“…To enhance the defence ability against differential analysis, such measures could be adopted as conducting non‐linear and complicated operations in some significant data, applying self‐synchronous key‐stream instead of synchronous key‐stream, and designing permutation process related to plain‐images and complicated diffusion rules. - Techniques, such as DCT coefficients’ sign encryption, block permutation, and appended bits encryption, are not secure enough when used alone, they should be combined with other encryption operations.
- Encryption operations, such as intra‐block shuffling, category address mapping, and frequency‐based permutation, decrease JPEG's compression performance significantly. They should not be used in applications that highlight the compression efficiency.
- Some hash functions and chaotic systems could be utilised to generate the pseudo‐random key‐stream [22, 48, 59, 76 ] because of their good properties, such as sensitive to input changes, abundant and complex dynamic behaviours, and so on.
- Technologies, such as compressive sensing and deep learning, could be integrated with traditional encryption operations to further enhance the whole system's compression efficiency and secrecy [100, 101 ].
From Table 5, we find that no encryption schemes can satisfy all evaluation criteria, trading off all aforementioned criteria according to the specific application scenario is a critical task. In the design process of most image encryption algorithms, no targeted application scenario is considered.…”