<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>bujse</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Beykent Üniversitesi Fen ve Mühendislik Bilimleri Dergisi</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">1307-3818</issn>
                                        <issn pub-type="epub">1307-3826</issn>
                                                                                            <publisher>
                    <publisher-name>Beykent University</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.20854/bujse.1114856</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Engineering</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Mühendislik</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <trans-title-group xml:lang="tr">
                                    <trans-title>BAZI GÖRÜNTÜ ŞİFRELEME TEKNİKLERİNİN PERFORMANS ANALİZİ UYGULAMALARI</trans-title>
                                </trans-title-group>
                                                                                                                                                                                                <article-title>PERFORMANCE ANALYSIS APPLİCATIONS OF SOME IMAGE ENCRYPTION TECHNIQUES</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0001-7844-2579</contrib-id>
                                                                <name>
                                    <surname>Tiken</surname>
                                    <given-names>Cihan</given-names>
                                </name>
                                                                    <aff>HARRAN ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-8723-1228</contrib-id>
                                                                <name>
                                    <surname>Şamlı</surname>
                                    <given-names>Rüya</given-names>
                                </name>
                                                                    <aff>ISTANBUL UNIVERSITY-CERRAHPASA</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20221230">
                    <day>12</day>
                    <month>30</month>
                    <year>2022</year>
                </pub-date>
                                        <volume>15</volume>
                                        <issue>2</issue>
                                        <fpage>77</fpage>
                                        <lpage>88</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20220510">
                        <day>05</day>
                        <month>10</month>
                        <year>2022</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20220606">
                        <day>06</day>
                        <month>06</month>
                        <year>2022</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2007, Beykent University Journal of Science and Engineering</copyright-statement>
                    <copyright-year>2007</copyright-year>
                    <copyright-holder>Beykent University Journal of Science and Engineering</copyright-holder>
                </permissions>
            
                                                                                                <trans-abstract xml:lang="tr">
                            <p>İçinde bulunduğumuz teknoloji çağında veri güvenliği artık hükümetlerin, şirketlerin ve bireylerin en hayati ve en önemli konusu haline geldi. Veri türleri arasında görseller içerdikleri önemli bilgiler nedeniyle özel bir öneme sahiptir. Görüntülerin aktarılması veya saklanması ekstra güvenlik önlemleri gerektirir. Bu çalışmada, bazı görüntü şifreleme yöntemleri görüntü işleme alanında en popüler ve en çok kullanılan görüntülere uygulanarak performansları karşılaştırılmıştır. Dört farklı deney gerçekleştirilmiştir. Yedi farklı şifreleme yönteminin performansları birbirleri ile karşılaştırılarak yapılan ölçümler ve elde edilen gözlemler sunulmuştur.</p></trans-abstract>
                                                                                                                                    <abstract><p>Data security is now the most vital and most important issue of governments, companies and individuals in the technology age we live in. Among the data types, images have a special importance because of the important information they contain. Transferring or storing images requires extra security measures. In this study, the performances of the image encryption methods were compared with each other by applying them to the most popular and most used images in the image processing area. Four different experiments were carried out. Performance of the seven particular encryption methods compared to each other and the obsevations and measurements was presented.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Data security</kwd>
                                                    <kwd>  Image processing</kwd>
                                                    <kwd>  Cryptology</kwd>
                                            </kwd-group>
                            
                                                <kwd-group xml:lang="tr">
                                                    <kwd>Görüntü İşleme</kwd>
                                                    <kwd>  Veri Güvenliği</kwd>
                                                    <kwd>  Kriptoloji</kwd>
                                            </kwd-group>
                                                                                                                                        </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1] Srividya, G. &amp; Nandakumar, P.. (2011). A Triple-Key chaotic image encryption method. ICCSP 2011 - 2011 International Conference on Communications and Signal Processing.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2] Chai, X., Zheng, X., Gan, Z., Han, D., &amp; Chen, Y. (2018). An image encryption algorithm based on chaotic system and compressive sensing. Signal Processing, 148, 124-144.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3] Zhang, Y., Li, Y., &amp; Su, J. (2018). Iterative learning control for image feature extraction with multiple-image blends. EURASIP Journal on Image and Video Processing, 2018(1), 1-11.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4] Jiang, N., Zhao, N., &amp; Wang, L. (2016). LSB based quantum image steganography algorithm. International Journal of Theoretical Physics, 55(1), 107-123.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5] Muhammad, K., Ahmad, J., Farman, H., &amp; Zubair, M. (2015). A novel image steganographic approach for hiding text in color images using HSI color model. arXiv preprint arXiv:1503.00388.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6] Isac, B., &amp; Santhi, V. (2011). A study on digital image and video watermarking schemes using neural networks. International Journal of Computer Applications, 12(9), 1-6.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7] Gonzalez, R. C., &amp; Woods, R. E. (1992). Instructor&#039;s manual for digital image processing (Vol. 199). Addison-Wesley.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8] Davies, E. R. (2004). Machine vision: theory, algorithms, practicalities. Elsevier.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9] Horn, B. K., &amp; Vision, R. (1986). MIT Press. Cambridge, Massachusetts.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10] Anandakumar, S. (2015). Image cryptography using RSA algorithm in network security. International Journal of Computer Science &amp; Engineering Technology, 5(9), 326-330.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11] Xue, X., Zhou, D., &amp; Zhou, C. (2020). New insights into the existing image encryption algorithms based on DNA coding. Plos one, 15(10), e0241184.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12] Mousa, H. M. (2016). DNA-Genetic Encryption Technique. International Journal of Computer Network &amp; Information Security, 8(7).</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13] Shaheen, A.M., Sheltami, T.R., Al-Kharoubi, T.M. et al. Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT. J Ambient Intell Human Comput 10, 4733–4750 (2019).</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14] Shiguo Lian, Jinsheng Sun and Zhiquan Wang, &quot;A novel image encryption scheme based-on JPEG encoding,&quot; Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004., 2004, pp. 217-220.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
