2020
DOI: 10.3390/s20185162
|View full text |Cite
|
Sign up to set email alerts
|

Analytical Study of Hybrid Techniques for Image Encryption and Decryption

Abstract: The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC).… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
32
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 98 publications
(32 citation statements)
references
References 29 publications
0
32
0
Order By: Relevance
“…Chowdhary, C.L. et al [4] analyzed the performance of hybridization of various symmetric and asymmetric cryptography algorithms for image encryption and decryption. The hybrid process elliptic curve cryptography (ECC) with Hill cipher (H.C.), ECC with Advanced Encryption Standard (AES), and ElGamal with Double Playfair Cipher (DPC) involved the speed implementation of symmetric algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…Chowdhary, C.L. et al [4] analyzed the performance of hybridization of various symmetric and asymmetric cryptography algorithms for image encryption and decryption. The hybrid process elliptic curve cryptography (ECC) with Hill cipher (H.C.), ECC with Advanced Encryption Standard (AES), and ElGamal with Double Playfair Cipher (DPC) involved the speed implementation of symmetric algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…As a main example, local image analysis permits to report pixel saliency as a function not only of the pixel itself, but also of its surroundings [ 32 ], thus permitting to reconstruct local geometric interactions, neither quantifiable, not even perceivable, in the native intensity images, which require proper post-processing. To this purpose, investigating pixel connectivity is a simple yet powerful tool to go beyond intensity analyses and access local image structures [ 33 ], as showed by popular applications as semantic segmentation [ 34 ] and image encoding and encrypting [ 35 ]. However, it may happen that after image pre-processing and thresholding the structural information of the ā€œobjectsā€ of interest can be partly lost, yet more in case of structures whose size is close to system resolution.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, due to the enormous amount of the digital image, compression in the digital image should be also taken into account to improve the efficiency of transmission and storage [8,9]. ere are two views on how to design the encryption image scheme; the first one is to consider the traditional encryption method for the digital image encryption [10], such as Data Encryption Standard (DES) and Advanced Encryption Standard (AES). ose traditional schemes can guarantee the digital image safety.…”
Section: Introductionmentioning
confidence: 99%