2021
DOI: 10.29304/jqcm.2021.13.2.788
|View full text |Cite
|
Sign up to set email alerts
|

Developed Lightweight Cryptographic Algorithms for The Application of Image Encryption: A Review

Abstract: As a consequence of the fast evolution of information technology, a substantial amount of digital information is created and disseminated over various kinds of networks. The digital image represents one of the most commonly utilized formats of digital data since it has a straight visual effect. Moreover, a digital image holds important possibilities and extra information, for instance, personal photographs are capable of conveying the persons' physical appearance as well as other details like their ages and he… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…In order to evaluate the strength of video encryption, human examination is not the only method, so other measurement techniques were relied upon to assess the level of encryption more objectively and accurately. There are many measures of quality factors, and the most important of these factors that were used to measure the proposed method (UACI, PSNR, NPCR, MSE, correlation and entropy) 24,30 , this is shown in Table 2. 8 , and whenever the result is close to this value, the results are good, also note that the results of the proposed algorithm are very good due to its closeness to the ideal value, demonstrating that the suggested encryption technique was effective in distributing the encrypted frame's pixels at random.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to evaluate the strength of video encryption, human examination is not the only method, so other measurement techniques were relied upon to assess the level of encryption more objectively and accurately. There are many measures of quality factors, and the most important of these factors that were used to measure the proposed method (UACI, PSNR, NPCR, MSE, correlation and entropy) 24,30 , this is shown in Table 2. 8 , and whenever the result is close to this value, the results are good, also note that the results of the proposed algorithm are very good due to its closeness to the ideal value, demonstrating that the suggested encryption technique was effective in distributing the encrypted frame's pixels at random.…”
Section: Resultsmentioning
confidence: 99%
“…Different information formats may now be legally accessed by an authentic user thanks to encryption techniques 22 . Any system that needs high-speed encryption, like SSL 23 and WEP 24 , can benefit from effective stream cipher implementations. The goal of the ECRYPT (eSTREAM) 25 stream cipher project is to find novel stream ciphers that enable fast and safe encryption.…”
Section: Light Stream Algorithmmentioning
confidence: 99%