A Survey on Key(s) and Keyless Image Encryption Techniques
As in recent years digital data transmission and image application have been increasing, maintaining secure transmission of image is of high importance. Image Encryption is implemented to achieve security on image applications. This paper exhibits a survey on various existing image encryption techni...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Sciendo
2017-11-01
|
Series: | Cybernetics and Information Technologies |
Subjects: | |
Online Access: | https://doi.org/10.1515/cait-2017-0046 |
_version_ | 1811272369890656256 |
---|---|
author | Ranjan Kumar H. S. Fathimath Safeeriya S. P. Aithal Ganesh Shetty Surendra |
author_facet | Ranjan Kumar H. S. Fathimath Safeeriya S. P. Aithal Ganesh Shetty Surendra |
author_sort | Ranjan Kumar H. S. |
collection | DOAJ |
description | As in recent years digital data transmission and image application have been increasing, maintaining secure transmission of image is of high importance. Image Encryption is implemented to achieve security on image applications. This paper exhibits a survey on various existing image encryption techniques. The paper mainly focuses on two types: Image encryption with Key(s) and Image Encryption without Key(s). In addition it also describes several properties of a good image encryption technique. The paper presents a survey of most popular algorithms and research papers that are related with different image encryption techniques. |
first_indexed | 2024-04-12T22:39:05Z |
format | Article |
id | doaj.art-3eded353868d4a6da9c27c682799b43e |
institution | Directory Open Access Journal |
issn | 1314-4081 |
language | English |
last_indexed | 2024-04-12T22:39:05Z |
publishDate | 2017-11-01 |
publisher | Sciendo |
record_format | Article |
series | Cybernetics and Information Technologies |
spelling | doaj.art-3eded353868d4a6da9c27c682799b43e2022-12-22T03:13:46ZengSciendoCybernetics and Information Technologies1314-40812017-11-0117413416410.1515/cait-2017-0046A Survey on Key(s) and Keyless Image Encryption TechniquesRanjan Kumar H. S.0Fathimath Safeeriya S. P.1Aithal Ganesh2Shetty Surendra3NMAMIT, Nitte, Udupi, Karnataka, IndiaNMAMIT, Nitte, Udupi, Karnataka, IndiaMITE, Moodbidri, Mangalore, Karnataka, IndiaNMAMIT, Nitte, Udupi, Karnataka, IndiaAs in recent years digital data transmission and image application have been increasing, maintaining secure transmission of image is of high importance. Image Encryption is implemented to achieve security on image applications. This paper exhibits a survey on various existing image encryption techniques. The paper mainly focuses on two types: Image encryption with Key(s) and Image Encryption without Key(s). In addition it also describes several properties of a good image encryption technique. The paper presents a survey of most popular algorithms and research papers that are related with different image encryption techniques.https://doi.org/10.1515/cait-2017-0046chaotic sequenceimage scramblingerror diffusionvisual cryptographyrandom grid |
spellingShingle | Ranjan Kumar H. S. Fathimath Safeeriya S. P. Aithal Ganesh Shetty Surendra A Survey on Key(s) and Keyless Image Encryption Techniques Cybernetics and Information Technologies chaotic sequence image scrambling error diffusion visual cryptography random grid |
title | A Survey on Key(s) and Keyless Image Encryption Techniques |
title_full | A Survey on Key(s) and Keyless Image Encryption Techniques |
title_fullStr | A Survey on Key(s) and Keyless Image Encryption Techniques |
title_full_unstemmed | A Survey on Key(s) and Keyless Image Encryption Techniques |
title_short | A Survey on Key(s) and Keyless Image Encryption Techniques |
title_sort | survey on key s and keyless image encryption techniques |
topic | chaotic sequence image scrambling error diffusion visual cryptography random grid |
url | https://doi.org/10.1515/cait-2017-0046 |
work_keys_str_mv | AT ranjankumarhs asurveyonkeysandkeylessimageencryptiontechniques AT fathimathsafeeriyasp asurveyonkeysandkeylessimageencryptiontechniques AT aithalganesh asurveyonkeysandkeylessimageencryptiontechniques AT shettysurendra asurveyonkeysandkeylessimageencryptiontechniques AT ranjankumarhs surveyonkeysandkeylessimageencryptiontechniques AT fathimathsafeeriyasp surveyonkeysandkeylessimageencryptiontechniques AT aithalganesh surveyonkeysandkeylessimageencryptiontechniques AT shettysurendra surveyonkeysandkeylessimageencryptiontechniques |