Systematic Survey on Visually Meaningful Image Encryption Techniques

被引:5
|
作者
Himthani, Varsha [1 ]
Dhaka, Vijaypal Singh [1 ]
Kaur, Manjit [2 ]
Singh, Dilbag [2 ]
Lee, Heung-No [2 ]
机构
[1] Manipal Univ Jaipur, Comp & Commun Engn, Jaipur 303007, Rajasthan, India
[2] Gwangju Inst Sci & Technol, Sch Elect Engn & Comp Sci, Gwangju 61005, South Korea
基金
新加坡国家研究基金会;
关键词
Cryptography; Encryption; Security; Discrete wavelet transforms; Color; Gray-scale; Image color analysis; Embedded systems; Embedding; encryption; information security; visually meaningful image encryption; attacker; attacks; DECOMPOSITION; ALGORITHM;
D O I
10.1109/ACCESS.2022.3203173
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to advancements in technology, digital images are widely used in various applications like medical field, military communication, remote sensing, etc. These images may contain sensitive and confidential information. Therefore, images are required to be protected from unauthorized access. Many image protection techniques have been proposed in past years. The most common technique to protect the images is encryption. In this technique, a secret key and an encryption algorithm are used to change the plain image into an encrypted image. The encrypted image looks like a noisy image and can easily attract the attacker's attention. If an image gets captured and stacked, sensitive information can be revealed. In this regard, Visually Meaningful Encrypted Image (VMEI) technique is developed, which initially encrypts the original image and then hides it into a reference image. The final encrypted image looks like a normal image. Hence, the VMEI technique provides more security as compared to simple image encryption techniques. Therefore, a systematic survey of existing VMEI techniques is presented in this paper. The VMEI techniques are divided into different categories based on their characteristics. Moreover, this paper elaborates and investigates the improvements and analyses performed on VMEI techniques based on various evaluation parameters. These evaluation parameters are divided into different categories such as security attacks, encryption key attacks, quality analysis, and noise attacks. Finally, this paper discusses the potential applications and future challenges of VMEI techniques.
引用
收藏
页码:98360 / 98373
页数:14
相关论文
共 50 条
  • [1] Visually Meaningful Image Encryption
    Arunkumar, S.
    Senthilselvan, N.
    Jangiti, Saikishor
    RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2016, 7 (06): : 128 - 135
  • [2] An overview of visually meaningful ciphertext image encryption
    Jing Shiwei
    Li Jianjun
    Multimedia Tools and Applications, 2025, 84 (14) : 13617 - 13652
  • [3] A Meaningful Visually Secure Image Encryption Scheme
    Fu, Jie
    Ping, Ping
    Gao, Zeyu
    Mao, Yingchi
    2019 IEEE FIFTH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (IEEE BIGDATASERVICE 2019), 2019, : 199 - 204
  • [4] Primitively visually meaningful image encryption: A new paradigm
    Zhao, Ruoyu
    Zhang, Yushu
    Nan, Yu
    Wen, Wenying
    Chai, Xiuli
    Lan, Rushi
    INFORMATION SCIENCES, 2022, 613 : 628 - 648
  • [5] Visually Meaningful Multi-image Encryption Scheme
    Laiphrakpam Dolendro Singh
    Khumanthem Manglem Singh
    Arabian Journal for Science and Engineering, 2018, 43 : 7397 - 7407
  • [6] Visually Meaningful Multi-image Encryption Scheme
    Singh, Laiphrakpam Dolendro
    Singh, Khumanthem Manglem
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (12) : 7397 - 7407
  • [7] Image encryption: Generating visually meaningful encrypted images
    Bao, Long
    Zhou, Yicong
    INFORMATION SCIENCES, 2015, 324 : 197 - 207
  • [8] Image salient regions encryption for generating visually meaningful ciphertext image
    Wen, Wenying
    Zhang, Yushu
    Fang, Yuming
    Fang, Zhijun
    NEURAL COMPUTING & APPLICATIONS, 2018, 29 (03): : 653 - 663
  • [9] Image salient regions encryption for generating visually meaningful ciphertext image
    Wenying Wen
    Yushu Zhang
    Yuming Fang
    Zhijun Fang
    Neural Computing and Applications, 2018, 29 : 653 - 663
  • [10] Visually meaningful image encryption algorithm based on digital signature
    Xiaoling Huang
    Youxia Dong
    Guodong Ye
    WunShe Yap
    BokMin Goi
    Digital Communications and Networks, 2023, 9 (01) : 159 - 165