Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum Techniques

17Citations
Citations of this article
92Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In the contemporary landscape, where a huge amount of data plays a vital role, the importance of strong and robust cybersecurity measures has become increasingly paramount. This research proposes a review and extensively explores cybersecurity techniques within the domain of machine/deep learning and quantum techniques, with a particular focus on cryptographic methods and methodologies applied to image encryption. The proposed survey covers a range of cybersecurity techniques, including quantum random number generation, secure transmission of quantum images, watermarking through quantum methods, and quantum steganography. Moreover, it explores the domain of image encryption, which integrates adversarial neural networks, deep learning and machine learning, transformation techniques, and chaotic neural networks that can be used to secure digital data from cyber attacks. Our focus extends beyond highlighting advances in investigating vulnerabilities in existing cryptographic techniques. By identifying the challenges and weaknesses, the potential solutions are also presented, establishing a foundation for future recommendations. These future suggestions address and overcome the vulnerabilities observed in existing cybersecurity techniques. The aim of the extensive survey and analysis of existing cryptographic techniques is to provide a deep understanding of innovative and diverse approaches within the cybersecurity domain. Simultaneously, it aims to create a roadmap for the future to counter potential cyber threats and challenges.

References Powered by Scopus

Image Segmentation Using Deep Learning: A Survey

2554Citations
N/AReaders
Get full text

The rise of "big data" on cloud computing: Review and open research issues

2087Citations
N/AReaders
Get full text

Some basic cryptographic requirements for chaos-based cryptosystems

1714Citations
N/AReaders
Get full text

Cited by Powered by Scopus

A novel 2D Log-Logistic–Sine chaotic map for image encryption

7Citations
N/AReaders
Get full text

Robust Encryption Framework for IoT Devices Based on Bit-plane Extraction, Chaotic Sine Models, and Quantum Operations

4Citations
N/AReaders
Get full text

A chaotic image encryption algorithm based on sliding window and pseudo-random stack shuffling

3Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Mehmood, A., Shafique, A., Alawida, M., & Khan, A. N. (2024). Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum Techniques. IEEE Access, 12, 27530–27555. https://doi.org/10.1109/ACCESS.2024.3367232

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 15

88%

Lecturer / Post doc 2

12%

Readers' Discipline

Tooltip

Computer Science 18

90%

Engineering 2

10%

Article Metrics

Tooltip
Mentions
News Mentions: 1

Save time finding and organizing research with Mendeley

Sign up for free