2022
DOI: 10.1109/access.2022.3203173
|View full text |Cite
|
Sign up to set email alerts
|

Systematic Survey on Visually Meaningful Image Encryption Techniques

Abstract: Due to advancements in technology, digital images are widely used in various applications like medical field, military communication, remote sensing, etc. These images may contain sensitive and confidential information. Therefore, images are required to be protected from unauthorized access. Many image protection techniques have been proposed in past years. The most common technique to protect the images is encryption. In this technique, a secret key and an encryption algorithm are used to change the plain ima… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 68 publications
(174 reference statements)
0
3
0
Order By: Relevance
“…A robust and secure algorithm should produce two completely different cipher images when encrypted by two keys that are different by only one bit. Furthermore, it should not be able to decrypt a cipher image and retrieve the plaintext image with a key that has one bit altered [65].…”
Section: Key Space and Key Sensitivitymentioning
confidence: 99%
“…A robust and secure algorithm should produce two completely different cipher images when encrypted by two keys that are different by only one bit. Furthermore, it should not be able to decrypt a cipher image and retrieve the plaintext image with a key that has one bit altered [65].…”
Section: Key Space and Key Sensitivitymentioning
confidence: 99%
“…However, they may be time-consuming or even fail when dealing with image data [8,9]. Hence, the design of image-oriented cryptosystems has become a popular research topic [10,11].…”
Section: Introductionmentioning
confidence: 99%
“…In the current era of rapid development of the Internet, there are a large number of images being delivered and processed in the network. This can easily lead to the disclosure of personal privacy and the threat of information security, so it is essential to encrypt and protect images transmitted on the Internet to maintain network information security [2]. Image data is different from general data.…”
Section: Introductionmentioning
confidence: 99%