2022
DOI: 10.47577/technium.v4i2.6026
|View full text |Cite
|
Sign up to set email alerts
|

Digital Image Encryption Techniques: Article Review

Abstract: In this age of the multi-media, images have an important impact on communication. When users upload images over an insecure communication network, total security is a difficult problem to address in order to maintain image confidentiality. Also, encryption is a technique for keeping images secret. This study gives a basic introduction to cryptography, as well as a concise overview regarding the many image encryption algorithms' elemental security criteria. This paper includes an overview of several image encry… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 22 publications
0
9
0
Order By: Relevance
“…where the first derivative at point a, 𝐷 π‘Ž (1) (or 𝐷 π‘Ž for simplicity) is defined by 𝑓(x + a) βˆ’ 𝑓(x), with:…”
Section: Higher-order Differential Cryptanalysismentioning
confidence: 99%
See 1 more Smart Citation
“…where the first derivative at point a, 𝐷 π‘Ž (1) (or 𝐷 π‘Ž for simplicity) is defined by 𝑓(x + a) βˆ’ 𝑓(x), with:…”
Section: Higher-order Differential Cryptanalysismentioning
confidence: 99%
“…The rapid development of information technology accompanied by internet spread all over the world led to arising of several issued including data security. The cryptosystems are used to maintain the security of the transferred data via internet to avoid unauthorized access and data hacking [ 1 ]. Many cryptosystems had been presented in both of its types: Symmetric and Asymmetric ciphers.…”
Section: Introductionmentioning
confidence: 99%
“…To get this, the division operation by in ( 4) is replaced by the multiplication factor which is the modular inverse of with respect to p. The resulting G is, (5) In (5), the size of G is LΓ—L, and all the mathematical operations are carried out using modular algebra in the finite field Zp. Here, it can be verified that, (6) That is, the modular inverse of G is G itself. That means G is involutory and not well suited as a cryptographic key from the security aspect.…”
Section: ) Modified Householder Construction: Conventionalmentioning
confidence: 88%
“…Various types of chaotic maps used in image encryption are enumerated systematically. In [6], the authors have reviewed several image encryption and discrete image encoding techniques and the associated future scope in those fields. In [7], image encryption methods based on chaotic maps, neural networks, AES (Advanced Encryption Standard), DCT (direct Cosine Transform), XOR, GA (Genetic Algorithm), and LSB (Least Significant Bit) are reviewed.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation