2022
DOI: 10.3389/fams.2022.1039758
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption using fractional integral transforms: Vulnerabilities, threats, and future scope

Abstract: With the enormous usage of digital media in almost every sphere from education to entertainment, the security of sensitive information has been a concern. As images are the most frequently used means to convey information, the issue related to the privacy preservation needs to be addressed in each of the application domains. There are various security methods proposed by researchers from time to time. This paper presents a review of various image encryption schemes based on fractional integral transform. As th… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 192 publications
0
6
0
Order By: Relevance
“…The sensitivity of the encryption scheme should be evaluated from two aspects. First, in the encryption phase, input keys with small differences should produce completely different ciphertext images; second, in the decryption phase, small changes to the correct decryption key will not effectively recover the original image (Kaur, Agarwal, et al 2022). Therefore, in this section, the encryption process and the decryption process are examined from both sides.…”
Section: Sensitivity Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…The sensitivity of the encryption scheme should be evaluated from two aspects. First, in the encryption phase, input keys with small differences should produce completely different ciphertext images; second, in the decryption phase, small changes to the correct decryption key will not effectively recover the original image (Kaur, Agarwal, et al 2022). Therefore, in this section, the encryption process and the decryption process are examined from both sides.…”
Section: Sensitivity Analysismentioning
confidence: 99%
“…The communication channels over which the image information is transferred are responsible for the addition of some noise in the form of degradation or distortion (Kaur, Agarwal, et al 2022). To corrupt the useful information, the attacker may introduce noise into the encrypted image so that the user cannot successfully recover the original image after decryption (Kaur and Kumar 2018).…”
Section: Analysis Of Noise Attackmentioning
confidence: 99%
“…The optical image encryption systems utilize optical setups (lenses, spatial lens modulators, etc.) [2][3][4], double random phase encoding (DRPE) with optically or electronically generated random phase masks [4][5][6][7][8], and mathematical modeling with integral transforms [4,9,10]. Such systems have the advantage of sending complex data in parallel and are also capable of carrying out usually time-consuming operations in a faster way, therefore are found suitable in image encryption.…”
Section: Introductionmentioning
confidence: 99%
“…Such systems have the advantage of sending complex data in parallel and are also capable of carrying out usually time-consuming operations in a faster way, therefore are found suitable in image encryption. Besides having above mentioned clear advantages, the optical processes governed by the integral transforms possess the linearity and symmetry properties which make the optical encryption system vulnerable to various cryptanalytic attacks [4,[11][12][13]. On the other hand, DNA computing, since its advent in 1994 [14], has attracted the attention of researchers due to some of its peculiar features like huge informationcarrying capacity, parallelism, ultra-low energy consumption etc.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation