2019
DOI: 10.1504/ijaip.2019.096962
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption techniques for data transmission in networks: a survey

Abstract: Recently, there is a need to concentrate more on protecting the information that is stored in computers from attackers due to the rapid growth of internet users. In this scenario, the issues of privacy, integrity, productivity, confidentiality and authenticity of images have become a significant issue for storage and communication of images. The encryption method is the best way towards maintaining the safety of transmitted data by transforming the information into an inconceivable form. Many image-based encry… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…The other is the Asymmetric Algorithm, which is also called Asymmetric cryptography. It is usually implemented by using one-way functions that are simple to compute in one direction, but very difficult to compute in reverse, e.g., the RSA algorithm [16]. Different algorithms have been proposed for achieving reliable image encryption.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The other is the Asymmetric Algorithm, which is also called Asymmetric cryptography. It is usually implemented by using one-way functions that are simple to compute in one direction, but very difficult to compute in reverse, e.g., the RSA algorithm [16]. Different algorithms have been proposed for achieving reliable image encryption.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Jayanthi et al have done a detailed survey on different types encryption techniques in images. In addition, she has presented a new image encryption and an efficient transmission technique [24][25][26].Subbulakshmi Padmanabhan et al have suggested secured shopping system by employing RFID in cloud [22]. Thangaramya Kalidoss et al have used a map reducing techniques for identifying the data that are vertically partitioned [23].…”
Section: Literature Surveymentioning
confidence: 99%