A comprehensive survey on image encryption: Taxonomy, challenges, and future directions

被引:36
作者
Saberikamarposhti, Morteza [1 ]
Ghorbani, Amirabbas [2 ]
Yadollahi, Mehdi [2 ]
机构
[1] Multimedia Univ MMU, Fac Comp & Informat, Cyberjaya 63100, Selangor, Malaysia
[2] Islamic Azad Univ, Ayatollah Amoli Branch, Amol, Iran
关键词
Image encryption; Survey; Symmetric encryption; Asymmetric encryption; Hybrid encryption; ALGORITHM; SCHEME; COMPRESSION; BOX;
D O I
10.1016/j.chaos.2023.114361
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Image encryption is a critical component of modern data security, ensuring the confidentiality, integrity, and privacy of sensitive visual content. In this paper, we present a comprehensive survey on image encryption, exploring various encryption algorithms, their strengths, weaknesses, and real-world applications. We begin by providing a background on image encryption, highlighting its importance in safeguarding image data from unauthorized access and tampering. We discuss symmetric, asymmetric, and hybrid encryption techniques, analyzing their suitability for different scenarios. Evaluation metrics for assessing encryption algorithms are discussed, emphasizing the importance of selecting appropriate metrics to measure security and performance. Additionally, we explore the challenges faced in image encryption, such as key management and computational complexity. The survey also delves into potential future directions in image encryption, including robustness against cryptanalysis, quantum image encryption, and multimedia encryption. Furthermore, we discuss the importance of image encryption in various industries, such as military, healthcare, finance, journalism, and intellectual property protection. Real-world use cases are presented, highlighting scenarios where image en-cryption is crucial for maintaining confidentiality, integrity, and privacy. Finally, we conclude by summarizing the survey findings and identifying potential areas for further research and improvement in image encryption. This comprehensive survey serves as a valuable resource for researchers, practitioners, and decision-makers in the field of image security, facilitating the development of more secure and efficient image encryption solutions to meet the increasing demand for data protection and privacy in the digital age.
引用
收藏
页数:25
相关论文
共 99 条
  • [1] Evolutionary-based image encryption using biomolecules operators and non-coupled map lattice
    Abbasi, Ali Asghar
    Mazinani, Mahdi
    Hosseini, Rahil
    [J]. OPTIK, 2020, 219
  • [2] Chaotic evolutionary-based image encryption using RNA codons and amino acid truth table
    Abbasi, Ali Asghar
    Mazinani, Mahdi
    Hosseini, Rahil
    [J]. OPTICS AND LASER TECHNOLOGY, 2020, 132
  • [3] A Lyapunov-based direct adaptive controller for the suppression and synchronization of a perturbed nuclear spin generator chaotic system
    Ahmad, Israr
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2021, 395
  • [4] Implementing a Symmetric Lightweight Cryptosystem in Highly Constrained IoT Devices by Using a Chaotic S-Box
    Alshammari, Badr M.
    Guesmi, Ramzi
    Guesmi, Tawfik
    Alsaif, Haitham
    Alzamil, Ahmed
    [J]. SYMMETRY-BASEL, 2021, 13 (01): : 1 - 20
  • [5] Double layered Fridrich structure to conserve medical data privacy using quantum cryptosystem
    Aparna, H.
    Bhumijaa, B.
    Santhiyadevi, R.
    Vaishanavi, K.
    Sathanarayanan, M.
    Rengarajan, Amirtharajan
    Praveenkumar, Padmapriya
    Abd El-Latif, Ahmed A.
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63
  • [6] Arian M, 2022, INT C MECH MAN PROC, P371
  • [7] Asadollahi H, 2011, Aust J Basic Appl Sci, V5, P121
  • [8] A fast and secure public-key image encryption scheme based on Mordell elliptic curves
    Azam, Naveed Ahmed
    Ullah, Ikram
    Hayat, Umar
    [J]. OPTICS AND LASERS IN ENGINEERING, 2021, 137
  • [9] Image encryption approach using improved chaotic system incorporated with differential evolution and genetic algorithm
    Bhowmik, Sandeep
    Acharyya, Sriyankar
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 72
  • [10] Image encryption based on 8D hyperchaotic system using Fibonacci Q-Matrix
    Biban, Geeta
    Chugh, Renu
    Panwar, Anju
    [J]. CHAOS SOLITONS & FRACTALS, 2023, 170