Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

Image encryption techniques: A comprehensive review

Kolivand, H, Hamood, SF, Asadianfam, S and Rahim, MS (2024) Image encryption techniques: A comprehensive review. Multimedia Tools and Applications. ISSN 1380-7501

[img]
Preview
Text
s11042-023-17896-0.pdf - Published Version
Available under License Creative Commons Attribution.

Download (2MB) | Preview

Abstract

This paper presents an exhaustive review of research within the field of image encryption techniques. It commences with a general introduction to image encryption, providing an overview of the fundamentals. Subsequently, it explores a comprehensive exploration of chaos-based image encryption, encompassing various methods and approaches within this domain. These methods include full encryption techniques as well as selective encryption strategies, offering insights into their principles and applications. The authors place significant emphasis on surveying prior research contributions, shedding light on noteworthy developments within the field. Additionally, the paper addresses emerging challenges and issues that have arisen as a consequence of these advancements.

Item Type: Article
Uncontrolled Keywords: 0801 Artificial Intelligence and Image Processing; 0803 Computer Software; 0805 Distributed Computing; 0806 Information Systems; Artificial Intelligence & Image Processing; Software Engineering
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
T Technology > T Technology (General)
Divisions: Computer Science & Mathematics
Publisher: Springer Science+Business Media, LLC, part of Springer Nature
SWORD Depositor: A Symplectic
Date Deposited: 26 Jan 2024 13:19
Last Modified: 26 Jan 2024 13:30
DOI or ID number: 10.1007/s11042-023-17896-0
URI: https://researchonline.ljmu.ac.uk/id/eprint/22451
View Item View Item