A Comprehensive Review of Color Image Encryption Technology

  • Dawood A
  • Thabit Q
  • Fahad T
N/ACitations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

Today, with the continuous increase in the use of computer networks and the rapid evolution of information technologies. The secure transmission of data over the Internet has become an urgent necessity to preserve the privacy of users and protect sensitive information from theft and distortion. images are most of this transferred data, so it was necessary to protect it by encrypting them using algorithms that ensure the protection of information access to the receiver. Color images contain sensitive information and details that must be secured and protected. This paper produces a comprehensive review of image encryption methods and classifies them based on various concepts such as chaotic maps, DNA, etc. with comparisons between existing approaches to accessing different security parameters. Additionally, the types of encryption keys were reviewed along with some common types of attacks and the most important methods for measuring encryption efficiency.

Cite

CITATION STYLE

APA

Dawood, A., Thabit, Q., & Fahad, T. (2023). A Comprehensive Review of Color Image Encryption Technology. Basrah Journal for Engineering Science, 23(1), 56–63. https://doi.org/10.33971/bjes.23.1.8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free