2021
DOI: 10.1155/2021/5012496
|View full text |Cite
|
Sign up to set email alerts
|

Computational Image Encryption Techniques: A Comprehensive Review

Abstract: Images contain very sensitive and confidential information. Because images play a significant role in many applications such as military communication, remote-sensing, and medical-imaging, therefore, it is necessary to protect sensitive and confidential information from unauthorized use and modification. To achieve this objective, encryption is one of the best methods among the information hiding methods. In recent years, many image encryption approaches are designed by the researchers. They use different conc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 33 publications
(21 citation statements)
references
References 156 publications
(149 reference statements)
0
8
0
1
Order By: Relevance
“…Five well-known quality metrics, i.e., root mean square error (RMSE) [ 46 ], universal image quality index (UIQI) [ 47 ], correlation coefficient (CC) [ 46 ], spectral angle mapper (SAM) [ 46 ], and Erreur relative globale adimensionnelle de synthese (ERGAS) [ 48 ], are used for comparative analysis.…”
Section: Performance Analysismentioning
confidence: 99%
“…Five well-known quality metrics, i.e., root mean square error (RMSE) [ 46 ], universal image quality index (UIQI) [ 47 ], correlation coefficient (CC) [ 46 ], spectral angle mapper (SAM) [ 46 ], and Erreur relative globale adimensionnelle de synthese (ERGAS) [ 48 ], are used for comparative analysis.…”
Section: Performance Analysismentioning
confidence: 99%
“…There are 256 options available for both a and b for the affine mapping ψ i : R −→ R. So the key space is approximately ((10 15 ) 6 × (10 15 ) 5 × 256 × 256 ≈ 2 564 . A robust encryption process demands a key space of at least 2 100 [44], which means that our technique is undefeatable and cannot be invaded by brute force attack.…”
Section: Key Space Analysismentioning
confidence: 99%
“…On the basis of several ideas, including optical, compressive sensing, and chaotic maps image encryption, the existing image encryption methods are divided into numerous categories. The methods currently used to access the various security settings are compared [16]. A hyperchaotic system-based image encryption technique and a variable-step Josephus problem were also mentioned in the study [17].…”
Section: Literature Review and Problem Statementsmentioning
confidence: 99%