2022
DOI: 10.1007/s11042-022-12791-6
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive survey on encryption techniques for digital images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(12 citation statements)
references
References 66 publications
0
12
0
Order By: Relevance
“…Encryption and decryption are performed using different encryption keys [37]. These main techniques are divided into many different encryption techniques, including data encryption standard (DES), advanced encryption standard (AES), Blowfish, Digital Signature Algorithm, rivestshamir-adleman (RSA),elliptic curve, DNA,miscellaneous, chaotic, and so on [38][39].In this paper, we will rely on chaotic encryption technique.…”
Section: Cryptography Techniquesmentioning
confidence: 99%
“…Encryption and decryption are performed using different encryption keys [37]. These main techniques are divided into many different encryption techniques, including data encryption standard (DES), advanced encryption standard (AES), Blowfish, Digital Signature Algorithm, rivestshamir-adleman (RSA),elliptic curve, DNA,miscellaneous, chaotic, and so on [38][39].In this paper, we will rely on chaotic encryption technique.…”
Section: Cryptography Techniquesmentioning
confidence: 99%
“…Evaluating the invisibility aspect of watermarking technique refers to how many perceptual modifications are on watermarked CT [12,19]. Even though the embedding capacity for one technique is high, it is undesirable if the cover text gets altered profoundly [16,20,21,22,23]. An invisible or undisguisable alteration on CT is also important to avoid suspicion and to protect the watermark against visual attack [18].…”
Section: ) Embedding Capacitymentioning
confidence: 99%
“…The permutation refers to the change of pixel position, which is a crucial step in designing encryption algorithm [16,17]. Wang et al proposed a cross-plane scrambling method by using chaotic sequence and cyclic shift operation, which can simultaneously scramble the R, G and B components of a color image.…”
Section: Introductionmentioning
confidence: 99%