图像加密:传统方法vs替代方法

R. Ratheesh Kumar, Jabin Mathew
{"title":"图像加密:传统方法vs替代方法","authors":"R. Ratheesh Kumar, Jabin Mathew","doi":"10.1109/ICCMC48092.2020.ICCMC-000115","DOIUrl":null,"url":null,"abstract":"Nowadays, securing images is essential because transmissions of images are suffering from various security attacks. Images like medical images, remote-sensing images, etc. have great value both in money and information. Therefore, there are several sophisticated methods for encrypting images. This paper mainly focuses on a survey of such methods and comparative evaluation of them. Here, the reviewers have used 13 papers for the survey and comparative evaluation. Various aspects of image encryption are surveyed and a comparative evaluation of the papers using different parameters such as security attacks, information loss, speed, overhead, etc. is performed. The conclusions are stated with the help of suitable tables. We hope this paper gives an insight into Image Encryption, Encryption Methods, Properties of Images, Evaluation Criteria, Analysis, Attacks, Resistance, Noise, and Information Loss.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Image Encryption:Traditional Methods vs Alternative Methods\",\"authors\":\"R. Ratheesh Kumar, Jabin Mathew\",\"doi\":\"10.1109/ICCMC48092.2020.ICCMC-000115\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, securing images is essential because transmissions of images are suffering from various security attacks. Images like medical images, remote-sensing images, etc. have great value both in money and information. Therefore, there are several sophisticated methods for encrypting images. This paper mainly focuses on a survey of such methods and comparative evaluation of them. Here, the reviewers have used 13 papers for the survey and comparative evaluation. Various aspects of image encryption are surveyed and a comparative evaluation of the papers using different parameters such as security attacks, information loss, speed, overhead, etc. is performed. The conclusions are stated with the help of suitable tables. We hope this paper gives an insight into Image Encryption, Encryption Methods, Properties of Images, Evaluation Criteria, Analysis, Attacks, Resistance, Noise, and Information Loss.\",\"PeriodicalId\":130581,\"journal\":{\"name\":\"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000115\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000115","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

目前,由于图像传输受到各种安全攻击,因此保护图像至关重要。像医学图像、遥感图像等图像在金钱和信息上都有很大的价值。因此,有几种复杂的方法来加密图像。本文主要对这些方法进行综述,并对其进行比较评价。在这里,审稿人使用了13篇论文进行调查和比较评价。对图像加密的各个方面进行了调查,并使用不同的参数(如安全攻击、信息丢失、速度、开销等)对论文进行了比较评估。通过适当的表格对结论进行了说明。我们希望本文能对图像加密、加密方法、图像属性、评估标准、分析、攻击、抵抗、噪声和信息丢失等方面有深入的了解。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Image Encryption:Traditional Methods vs Alternative Methods
Nowadays, securing images is essential because transmissions of images are suffering from various security attacks. Images like medical images, remote-sensing images, etc. have great value both in money and information. Therefore, there are several sophisticated methods for encrypting images. This paper mainly focuses on a survey of such methods and comparative evaluation of them. Here, the reviewers have used 13 papers for the survey and comparative evaluation. Various aspects of image encryption are surveyed and a comparative evaluation of the papers using different parameters such as security attacks, information loss, speed, overhead, etc. is performed. The conclusions are stated with the help of suitable tables. We hope this paper gives an insight into Image Encryption, Encryption Methods, Properties of Images, Evaluation Criteria, Analysis, Attacks, Resistance, Noise, and Information Loss.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Analysis of Time Domain Features of Dysarthria Speech Tourism Recommendation System based on Knowledge Graph Feature Learning IoT systems based on SOA services: Methodologies, Challenges and Future directions Wildfire forecast within the districts of Kerala using Fuzzy and ANFIS A Review Study on the Multiple and Useful Application of Fiber Optic Illumination System
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1