Terminologies and Techniques based Image Encryption A Survey
Abstract
In this day and age of social media and smartphones, when practically all smartphone users are clicking and publishing their pictures on social media, it is of the utmost significance that the images that are transferred remain secure. Image encryption algorithms are an important part of the multimedia application landscape, playing an important part in both the security and authenticity of images. The purpose of this work is to provide an in-depth analysis of a variety of image encryption methods. In comparison to grayscale images, colored images are more affordable technologically, thus more people use them. Additionally, colored images have more information packed into them, so they are more useful. In this paper, a state-of-the-art survey of various techniques developed by various researchers in the field of image encryption is presented, and a detailed comparison of various available techniques and algorithms in the field of image encryption is carried out. Both of these aspects are addressed in the context of this particular paper.
References
- A. Diro, H. Reda, N. Chilamkurti, A. Mahmood, N. Zaman and Y. Nam, "Lightweight Authenticated Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication," in IEEE Access, vol. 8, pp. 60539-60551, 2020, doi: 10.1109/ACCESS.2020.2983117.
- T. S. Ali and R. Ali, "A Novel Medical Image Signcryption Scheme Using TLTS and Henon Chaotic Map," in IEEE Access, vol. 8, pp. 71974-71992, 2020.
- Sivakumar T, Venkatesan R (2015) A novel image encryption using calligraphy based scan method and random number. KSII Trans Internet Inf Syst 9(6):2317–2337
- Li XW, Kim ST (2013) Optical 3D watermark based digital image watermarking for telemedicine. Opt Lasers Eng 51(12):1310–1320
- Khanapur NH, Patro A. Design and implementation of enhanced version of MRC6 algorithm for data security. International Journal of Advanced Computer Research. 2015; 5(19):225-132.
- Sridevi, Manajaih DH. Modular arithmetic in RSA cryptography. International Journal of Advanced Computer Research. 2014; 4(17):973-8.
- Cryptography,
- Image Encryption,
- Image Decryption,
- Chaotic cryptography
Copyright (c) 2022 Copyright (c) 2022 Copyright (c) 2022 Copyright (c) 2021 Copyright (c) 2021 Author(s) of this work retain copyright and grant the journal right, publishing license of first publication with the work simultaneously licensed under Creative Commons Attribution International License (CC BY 4.0). Author(s) and ACAA permit unrestricted use, distribution, and reproduction in any medium, provided the original work with proper citation. ACAA publishing house is located in Oman / Sohar , Zip code 311. ISNI 0000 0004 9361 5767

This work is licensed under a Creative Commons Attribution 4.0 International License.