Visible to the public A survey on Symmetric and Asymmetric Key based Image Encryption

TitleA survey on Symmetric and Asymmetric Key based Image Encryption
Publication TypeConference Paper
Year of Publication2020
AuthorsKumar, S., Singh, B. K., Akshita, Pundir, S., Batra, S., Joshi, R.
Conference Name2nd International Conference on Data, Engineering and Applications (IDEA)
KeywordsAsymmetric, Asymmetric Encryption, asymmetric key, authenticity, cipher text, composability, cryptography, decryption, different transfer mediums, Encryption, encryption algorithms, encryption approaches, era security, Human Behavior, Image coding, image destruction, image encryption techniques, image processing, Metrics, pubcrawl, Resiliency, symmetric, technological advancements especially wireless sensor network, Wireless sensor networks
AbstractImage Encryption is a technique where an algorithm along with a set of characters called key encrypts the data into cipher text. The cipher text can be converted back into plaintext by decryption. This technique is employed for the security of data such that confidentiality, integrity and authenticity of data is maintained. In today's era security of information has become a crucial task, unauthorized access and use of data has become a noticeable issue. To provide the security required, there are several algorithms to suit the purposes. While the use and transferring of images has become easy and faster due to technological advancements especially wireless sensor network, image destruction and illegitimate use has become a potential threat. Different transfer mediums and various uses of images require different and appropriately suiting encryption approaches. Hence, in this paper we discuss the types of image encryption techniques. We have also discussed several encryption algorithms, their advantages and suitability.
DOI10.1109/IDEA49133.2020.9170703
Citation Keykumar_survey_2020