Volume 2 , Issue 3 , July 2022

Terminologies and Techniques based Image Encryption A Survey

Rogash Y Masiha
Department of Statistics, Duhok, Iraq

Abstract

In this day and age of social media and smartphones, when practically all smartphone users are clicking and publishing their pictures on social media, it is of the utmost significance that the images that are transferred remain secure. Image encryption algorithms are an important part of the multimedia application landscape, playing an important part in both the security and authenticity of images. The purpose of this work is to provide an in-depth analysis of a variety of image encryption methods. In comparison to grayscale images, colored images are more affordable technologically, thus more people use them. Additionally, colored images have more information packed into them, so they are more useful. In this paper, a state-of-the-art survey of various techniques developed by various researchers in the field of image encryption is presented, and a detailed comparison of various available techniques and algorithms in the field of image encryption is carried out. Both of these aspects are addressed in the context of this particular paper.

References

  1. A. Diro, H. Reda, N. Chilamkurti, A. Mahmood, N. Zaman and Y. Nam, "Lightweight Authenticated Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication," in IEEE Access, vol. 8, pp. 60539-60551, 2020, doi: 10.1109/ACCESS.2020.2983117.
  2. T. S. Ali and R. Ali, "A Novel Medical Image Signcryption Scheme Using TLTS and Henon Chaotic Map," in IEEE Access, vol. 8, pp. 71974-71992, 2020.
  3. Sivakumar T, Venkatesan R (2015) A novel image encryption using calligraphy based scan method and random number. KSII Trans Internet Inf Syst 9(6):2317–2337
  4. Li XW, Kim ST (2013) Optical 3D watermark based digital image watermarking for telemedicine. Opt Lasers Eng 51(12):1310–1320
  5. Khanapur NH, Patro A. Design and implementation of enhanced version of MRC6 algorithm for data security. International Journal of Advanced Computer Research. 2015; 5(19):225-132.
  6. Sridevi, Manajaih DH. Modular arithmetic in RSA cryptography. International Journal of Advanced Computer Research. 2014; 4(17):973-8.
Published July 14, 2022
Keywords
  • Cryptography,
  • Image Encryption,
  • Image Decryption,
  • Chaotic cryptography
How to Cite
Masiha, R. Y. (2022). Terminologies and Techniques based Image Encryption A Survey. Artificial Intelligence & Robotics Development Journal, 2(3), 187-200. https://doi.org/10.52098/airdj.202255