Survey Study Image Cryptography System
Encryption is vital for data security, converting information into an unreadable format to ensure privacy in online communication and sensitive sectors. Advanced encryption balances innovation and security in user-friendly applications. Image encryption employs techniques to protect image data from...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
EDP Sciences
2024-01-01
|
Series: | BIO Web of Conferences |
Online Access: | https://www.bio-conferences.org/articles/bioconf/pdf/2024/16/bioconf_iscku2024_00044.pdf |
_version_ | 1827287328550289408 |
---|---|
author | Raid Rahman Fatima K Baheeja Salih May A. |
author_facet | Raid Rahman Fatima K Baheeja Salih May A. |
author_sort | Raid Rahman Fatima |
collection | DOAJ |
description | Encryption is vital for data security, converting information into an unreadable format to ensure privacy in online communication and sensitive sectors. Advanced encryption balances innovation and security in user-friendly applications. Image encryption employs techniques to protect image data from unauthorized access during transmission or storage, particularly crucial for safeguarding sensitive images in various applications. The goal is to prevent unauthorized access and ensure the safety of associated information. In this paper, I present a study on previous research related to my investigation, which focuses on encryption in general and image encryption in particular. The paper also discusses the methods used, particularly those closely related to my work, involving either SHA-256, MD5, or a combination of both. The review will look at the many strategies and techniques employed, as well as how precisely the task was completed by applying a set of parameters in comparison to earlier studies. |
first_indexed | 2024-04-24T10:55:27Z |
format | Article |
id | doaj.art-8010fdd9d8ed4365a5acb721ba26a657 |
institution | Directory Open Access Journal |
issn | 2117-4458 |
language | English |
last_indexed | 2024-04-24T10:55:27Z |
publishDate | 2024-01-01 |
publisher | EDP Sciences |
record_format | Article |
series | BIO Web of Conferences |
spelling | doaj.art-8010fdd9d8ed4365a5acb721ba26a6572024-04-12T07:36:22ZengEDP SciencesBIO Web of Conferences2117-44582024-01-01970004410.1051/bioconf/20249700044bioconf_iscku2024_00044Survey Study Image Cryptography SystemRaid Rahman Fatima0K Baheeja1Salih May A.2Department of Computer Science College of Computer Science and Information Technology, University of KarbalaDepartment of Computer Science College of Computer Science and Information Technology, University of KarbalaDepartment of Cyber Security, College of Information Technology, University of BabylonEncryption is vital for data security, converting information into an unreadable format to ensure privacy in online communication and sensitive sectors. Advanced encryption balances innovation and security in user-friendly applications. Image encryption employs techniques to protect image data from unauthorized access during transmission or storage, particularly crucial for safeguarding sensitive images in various applications. The goal is to prevent unauthorized access and ensure the safety of associated information. In this paper, I present a study on previous research related to my investigation, which focuses on encryption in general and image encryption in particular. The paper also discusses the methods used, particularly those closely related to my work, involving either SHA-256, MD5, or a combination of both. The review will look at the many strategies and techniques employed, as well as how precisely the task was completed by applying a set of parameters in comparison to earlier studies.https://www.bio-conferences.org/articles/bioconf/pdf/2024/16/bioconf_iscku2024_00044.pdf |
spellingShingle | Raid Rahman Fatima K Baheeja Salih May A. Survey Study Image Cryptography System BIO Web of Conferences |
title | Survey Study Image Cryptography System |
title_full | Survey Study Image Cryptography System |
title_fullStr | Survey Study Image Cryptography System |
title_full_unstemmed | Survey Study Image Cryptography System |
title_short | Survey Study Image Cryptography System |
title_sort | survey study image cryptography system |
url | https://www.bio-conferences.org/articles/bioconf/pdf/2024/16/bioconf_iscku2024_00044.pdf |
work_keys_str_mv | AT raidrahmanfatima surveystudyimagecryptographysystem AT kbaheeja surveystudyimagecryptographysystem AT salihmaya surveystudyimagecryptographysystem |