Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

A Literature Review on Image Encryption Techniques

A Literature Review on Image Encryption Techniques 3D Res (2014) 5:29 DOI 10.1007/s13319-014-0029-0 3DR REVIEW Majid Khan Tariq Shah Received: 29 June 2014 / Revised: 24 September 2014 / Accepted: 2 October 2014 / Published online: 22 October 2014 © 3D Research Center, Kwangwoon University and Springer-Verlag Berlin Heidelberg 2014 Abstract Image encryption plays a paramount part procurements get essential in practice and along these to guarantee classified transmission and capacity of lines security of sight and sound data has gotten image over web. Then again, a real-time image standard concern. The central issues identifying with encryption confronts a more noteworthy test because the issue of encryption has been inspected and of vast measure of information included. This paper moreover an outline on picture encryption strategies exhibits an audit on image encryption in spatial, centered on chaotic techniques have been overseen in frequency and hybrid domains with both full encryp- the present correspondence. tion and selective encryption strategy. The chaotic image encryption could be made by using properties of chaos including deterministic Keywords Image encryption · Domains of image elements, erratic conduct and non-straight change. encryption · Full and selective image This thought prompts routines that can in the encryption techniques meantime give security limits and http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png 3D Research Springer Journals

A Literature Review on Image Encryption Techniques

3D Research , Volume 5 (4) – Oct 22, 2014

Loading next page...
 
/lp/springer-journals/a-literature-review-on-image-encryption-techniques-SPXTdZ3HiB

References (95)

Publisher
Springer Journals
Copyright
Copyright © 2014 by 3D Research Center, Kwangwoon University and Springer-Verlag Berlin Heidelberg
Subject
Engineering; Signal, Image and Speech Processing; Computer Imaging, Vision, Pattern Recognition and Graphics; Optics, Optoelectronics, Plasmonics and Optical Devices
eISSN
2092-6731
DOI
10.1007/s13319-014-0029-0
Publisher site
See Article on Publisher Site

Abstract

3D Res (2014) 5:29 DOI 10.1007/s13319-014-0029-0 3DR REVIEW Majid Khan Tariq Shah Received: 29 June 2014 / Revised: 24 September 2014 / Accepted: 2 October 2014 / Published online: 22 October 2014 © 3D Research Center, Kwangwoon University and Springer-Verlag Berlin Heidelberg 2014 Abstract Image encryption plays a paramount part procurements get essential in practice and along these to guarantee classified transmission and capacity of lines security of sight and sound data has gotten image over web. Then again, a real-time image standard concern. The central issues identifying with encryption confronts a more noteworthy test because the issue of encryption has been inspected and of vast measure of information included. This paper moreover an outline on picture encryption strategies exhibits an audit on image encryption in spatial, centered on chaotic techniques have been overseen in frequency and hybrid domains with both full encryp- the present correspondence. tion and selective encryption strategy. The chaotic image encryption could be made by using properties of chaos including deterministic Keywords Image encryption · Domains of image elements, erratic conduct and non-straight change. encryption · Full and selective image This thought prompts routines that can in the encryption techniques meantime give security limits and

Journal

3D ResearchSpringer Journals

Published: Oct 22, 2014

There are no references for this article.