An overview of encryption algorithms in color images

HM Ghadirli, A Nodehi, R Enayatifar - Signal Processing, 2019 - Elsevier
Nowadays, security in data transfer is of special importance. Images are of the most
attractive kinds of data in the encryption domain. Color images are more attractive than the …

A comprehensive survey on encryption techniques for digital images

M Singh, AK Singh - Multimedia Tools and Applications, 2023 - Springer
With the widespread adoption of smart devices and high-speed networks, investigators are
focusing on securing digital image applications, such as those on social media, in …

A new image encryption algorithm based on chaos and secure hash SHA-256

S Zhu, C Zhu, W Wang - Entropy, 2018 - mdpi.com
In order to overcome the difficulty of key management in “one time pad” encryption schemes
and also resist the attack of chosen plaintext, a new image encryption algorithm based on …

A novel color image encryption algorithm based on spatial permutation and quantum chaotic map

SM Seyedzadeh, B Norouzi, MR Mosavi… - Nonlinear …, 2015 - Springer
In recent years, several algorithms of secure image encryption were studied and developed
through chaotic processes. Most of the previous algorithms encrypt color components …

A novel image encryption based on hash function with only two-round diffusion process

B Norouzi, SM Seyedzadeh, S Mirzakuchaki… - Multimedia …, 2014 - Springer
In this paper, a novel algorithm for image encryption based on hash function is proposed. In
our algorithm, a 512-bit long external secret key is used as the input value of the salsa20 …

A new hyperchaotic map and its application in an image encryption scheme

R Boriga, AC Dăscălescu, I Priescu - Signal Processing: Image …, 2014 - Elsevier
Recently, the hyperchaotic maps have been investigated in order to develop more secure
encryption schemes. In this paper we propose a new hyperchaotic map derived from …

Multiple RGB images encryption algorithm based on elliptic curve, improved Diffie Hellman protocol

Z Bashir, MGA Malik, M Hussain, N Iqbal - Multimedia Tools and …, 2022 - Springer
For the asymmetric key, the Diffie Hellman Key (DHK) protocol is very efficient, but
sometimes it is vulnerable against brute force attacks if the parameters are not chosen …

A secure image encryption method using scan pattern and random key stream derived from laser chaos

T Sivakumar, P Li - Optics & Laser Technology, 2019 - Elsevier
Internet allows people in any corner of the world to share instantly all types of information.
Secure sharing of sensitive multimedia data necessitates confidentiality service, which is …

[PDF][PDF] A survey on different image encryption and decryption techniques

R Pakshwar, VK Trivedi, V Richhariya - International journal of computer …, 2013 - Citeseer
This paper focuses mainly on the different kinds of image encryption and decryption
techniques. In addition focuses on image encryption techniques, As the use digital …

A new efficient lightweight and secure image cipher scheme

H Noura, L Sleem, M Noura, MM Mansour… - Multimedia Tools and …, 2018 - Springer
The protection of multimedia content has become a key area of research, since very often a
user's privacy and confidentiality can be at risk. Although a large number of image …