A comprehensive survey on image encryption: Taxonomy, challenges, and future directions

被引:34
|
作者
Saberikamarposhti, Morteza [1 ]
Ghorbani, Amirabbas [2 ]
Yadollahi, Mehdi [2 ]
机构
[1] Multimedia Univ MMU, Fac Comp & Informat, Cyberjaya 63100, Selangor, Malaysia
[2] Islamic Azad Univ, Ayatollah Amoli Branch, Amol, Iran
关键词
Image encryption; Survey; Symmetric encryption; Asymmetric encryption; Hybrid encryption; ALGORITHM; SCHEME; COMPRESSION; BOX;
D O I
10.1016/j.chaos.2023.114361
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Image encryption is a critical component of modern data security, ensuring the confidentiality, integrity, and privacy of sensitive visual content. In this paper, we present a comprehensive survey on image encryption, exploring various encryption algorithms, their strengths, weaknesses, and real-world applications. We begin by providing a background on image encryption, highlighting its importance in safeguarding image data from unauthorized access and tampering. We discuss symmetric, asymmetric, and hybrid encryption techniques, analyzing their suitability for different scenarios. Evaluation metrics for assessing encryption algorithms are discussed, emphasizing the importance of selecting appropriate metrics to measure security and performance. Additionally, we explore the challenges faced in image encryption, such as key management and computational complexity. The survey also delves into potential future directions in image encryption, including robustness against cryptanalysis, quantum image encryption, and multimedia encryption. Furthermore, we discuss the importance of image encryption in various industries, such as military, healthcare, finance, journalism, and intellectual property protection. Real-world use cases are presented, highlighting scenarios where image en-cryption is crucial for maintaining confidentiality, integrity, and privacy. Finally, we conclude by summarizing the survey findings and identifying potential areas for further research and improvement in image encryption. This comprehensive survey serves as a valuable resource for researchers, practitioners, and decision-makers in the field of image security, facilitating the development of more secure and efficient image encryption solutions to meet the increasing demand for data protection and privacy in the digital age.
引用
收藏
页数:25
相关论文
共 50 条
  • [21] A survey on encrypted network traffic: A comprehensive survey of identification/classification techniques, challenges, and future directions
    Sharma, Adit
    Lashkari, Arash Habibi
    COMPUTER NETWORKS, 2025, 257
  • [22] Video Steganography Techniques: Taxonomy, Challenges, and Future Directions
    Mstafa, Ramadhan J.
    Elleithy, Khaled M.
    Abdelfattah, Eman
    2017 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2017,
  • [23] A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions
    Nelaturu, Keerthi
    Du, Han
    Le, Duc-Phong
    CRYPTOGRAPHY, 2022, 6 (02)
  • [24] A Comprehensive Survey Analysis for Present Solutions of Medical Image Fusion and Future Directions
    Faragallah, Osama S.
    El-Hoseny, Heba
    El-Shafai, Walid
    Abd El-Rahman, Wael
    El-Sayed, Hala S.
    El-Rabaie, El-Sayed M.
    Abd El-Samie, Fathi E.
    Geweid, Gamal G. N.
    IEEE ACCESS, 2021, 9 : 11358 - 11371
  • [25] A comprehensive survey analysis for present solutions of medical image fusion and future directions
    Faragallah, Osama S.
    El-Hoseny, Heba
    El-Shafai, Walid
    El-Rahman, Wael Abd
    El-Sayed, Hala S.
    El-Rabaie, El-Sayed M.
    El-Samie, Fathi E. Abd
    Geweid, Gamal G. N.
    IEEE Access, 2021, 9 : 11358 - 11371
  • [26] A comprehensive review of SAR image filtering techniques: systematic survey and future directions
    Painam R.K.
    Manikandan S.
    Arabian Journal of Geosciences, 2021, 14 (1)
  • [27] Privacy Provision in Collaborative Ehealth With Attribute-Based Encryption: Survey, Challenges and Future Directions
    Edemacu, Kennedy
    Park, Hung Kook
    Jang, Beakcheol
    Kim, Jong Wook
    IEEE ACCESS, 2019, 7 : 89614 - 89636
  • [28] Runtime software patching: Taxonomy, survey and future directions
    Islam, Chadni
    Prokhorenko, Victor
    Babar, M. Ali
    JOURNAL OF SYSTEMS AND SOFTWARE, 2023, 200
  • [29] A survey on VPN: Taxonomy, roles, trends and future directions
    Li, Jianhua
    Feng, Bohao
    Zheng, Hui
    COMPUTER NETWORKS, 2025, 257
  • [30] A comprehensive survey on Machine Learning techniques in opportunistic networks: Advances, challenges and future directions
    Gandhi, Jay
    Narmawala, Zunnun
    PERVASIVE AND MOBILE COMPUTING, 2024, 100