Comparative Analysis and Implementation of Image Encryption Algorithms

被引:0
|
作者
Kaur, Rajinder [1 ]
机构
[1] Punjabi Univ, Univ Coll Engn, Patiala, Punjab, India
关键词
Cryptography; Correlation Coefficient; Encryption; Decryption; Histogram; Selective Image Encryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the rapid growth of digital communication and multimedia application, security becomes an important issue of communication and storage of images., Image security has found a great need in many applications where the information (in the form of image) is to be protected from unauthorized access. Encryption is one of the ways to ensure high security. In recent years, encryption technology has been developed and many image encryption methods have been used. These methods produce randomness in the image so that the content is not visible. Encryption and decryption consume a considerable amount of time. So there is a need for an efficient algorithm. This paper proposed three different image encryption techniques for color image. Simulation results are presented and a comparative analysis of the different methods is discussed.
引用
收藏
页码:53 / 57
页数:5
相关论文
共 50 条
  • [1] Analysis and Comparison of Image Encryption Algorithms
    Oeztuerk, Ismet
    Sogukpinar, Ibrahim
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 3, 2005, 3 : 26 - 30
  • [2] A Review and Comparative Analysis of Various Encryption Algorithms
    Bhanot, Rajdeep
    Hans, Rahul
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (04): : 289 - 306
  • [3] Comparative Analysis of Some Typical Encryption Algorithms and Hash Algorithms
    Li, Jiaxun
    [J]. 2022 INTERNATIONAL CONFERENCE ON BIG DATA, INFORMATION AND COMPUTER NETWORK (BDICN 2022), 2022, : 27 - 30
  • [4] Comparative Study of Image Encryption and Image Steganography Using Cryptographic Algorithms and Image Evaluation Metrics
    Chavali, Surya Teja
    Kandavalli, Charan Tej
    Sugash, T. M.
    Prakash, G.
    [J]. SEMANTIC INTELLIGENCE, ISIC 2022, 2023, 964 : 297 - 311
  • [5] Comparative analysis of image processing algorithms
    P. P. Koltsov
    [J]. Pattern Recognition and Image Analysis, 2012, 22 (1) : 39 - 43
  • [6] Examples of implementation of asymmetric encryption algorithms
    Smirnova, M. A.
    Samoilova, I. A.
    Ustinova, L. V.
    [J]. BULLETIN OF THE KARAGANDA UNIVERSITY-MATHEMATICS, 2015, 80 (04): : 108 - 114
  • [7] Analysis of traditional and modern image encryption algorithms under realistic ambience
    Malik, Anjali
    Gupta, Shailender
    Dhall, Sangeeta
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (37-38) : 27941 - 27993
  • [8] Analysis of traditional and modern image encryption algorithms under realistic ambience
    Anjali Malik
    Shailender Gupta
    Sangeeta Dhall
    [J]. Multimedia Tools and Applications, 2020, 79 : 27941 - 27993
  • [9] Comparative Analysis of the Effects of Chaotic Systems on the Robustness of Image Encryption
    Yildirim, Melih
    [J]. ELECTRICA, 2021, 21 (02): : 209 - 215
  • [10] Comparative Analysis of Joint Encryption and Watermarking Algorithms for Security of Biomedical Images
    Bansal, Siddhant
    Mehta, Garima
    [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), 2017, : 609 - 612