A comprehensive review on image encryption techniques

M Kaur, V Kumar - Archives of Computational Methods in Engineering, 2020 - Springer
Image encryption techniques play a significant role in multimedia applications to secure and
authenticate digital images. This paper presents a comprehensive study of various image …

Image encryption techniques: A comprehensive review

H Kolivand, SF Hamood… - Multimedia Tools …, 2024 - researchonline.ljmu.ac.uk
This paper presents an exhaustive review of research within the field of image encryption
techniques. It commences with a general introduction to image encryption, providing an …

Image encryption using 2D Hénon-Sine map and DNA approach

J Wu, X Liao, B Yang - Signal processing, 2018 - Elsevier
Chaotic systems have been widely applied in digital image encryption due to their complex
properties such as ergodicity, pseudo randomness and extreme sensitivity to their initial …

When an attacker meets a cipher-image in 2018: A year in review

C Li, Y Zhang, EY Xie - Journal of Information Security and Applications, 2019 - Elsevier
This paper aims to review the encountered technical contradictions when an attacker meets
the cipher-images encrypted by the image encryption schemes (algorithms) proposed in …

An image encryption algorithm based on a hidden attractor chaos system and the Knuth–Durstenfeld algorithm

SC Wang, CH Wang, C Xu - Optics and Lasers in Engineering, 2020 - Elsevier
Chaotic systems have been widely applied in digital image encryption due to their complex
properties such as ergodicity, pseudo randomness and extreme sensitivity to their initial …

An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using enhanced logistic—Tent map

P Ramasamy, V Ranganathan, S Kadry… - Entropy, 2019 - mdpi.com
Nowadays, the images are transferred through open channels that are subject to potential
attacks, so the exchange of image data requires additional security in many fields, such as …

Computational image encryption techniques: a comprehensive review

M Kaur, S Singh, M Kaur - Mathematical Problems in …, 2021 - Wiley Online Library
Images contain very sensitive and confidential information. Because images play a
significant role in many applications such as military communication, remote‐sensing, and …

A new permutation-diffusion-based image encryption technique using cellular automata and DNA sequence

A Babaei, H Motameni, R Enayatifar - Optik, 2020 - Elsevier
In recent years, the security of digital images has constantly been a major topic discussed by
researchers. In this paper, we proposed a new structure for image encryption using …

Compressive sensing based image compression-encryption using novel 1D-chaotic map

R Ponuma, R Amutha - Multimedia Tools and Applications, 2018 - Springer
Compressive sensing based encryption achieves simultaneous compression-encryption by
utilizing a low complex sampling process, which is computationally secure. In this paper, a …

Parallel strength Pareto evolutionary algorithm‐II based image encryption

M Kaur, D Singh, R Singh Uppal - IET Image Processing, 2020 - Wiley Online Library
In recent years, many image encryption approaches have been proposed on the basis of
chaotic maps. The various types of chaotic maps such as one‐dimensional and multi …