Image encryption techniques: A comprehensive review

H Kolivand, SF Hamood… - Multimedia Tools …, 2024 - researchonline.ljmu.ac.uk
This paper presents an exhaustive review of research within the field of image encryption
techniques. It commences with a general introduction to image encryption, providing an …

A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie–Hellman cryptography

M Kumar, A Iqbal, P Kumar - Signal processing, 2016 - Elsevier
With the increasing use of media in communications, there is a need for image encryption for
security against attacks. In this paper, we have proposed a new algorithm for image security …

A literature review on image encryption techniques

M Khan, T Shah - 3D Research, 2014 - Springer
Image encryption plays a paramount part to guarantee classified transmission and capacity
of image over web. Then again, a real-time image encryption confronts a more noteworthy …

An efficient image encryption scheme using gray code based permutation approach

J Chen, Z Zhu, C Fu, H Yu, L Zhang - Optics and Lasers in Engineering, 2015 - Elsevier
In recent years, the operation efficiency of chaos-based image cryptosystems has drawn
much more concerns. However, the workload arised from floating point arithmetic in chaotic …

Color image encryption using pixel scrambling operator and reality-preserving MPFRHT

X Kang, R Tao - IEEE Transactions on Circuits and Systems for …, 2018 - ieeexplore.ieee.org
To ensure the confidentiality of color images during their storage or transmission on
insecure networks, a number of encryption methods based on fractional transforms have …

Devil׳ s vortex Fresnel lens phase masks on an asymmetric cryptosystem based on phase-truncation in gyrator wavelet transform domain

H Singh - Optics and Lasers in Engineering, 2016 - Elsevier
An asymmetric scheme has been proposed for optical double images encryption in the
gyrator wavelet transform (GWT) domain. Grayscale and binary images are encrypted …

A novel image encryption using random matrix affine cipher and the chaotic maps

PN Lone, D Singh, UH Mir - Journal of Modern Optics, 2021 - Taylor & Francis
Security issues are at its peak by the expanding pace of innovation and the utilization of
interactive media over the internet. To overcome such security issues, cryptography …

12× 12 S-box design and its application to RGB image encryption

T ul Haq, T Shah - Optik, 2020 - Elsevier
Abstract Customarily, 8× 8 S-box is a 16× 16 look up table over Galois field GF 2 8, algebra
over the binary field F 2. A 12× 12 S-box over GF 2 12 is not workable as the computer …

H3-hybrid multilayered hyper chaotic hyper elliptic curve based image encryption system

N Sasikaladevi, K Geetha, K Sriharshini… - Optics & Laser …, 2020 - Elsevier
Excessive need for digitized images in all domains have necessitated the need for
protecting the images against adversaries for secured transmission in the network. Sensitive …

Multi-layer permutation-substitution operations based novel lossless multiple color image encryption

S Sabir, V Guleria - Multimedia Tools and Applications, 2024 - Springer
This work develops a novel lossless multiple color image encryption based on multi-layer
permutation-substitution operations. Initially, sixteen RGB images are converted into a single …