2022
DOI: 10.46578/humder.1066545
|View full text |Cite
|
Sign up to set email alerts
|

Görüntü Şifreleme Yöntemlerinin Kapsamlı Bir İncelemesi

Abstract: In today’s technology world, data security has a great importance. Because each data type has its own characteristics, there are various methods of providing this security. The main subject of this study is the security of image data which are more complex structures than text data. Using traditional encryption methods alone to ensure security in image data types can create security weaknesses. For this reason, nowadays, some traditional methods are combined with each other or different methods to encrypt imag… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 107 publications
0
7
0
1
Order By: Relevance
“…In [6], the authors have reviewed several image encryption and discrete image encoding techniques and the associated future scope in those fields. In [7], image encryption methods based on chaotic maps, neural networks, AES (Advanced Encryption Standard), DCT (direct Cosine Transform), XOR, GA (Genetic Algorithm), and LSB (Least Significant Bit) are reviewed. Additionally, several schemes which use a combination of these methods are discussed.…”
Section: Literature Reviewmentioning
confidence: 99%
See 3 more Smart Citations
“…In [6], the authors have reviewed several image encryption and discrete image encoding techniques and the associated future scope in those fields. In [7], image encryption methods based on chaotic maps, neural networks, AES (Advanced Encryption Standard), DCT (direct Cosine Transform), XOR, GA (Genetic Algorithm), and LSB (Least Significant Bit) are reviewed. Additionally, several schemes which use a combination of these methods are discussed.…”
Section: Literature Reviewmentioning
confidence: 99%
“…That means G is involutory and not well suited as a cryptographic key from the security aspect. Hence, to avoid the involutory deficiency, an additional involutory matrix F, which is entirely different from G, is generated as, (7) Here X and Y are two L×1 integer vectors different from U and V. Similar to matrix G, we have, (8) Let us define two integer matrices E and D as, (9) (10) Since G and F are derived from different vector sets, they are non-commutative. That is, Therefore, the encryption and decryption parent matrices E, and D are numerically dissimilar.…”
Section: ) Modified Householder Construction: Conventionalmentioning
confidence: 99%
See 2 more Smart Citations
“…Örneğin, karmaşık bir veri grubunun şifrelenmesi sonucunda ortaya çıkan çıktılar o veri türüne hakim olmayan bir araştırmacı için orijinal veriden ayırt edilemeyebilir. Ancak bir görüntü şifrelendiğinde bu görüntünün temel olarak başarılı bir şekilde şifrelenip şifrelenmediğini gözlemlemek daha kolaydır [20][21][22][23][24].…”
unclassified