{"title":"Image Encryption techniques:A Review","authors":"Bhat Jasra, Ayaz Hassan Moon","doi":"10.1109/Confluence47617.2020.9058071","DOIUrl":null,"url":null,"abstract":"Transmission and distribution of multimedia data over public networks including internet and other insecure channels makes it prone to different kinds of active and passive attacks. The attacks could be mitigated by ensuring proper security measures in place. Multimedia data tends to be larger in size, more redundant and Multi-dimensional. Therefore Security requirements of multimedia data including image encryption techniques are different from that of conventional textural encryption schemes. In this paper we review and analyze different image encryption techniques in the context of security parameters used to prove efficiency of security algorithms.","PeriodicalId":180005,"journal":{"name":"2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Confluence47617.2020.9058071","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Transmission and distribution of multimedia data over public networks including internet and other insecure channels makes it prone to different kinds of active and passive attacks. The attacks could be mitigated by ensuring proper security measures in place. Multimedia data tends to be larger in size, more redundant and Multi-dimensional. Therefore Security requirements of multimedia data including image encryption techniques are different from that of conventional textural encryption schemes. In this paper we review and analyze different image encryption techniques in the context of security parameters used to prove efficiency of security algorithms.