COMMENTS

  1. Image encryption techniques: A comprehensive review

    This paper presents an exhaustive review of research within the field of image encryption techniques. It commences with a general introduction to image encryption, providing an overview of the fundamentals. Subsequently, it explores a comprehensive exploration of chaos-based image encryption, encompassing various methods and approaches within this domain. These methods include full encryption ...

  2. A Comprehensive Review on Image Encryption Techniques

    Image encryption techniques play a significant role in multimedia applications to secure and authenticate digital images. This paper presents a comprehensive study of various image encryption techniques. This paper covers the most significant developments in meta-heuristic based image encryption techniques. The various attacks and performance measures related to image encryption techniques ...

  3. A comprehensive survey on image encryption: Taxonomy ...

    By bringing together diverse information from research papers, academic literature, and practical applications, the survey provides a holistic view of the current state of image encryption. 2. ... Share-based Encryption: Visual Cryptography divides the secret image into shares, typically in the form of transparent or printed sheets . ...

  4. Image Cryptography: A Systematic Review

    In recent years due to the observed growth of online multimedia applications, communication, and computer technologies, image security has been an essential demand. This survey paper summarizes existing image security approaches, their merits and demerits, and the area of future work. Along with the survey, the authors present a brief discussion of different multimedia data, as well as the ...

  5. Survey on image encryption techniques using chaotic maps in ...

    A research paper on cryptography encryption and compression techniques. International Journal Of Engineering And Computer Science 6(4) (2017) ... An efficient image cryptography using hash-lsb steganography with rc4 and pixel shuffling encryption algorithms. In: 2017 Annual Conference on New Trends in Information & Communications Technology ...

  6. Towards Deep Learning for Efficient Image Encryption

    Its fusion with cryptography is yet to be explored and this is what attracts attention for further research. This paper summarizes the recent works in literature in deep learning for image encryption to help in understanding the resemblances and differences between deep learning systems and image encryption systems.

  7. A Survey of Image Encryption Algorithms

    Among the various image encryption strategies proposed in the literature, this paper selected several algorithms with different characteristics to highlight the state-of-the-art attempts to meet the everincreasing demand for image protection. This paper briefly explains the cryptography algorithms and compares them in terms of usage, quality ...

  8. Deep Learning for Medical Image Cryptography: A Comprehensive Review

    This paper explores the application of deep learning techniques in medical image cryptography, aiming to enhance the privacy and security of healthcare data. It investigates the use of deep learning models for image encryption, image resolution enhancement, detection and classification, encrypted compression, key generation, and end-to-end ...

  9. The unified image cryptography algorithm based on finite group

    Abstract. Image information security is an essential component of the network information security field. The main task of image cryptography is exploring the image cryptosystem with high processing speed and strong security. This paper studied the confusion and diffusion of images based on the finite group algorithm and then proposed a new ...

  10. Chaos-Based Image Encryption: Review, Application, and Challenges

    Chaos has been one of the most effective cryptographic sources since it was first used in image-encryption algorithms. This paper closely examines the development process of chaos-based image-encryption algorithms from various angles, including symmetric and asymmetric algorithms, block ciphers and stream ciphers, and integration with other technologies. The unique attributes of chaos, such as ...

  11. Computational Image Encryption Techniques: A Comprehensive Review

    Images contain very sensitive and confidential information. Because images play a significant role in many applications such as military communication, remote-sensing, and medical-imaging, therefore, it is necessary to protect sensitive and confidential information from unauthorized use and modification. To achieve this objective, encryption is one of the best methods among the information ...

  12. Image Cryptography: A Survey towards its Growth

    Cryptography refers to the study of mathematical techniques and related aspects of Information Security like data confidentiality, data Integrity, and of data authentication. This paper presents a ...

  13. Security of medical images for telemedicine: a systematic review

    An in-depth overview of security techniques, such as cryptography, steganography, and watermarking are introduced with a full survey of recent research. The objective of the paper is to summarize and assess the different algorithms of each approach based on different parameters such as PSNR, MSE, BER, and NC.

