 11-13 Dec. 2005,258-261.
  2. Harpreet Kaur and Tripatjot Singh Panag, ‘cryptography using chaotic neural network’ , International Journal of Information Technology and Knowledge Management July-December 2011, Volume 4, No. 2, pp. 417-422.
  3. Miles E. Smid and Dennis K. Branstad.‘The Data Encryption Standard: Past and Future’, proceedings of the ieee, vol. 76, no. 5, may 1988,550-559.
  4. C. Boyd, ‘Modem Data Encryption’, Electronics & Communication Journal, 1993.
  5. Chung J.Kuo and Maw S. Chen., ‘A new signal encryption tech. and its attack study’, ch3031- 2/91/0000-0149 81.00' 1991 ieee,149-153.
  6. Ilker Dalkiran, Kenan Danisman. ‘Artificial neural network based chaotic generator for cryptography’, Turk J Elec Eng & Comp Sci, Vol.18, No.2, 2010.,225-240.
  7. ‘An Introduction to Neural Network’ by Ben Krose .
  8. Wenwu Yu, Jinde Cau, ‘Cryptography based on delayed chaotic neural network’, Physics Letters A 356 (2006) 333–338.
Index Terms

Computer Science
Information Sciences

Keywords

Neural Network chaos Cryptography Encryption Decryption