2nd International Conference on Data, Engineering and Applications (IDEA) 2020
DOI: 10.1109/idea49133.2020.9170703
|View full text |Cite
|
Sign up to set email alerts
|

A survey on Symmetric and Asymmetric Key based Image Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…A pair of keys are used when using public key encryption, anyone can encrypt messages but only those who know the private key can decrypt and retrieve the original message. [18]. The following section outlines the most common theories…”
Section: Public Key (Asymmetric) Cryptographymentioning
confidence: 99%
“…A pair of keys are used when using public key encryption, anyone can encrypt messages but only those who know the private key can decrypt and retrieve the original message. [18]. The following section outlines the most common theories…”
Section: Public Key (Asymmetric) Cryptographymentioning
confidence: 99%
“…In many techniques, the key and algorithms cannot be split effectively to improve the security of the Internet. Hence, many research works are going on to realize asymmetric key cryptography techniques [14] [15]. Asymmetric cryptography methods such as Rivest-Shamir-Adleman (RSA) [16] and Elliptic Curve Cryptography (ECC) [17] [18] [19] have been explored and gaining popularity to overcome the challenges of symmetric cryptography.…”
Section: Introductionmentioning
confidence: 99%
“…Protecting sensitive information through implementing access control mechanisms ensures data privacy and security. Two classifications of cryptographic techniques used for data privacy and security are symmetric and asymmetric [13]. In asymmetric cryptography, both the sender and receiver use the shared key for encryption and decryption, whereas in asymmetric, public and private keys are used for the same process.…”
Section: Introductionmentioning
confidence: 99%