EN
TR
A Comprehensive Review About Image Encryption Methods
Abstract
In today’s technology world, data security has a great importance. Because each data type has its own characteristics, there are various methods of providing this security. The main subject of this study is the security of image data which are more complex structures than text data. Using traditional encryption methods alone to ensure security in image data types can create security weaknesses. For this reason, nowadays, some traditional methods are combined with each other or different methods to encrypt image data. In this study, 131 articles were examined and image encryption methods were classified according to the traditional methods they contain. Studies on both colored and gray level images have been handled together. Finally, the images used in the articles were compared with each other in many ways and the results were presented graphically.
Keywords
References
- [1] C. K. Volos, I. M. Kyprianidis and I. N. Stouboulos, “Image encryption process based on chaotic synchronization phenomena,” Signal Processing, vol. 93, no. 5, pp. 1328–1340, 2013.
- [2] A. Kanso and M. Ghebleh, “An algorithm for encryption of secret images into meaningful images,” Opt. Lasers Eng., vol. 90, no. 2016, pp. 196–208, 2017.
- [3] G. Srividya and P. Nandakumar, “A Triple-Key chaotic image encryption method,” ICCSP 2011–Int. Conf. Commun. Signal Process., pp. 266–270, 2011.
- [4] A. V. Diaconu and K. Loukhaoukha, “An improved secure image encryption algorithm based on rubik’s cube principle and digital chaotic cipher,” Math. Probl. Eng., vol. 2013, no. 1, 2013.
- [5] X. Wu, Y. Li and J. Kurths, “A new color image encryption scheme using CML and a fractional-order chaotic system,” PLoS One, vol. 10, no. 3, pp. 1–28, 2015.
- [6] K. Muhammad, M. Sajjad, I. Mehmood, S. Rho and S. W. Baik, “Image steganography using uncorrelated color space and its application for security of visual contents in online social networks,” Futur. Gener. Comput. Syst., vol. 86, pp. 951–960, 2018.
- [7] K. Muhammad, J. Ahmad, H. Farman and M. Zubair, “A Novel Image Steganographic Approach for Hiding Text in Color Images using HSI Color Model,” pp. 11, 2015.
- [8] A. M. Shaheen, T. R. Sheltami, T. M. Al-Kharoubi and E. Shakshuki, “Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT,” J. Ambient Intell. Humaniz. Comput., vol. 10, no. 12, pp. 4733–4750, 2019.
Details
Primary Language
English
Subjects
Computer Software
Journal Section
Review
Publication Date
April 29, 2022
Submission Date
February 1, 2022
Acceptance Date
April 5, 2022
Published in Issue
Year 2022 Volume: 7 Number: 1
APA
Tiken, C., & Samlı, R. (2022). A Comprehensive Review About Image Encryption Methods. Harran Üniversitesi Mühendislik Dergisi, 7(1), 27-49. https://doi.org/10.46578/humder.1066545
AMA
1.Tiken C, Samlı R. A Comprehensive Review About Image Encryption Methods. Harran Üniversitesi Mühendislik Dergisi. 2022;7(1):27-49. doi:10.46578/humder.1066545
Chicago
Tiken, Cihan, and Ruya Samlı. 2022. “A Comprehensive Review About Image Encryption Methods”. Harran Üniversitesi Mühendislik Dergisi 7 (1): 27-49. https://doi.org/10.46578/humder.1066545.
EndNote
Tiken C, Samlı R (April 1, 2022) A Comprehensive Review About Image Encryption Methods. Harran Üniversitesi Mühendislik Dergisi 7 1 27–49.
IEEE
[1]C. Tiken and R. Samlı, “A Comprehensive Review About Image Encryption Methods”, Harran Üniversitesi Mühendislik Dergisi, vol. 7, no. 1, pp. 27–49, Apr. 2022, doi: 10.46578/humder.1066545.
ISNAD
Tiken, Cihan - Samlı, Ruya. “A Comprehensive Review About Image Encryption Methods”. Harran Üniversitesi Mühendislik Dergisi 7/1 (April 1, 2022): 27-49. https://doi.org/10.46578/humder.1066545.
JAMA
1.Tiken C, Samlı R. A Comprehensive Review About Image Encryption Methods. Harran Üniversitesi Mühendislik Dergisi. 2022;7:27–49.
MLA
Tiken, Cihan, and Ruya Samlı. “A Comprehensive Review About Image Encryption Methods”. Harran Üniversitesi Mühendislik Dergisi, vol. 7, no. 1, Apr. 2022, pp. 27-49, doi:10.46578/humder.1066545.
Vancouver
1.Cihan Tiken, Ruya Samlı. A Comprehensive Review About Image Encryption Methods. Harran Üniversitesi Mühendislik Dergisi. 2022 Apr. 1;7(1):27-49. doi:10.46578/humder.1066545
Cited By
Trivium Algoritması Kaynaklı Rastgele Permutasyon Üretimiyle Görüntü Şifreleme Uygulaması
Fırat Üniversitesi Mühendislik Bilimleri Dergisi
https://doi.org/10.35234/fumbd.1122197Medical Image Encryption: A Comprehensive Review
Computers
https://doi.org/10.3390/computers12080160Performance evaluation of an occupant metabolic rate estimation algorithm using activity classification and object detection models
Building and Environment
https://doi.org/10.1016/j.buildenv.2024.111299