Computer Science & Information Technology

Computer Science & Information Technology

March 07 ~ 08 - 2015 | Sundarapandian Vaidyanathan, Jan Zizka (Eds)
The Second International Conference on Information Technology, Control, Chaos, Modeling and Applications (ITCCMA-2015) was held in Chennai, India, from March 7-8, 2015. The conference was co-located with several other international conferences, including the International Conference on Fuzzy Logic Systems (FUZZY 2015), International Conference on Signal, Image Processing and Embedded Systems (SIGEM 2015), International Conference on Data Mining and Database Management Systems (DMDBS 2015), and International Conference on Natural Language Computing (NATL 2015). These events attracted a large number of participants from around the world, offering a balanced mix of ideas from both Eastern and Western academia. The goal of the conference series is to bring together researchers and practitioners from academia and industry to focus on understanding computer science and information technology and to establish new collaborations in these areas. Authors are invited to contribute to the conference by submitting articles that illustrate research results, projects, survey work, and industrial experiences describing significant advances in all areas of computer science and information technology. The conference committees rigorously invited submissions from researchers, scientists, engineers, students, and practitioners related to the relevant themes and tracks of the workshop. This effort guaranteed submissions from an unparalleled number of internationally recognized top-level researchers. All the submissions underwent a strenuous peer review process which comprised expert reviewers. These reviewers were selected from a talented pool of Technical Committee members and external reviewers on the basis of their expertise. The papers were then reviewed based on their contributions, technical content, originality, and clarity. The entire process, which includes the submission, review, and acceptance processes, was done electronically. All these efforts undertaken by the Organizing and Technical Committees led to an exciting, rich, and high-quality technical conference program, which featured high-impact presentations for all attendees to enjoy, appreciate, and expand their expertise in the latest developments in computer network and communications research. The book is organized as a collection of papers from the ITCCMA-2015, FUZZY-2015, SIGEM-2015, DMDBS-2015, and NATL-2015 conferences. The authors would like to thank the General and Program Chairs, organization staff, the members of the Technical Program Committees, and external reviewers for their excellent and tireless work. They sincerely wish that all attendees benefited scientifically from the conference and wish them every success in their research. It is the humble wish of the conference organizers that the professional dialogue among the researchers, scientists, engineers, students, and educators continues beyond the event and that the friendships and collaborations forged will linger and prosper for many years to come. The paper presents a comprehensive performance analysis of chaotic color image encryption algorithms based on their cryptographic requirements. The study classifies and analyzes existing chaos-based color image encryption schemes with respect to various parameters suchThe Second International Conference on Information Technology, Control, Chaos, Modeling and Applications (ITCCMA-2015) was held in Chennai, India, from March 7-8, 2015. The conference was co-located with several other international conferences, including the International Conference on Fuzzy Logic Systems (FUZZY 2015), International Conference on Signal, Image Processing and Embedded Systems (SIGEM 2015), International Conference on Data Mining and Database Management Systems (DMDBS 2015), and International Conference on Natural Language Computing (NATL 2015). These events attracted a large number of participants from around the world, offering a balanced mix of ideas from both Eastern and Western academia. The goal of the conference series is to bring together researchers and practitioners from academia and industry to focus on understanding computer science and information technology and to establish new collaborations in these areas. Authors are invited to contribute to the conference by submitting articles that illustrate research results, projects, survey work, and industrial experiences describing significant advances in all areas of computer science and information technology. The conference committees rigorously invited submissions from researchers, scientists, engineers, students, and practitioners related to the relevant themes and tracks of the workshop. This effort guaranteed submissions from an unparalleled number of internationally recognized top-level researchers. All the submissions underwent a strenuous peer review process which comprised expert reviewers. These reviewers were selected from a talented pool of Technical Committee members and external reviewers on the basis of their expertise. The papers were then reviewed based on their contributions, technical content, originality, and clarity. The entire process, which includes the submission, review, and acceptance processes, was done electronically. All these efforts undertaken by the Organizing and Technical Committees led to an exciting, rich, and high-quality technical conference program, which featured high-impact presentations for all attendees to enjoy, appreciate, and expand their expertise in the latest developments in computer network and communications research. The book is organized as a collection of papers from the ITCCMA-2015, FUZZY-2015, SIGEM-2015, DMDBS-2015, and NATL-2015 conferences. The authors would like to thank the General and Program Chairs, organization staff, the members of the Technical Program Committees, and external reviewers for their excellent and tireless work. They sincerely wish that all attendees benefited scientifically from the conference and wish them every success in their research. It is the humble wish of the conference organizers that the professional dialogue among the researchers, scientists, engineers, students, and educators continues beyond the event and that the friendships and collaborations forged will linger and prosper for many years to come. The paper presents a comprehensive performance analysis of chaotic color image encryption algorithms based on their cryptographic requirements. The study classifies and analyzes existing chaos-based color image encryption schemes with respect to various parameters such
Reach us at info@study.space