A survey of image encryption algorithms

M Kumari, S Gupta, P Sardana - 3D Research, 2017 - Springer
Security of data/images is one of the crucial aspects in the gigantic and still expanding
domain of digital transfer. Encryption of images is one of the well known mechanisms to …

Remodeling randomness prioritization to boost-up security of RGB image encryption

BO Al-Roithy, A Gutub - Multimedia Tools and Applications, 2021 - Springer
Securing information became essential to exchange multimedia information safely. The
exchanged data need to be transformed in a well-managed, secure, and reliable manner. In …

Diffusion–substitution based gray image encryption scheme

NK Pareek, V Patidar, KK Sud - Digital signal processing, 2013 - Elsevier
In this paper, an encryption algorithm for gray images using a secret key of 128-bits size is
proposed. Initially, visual quality of image is degraded by the mixing process. Resultant …

[PDF][PDF] High Capacity data hiding using LSB Steganography and Encryption

SA Laskar, K Hemachandran - International Journal of Database …, 2012 - academia.edu
The network provides a method of communication to distribute information to the masses.
With the growth of data communication over computer network, the security of information …

Image encryption using affine transform and XOR operation

A Nag, JP Singh, S Khan, S Ghosh… - … conference on signal …, 2011 - ieeexplore.ieee.org
Image encryption is a suitable method to protect image data. Image and text data has their
unique features. The available encryption algorithms are good for text data. They may not be …

A novel grayscale image encryption scheme based on the block-level swapping of pixels and the chaotic system

M Hanif, N Iqbal, F Ur Rahman, MA Khan, TM Ghazal… - Sensors, 2022 - mdpi.com
Hundreds of image encryption schemes have been conducted (as the literature review
indicates). The majority of these schemes use pixels as building blocks for confusion and …

A novel data encryption method using an interlaced chaotic transform

E Gokcay, H Tora - Expert Systems with Applications, 2024 - Elsevier
We present a novel data encryption approach that utilizes a cascaded chaotic map
application. The chaotic map used in both permutation and diffusion is Arnold's Cat Map …

Image cryptographic algorithm based on the Haar wavelet transform

S Tedmori, N Al-Najdawi - Information Sciences, 2014 - Elsevier
Lossless encryption methods are more applicable than lossy encryption methods when
marginal distortion is not tolerable. In this research, the authors propose a novel lossless …

CASDC: a cryptographically secure data system based on two private key images

A Al-Hyari, I Al-Taharwa, B Al-Ahmad, Z Alqadi - IEEE Access, 2022 - ieeexplore.ieee.org
Colored digital images are one of the most important types of digital data to be used in many
vital applications, which require a safe way to protect them from hacking operations and the …

Performance evaluation of DWT based image steganography

V Kumar, D Kumar - 2010 IEEE 2nd International Advance …, 2010 - ieeexplore.ieee.org
Steganography plays an important role in the field of information hiding. It is used in wide
variety of applications such as internet security, authentication, copyright protection and …