Survey on Image Encryption Schemes, Bio cryptography and Efficient Encryption Algorithms

被引:17
|
作者
Murugan, Chinnandi Arul [1 ]
Karthigaikumar, P. [2 ]
机构
[1] Karpagam Coll Engn, Dept Elect & Telecommun Engn, Coimbatore, Tamil Nadu, India
[2] Karpagam Coll Engn, Dept Elect & Commun Engn, Coimbatore, Tamilnadu, India
关键词
Advanced encryption standard; Encryption; S-box; Pipelining; Bio-cryptosystem; AES; FPGA;
D O I
10.1007/s11036-018-1058-3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptography protects the data stored in the network from unauthorized access. It is very essential to transfer data with high security. Biometrics is a unique part of human beings and it is a widely-known person authenticator. The exchange of all medical data has been done across the globe abundantly. Advanced Encryption Standard (AES) encryption algorithm is used for high security and it is most powerful cryptographic algorithm. This algorithm is widely preferred because of its long term security and has wide range of application and protocols. Protecting data over the network has become a significant issue due to enormous exchange of sensitive information takes place. Cryptography is used for secret information transmission in various fields like hospitals, research, medical applications etc., This article is a survey of familiar encryption techniques from which researches can acquire conception of suitable techniques to be used.
引用
收藏
页码:1385 / 1390
页数:6
相关论文
共 50 条
  • [1] A survey on Conventional Encryption Algorithms of Cryptography
    Yegireddi, Ramesh
    Kumar, R. Kiran
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [2] JPEG Image Encryption with Elliptic Curve Cryptography
    Bakhtiari, Saeid
    Ibrahim, Subariah
    Salleh, Mazleena
    Bakhtiari, Majid
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 144 - 149
  • [3] Meteosat Images Encryption based on AES and RSA Algorithms Meteosat Image Encryption
    Belkaid, Boukhatem Mohammed
    Mourad, Lahdir
    Mehdi, Cherifi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (06) : 203 - 208
  • [4] Emerging DNA cryptography-based encryption schemes: a review
    Mukherjee, Pratyusa
    Pradhan, Chittaranjan
    Barik, Rabindra Kumar
    Dubey, Harishchandra
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 20 (1-2) : 27 - 47
  • [5] Image Encryption and Decryption Schemes Using Linear and Quadratic Fractal Algorithms and Their Systems
    Kovalchuk, Anatoliy
    Izonin, Ivan
    Strauss, Christine
    Podavalkina, Mariia
    Lotoshynska, Natalia
    Kustra, Nataliya
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON DIGITAL CONTENT & SMART MULTIMEDIA (DCSMART 2019): VOL 1, 2019, 2533 : 139 - 150
  • [6] Color image encryption using DNA based cryptography
    Nandy N.
    Banerjee D.
    Pradhan C.
    International Journal of Information Technology, 2021, 13 (2) : 533 - 540
  • [7] Image Steganography Using LSB and Hybrid Encryption Algorithms
    Alanzy, May
    Alomrani, Razan
    Alqarni, Bashayer
    Almutairi, Saad
    APPLIED SCIENCES-BASEL, 2023, 13 (21):
  • [8] A Survey on Encryption Schemes in Wireless Sensor Networks
    Hayouni, Haythem
    Hamdi, Mohamed
    Kim, Tai-Hoon
    2014 7TH INTERNATIONAL CONFERENCE ON ADVANCED SOFTWARE ENGINEERING AND ITS APPLICATIONS (ASEA), 2014, : 39 - 43
  • [9] A Survey on Homomorphic Encryption Schemes: Theory and Implementation
    Acar, Abbas
    Aksu, Hidayet
    Uluagac, A. Selcuk
    Conti, Mauro
    ACM COMPUTING SURVEYS, 2018, 51 (04)
  • [10] Comparisons of Encryption Algorithms in Histogram-Equalized Image
    Huang, Lican
    Wu, Chuane
    Chen, LiYa
    Zhu, Lian
    2013 FOURTH INTERNATIONAL CONFERENCE ON NETWORKING AND DISTRIBUTED COMPUTING (ICNDC), 2013, : 80 - 81