2023
DOI: 10.1109/access.2023.3287858
|View full text |Cite
|
Sign up to set email alerts
|

Multimedia Security Using Encryption: A Survey

Abstract: Considering the current dependency on digital technology in modern society, the protection of multimedia is highly important. Encryption is vital in modern digital communication, ensuring data confidentiality, authentication, integrity, and non-repudiation. Multimedia encryption-based security techniques are becoming increasingly important as they allow for the secure sharing of multimedia content on digital platforms. This survey aims to review the state of secure and privacy-preserving encryption schemes app… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(10 citation statements)
references
References 103 publications
0
10
0
Order By: Relevance
“…The correlation coefficient (ρ) assesses the confusion and diffusion effects in an encrypted image by considering pairs of pixels [34]. It is defined by Equation (4).…”
Section: Correlation Coefficientmentioning
confidence: 99%
See 1 more Smart Citation
“…The correlation coefficient (ρ) assesses the confusion and diffusion effects in an encrypted image by considering pairs of pixels [34]. It is defined by Equation (4).…”
Section: Correlation Coefficientmentioning
confidence: 99%
“…Proof. Another method to derive the variance result is through the proposition in Equation (34), which applies to linear functions of the form aK + b [43].…”
Section: Variancementioning
confidence: 99%
“…The values of the pixels vary throughout the diffusion phase corresponding with the chaotic random sequence. Until the pixel values are all modified and the encryption is finished, repeat the two actions multiple times [25], [42][43][44][45]. Since the majority of the images have substantial relationships between adjacent pixels, we substitute the RGB image pixels using chaotic sequences to get rid of the correlations.…”
Section: Three Dimensional Substitution Bit Levelsmentioning
confidence: 99%
“…Secure encryption techniques aim to disrupt these patterns and create a more uniform distribution of pixel values in the encrypted image's histogram. This makes it challenging for attackers to infer meaningful information about the original image from its visual appearance or statistical properties [42][43][44][45].…”
Section: Analytical Histogrammentioning
confidence: 99%
See 1 more Smart Citation