Abstract
In this age of the multi-media, images have an important impact on communication. When users upload images over an insecure communication network, total security is a difficult problem to address in order to maintain image confidentiality. Also, encryption is a technique for keeping images secret. This study gives a basic introduction to cryptography, as well as a concise overview regarding the many image encryption algorithms' elemental security criteria. This paper includes an overview of several image encryption approaches as well as a comparison of discrete image encoding techniques, before coming to a conclusion and recommending future research.
Highlights
Using Recursive Cellular Automata (RCA) and Deoxyribonucleic Acid (DNA), Homayun, Abdorreza, and Rasul [35] suggested a new approach for image encryption
The present paper examined a variety of image encryption methods and concluded that the chaotic technique has the most uncertainty and delivers the most security
The work reveals that NPCR is independent of key sensitivity; in block-based encryption systems, the encrypted block values must be reliant upon values of the other cipher blocks in order to obtain sufficient NPCR
Summary
The information and internet technologies are exploding rapidly. interactive media is frequently used in the communication, for example, audio, images, and videos. National-security agencies, military, and diplomatic issues, for instance, all rely heavily on images for communication Because such images might contain extremely confidential information, users must entail extreme protection when storing them in an untrustworthy repository. Cryptography has two main categories; symmetric key cryptography and asymmetric key cryptography, in symmetric or secret key cryptography, senders and recipients use a same key in encryption and decryption [2] as illustrated, while in asymmetric or public key cryptography uses different keys in encrypting and decrypting messages [2] This technique applies a public key and www.techniumscience.com a private key to encode and decode an image respectively.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Technium: Romanian Journal of Applied Sciences and Technology
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.