  14. Image Steganography Using LSB and Hybrid Encryption Algorithms

    This research proposes a Multi-Level Steganography (MLS) algorithm that employs two encryption algorithms, AES and Blow-Fish, to secure the cover image and embed encryption keys as key images within the stego image. The proposed MLS algorithm incorporates a robust pixel randomization function to enhance the security of the encrypted data.

  15. (PDF) AES Image Encryption

    Abstract. An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in the project. Due to increasing use of image in various field, it is very important to ...

  16. An overview of visual cryptography techniques

    Visual cryptography is an encryption technique that decomposes secret images into multiple shares. These shares are digitally or physically overlapped to recover the original image, negating the need for complex mathematical operations or additional hardware. There have been many variations of visual cryptography proposed over the years, each addressing different problems or to fulfill ...

  17. PDF Hybrid Image Encryption Using Elliptic Curve Cryptography ...

    This paper proposes a hybrid asymmetric image encryption algorithm using Elliptic curve cryptosystem (ECC), Hadamard transform and Hill cipher algorithms. Based on the Diffie-Hellman public key exchange method a point on the elliptic curve is selected and agreed between both the sender and receiver.

  18. Visual Cryptography Secret Share Creation Techniques with Multiple

    She did an MPhil dissertation title "RGB based secret image sharing scheme in color visual cryptography". Continuously she is publishing research articles in various reputed journals on different topics related to image security. She is an expert in the area of visual cryptography, network security, and image processing.

  19. A review paper: Text-to-image cryptography in color coding

    Cryptography is the process of converting plaintext into ciphertext. It is classified into two types: symmetric encryption, which uses the same key for encryption and decryption processes; and asymmetric encryption, which uses private and public keys. Text to image color coding needs to encrypt text data into colors.

  20. Taxonomy of Image Encryption Techniques

    The paper concludes by discussing the possible uses and challenges ahead of VMEI approaches , including open research questions related to the efficiency of the encryption process and the visual quality of the images. Overall, VMEI techniques have shown great promise in secure image transmission, but there is still much work to be done to ...

  21. FULL PAPER on Image processing & Cryptography on Hardware CU

    Abstract: The importance of embedded applications on image and video processing, communication and cryptography domain has been taking a larger space in current research era. Improvement of pictorial information for betterment of human perception like deblurring, de-noising in several fields such as satellite imaging, medical imaging etc are ...

  22. Research on computer 3D image encryption processing based on the

    This article uses the nonlinear digital chaos theory algorithm to generate the corresponding encryption system initial parameters, by analysing the correlation degree of image elements from the angles of horizontal, vertical, and diagonal direction, in order to study computer three-dimensional (3D) image encryption processing. The correlation degree of the cypher text obtained by the nonlinear ...

  23. AMS :: J. Amer. Math. Soc. -- Volume 37, Number 3

    Published by the American Mathematical Society, the Journal of the American Mathematical Society (JAMS) is devoted to research articles of the highest quality in all areas of mathematics. ISSN 1088-6834 (online) ISSN 0894-0347 (print) The 2020 MCQ for Journal of the American Mathematical Society is 4.83.

  24. A survey of image encryption for healthcare applications

    Recently, medical image encryption has attracted many researchers because of security issues in the communication process. The recent COVID-19 has highlighted the fact that medical images are consistently created and disseminated online, leading to a need for protection from unauthorised utilisation. This paper intends to review the various medical image encryption approaches along with their ...

  25. PolyU research advocates for privacy protecti

    image: PolyU research advocates for privacy protection for Central Bank Digital Currency Development ... also known zero-knowledge cryptography, allows a "prover" to convince a person of the ...

  26. Double layer security using crypto-stego techniques: a ...

    Section 4 comprises the directions and future research directions. The paper concludes in Sect. ... In 2020, Hureib and Gutub have proposed a combined cryptography and image steganography approach to enhance security in medical health data. In this method, Elliptic curve cryptography has been used to encrypt text before hiding. ...

  27. Advances in Cryptology

    The EUROCRYPT 2024 proceedings focus on foundational theory and mathematics; applied aspects of cryptography; implementation and optimization etc. Advances in Cryptology - EUROCRYPT 2024: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part I ...