An overview of encryption algorithms in color images

HM Ghadirli, A Nodehi, R Enayatifar - Signal Processing, 2019 - Elsevier
Nowadays, security in data transfer is of special importance. Images are of the most
attractive kinds of data in the encryption domain. Color images are more attractive than the …

A literature review on image encryption techniques

M Khan, T Shah - 3D Research, 2014 - Springer
Image encryption plays a paramount part to guarantee classified transmission and capacity
of image over web. Then again, a real-time image encryption confronts a more noteworthy …

A selective bitplane image encryption scheme using chaotic maps

S Som, A Mitra, S Palit, BB Chaudhuri - Multimedia Tools and Applications, 2019 - Springer
Partial encryption is one of the viable solutions for low power, high speed, real time secure
multimedia communication. In this paper, a chaotic tent map based selective bitplane …

Novel Dominant Color Subband Image Encryption in Visual Sensor Network for Smart Military Surveillance System.

R Nithya, D Dhanasekaran - Traitement du Signal, 2022 - search.ebscohost.com
Internet of Things plays a major role in improving the levels of intelligence for several
defense and military applications. There are myriads of visual sensor nodes deployed in …

[PDF][PDF] A review of color image encryption techniques

LM Jawad, GB Sulong - International Journal of Computer Science Issues …, 2013 - Citeseer
Image encryption plays an important role to ensure confidential transmission and storage of
image over internet. However, a real–time image encryption faces a greater challenge due …

[PDF][PDF] A survey on emerging challenges in selective color image encryption techniques

LM Jawad, G Sulong - Indian Journal …, 2015 - sciresol.s3.us-east-2.amazonaws …
Abstract Background/Objectives: Selective image encryption is the best modern approach
for reducing the amount of encrypted area. The objective of this paper is to study the strength …

[PDF][PDF] Partial encryption of color image using quaternion discrete cosine transform

J Fan, J Wang, X Sun, T Li - International Journal of Signal …, 2015 - researchgate.net
In this paper, the quaternion discrete Cosine transform (QDCT) is applied to the color image
encryption technology, and partial encryption technique of color image based on QDCT is …

Baker's Map Based Chaotic Image Encryption in Military Surveillance Systems

NP Rajendiran - International Conference on Internet of Everything and …, 2023 - Springer
One of the primary problems in military surveillance systems is the safety of the visual data
gathered by the sensor nodes installed in the different areas of the Visual sensor network …

Optimized hybrid security mechanism for image authentication and secrecy using PSO

K Kuppusamy, K Thamodaran - International Journal of …, 2013 - search.proquest.com
Authentication is one of the image security issues solved by hash function and another one
issue is providing security for illegal manipulation of digital image is solved by an encryption …

[PDF][PDF] Optimized Hybrid Image Security Scheme for Copyright Protection, Authentication and Confidentiality Using PSO

K Kuppusamy, K Thamodaran - vol, 2013 - core.ac.uk
The digital watermarking scheme provides copyright protection, the hash function provides
an authentication, and an encryption scheme provides security against illegal duplication …