Comprehensive Review and Analysis of Image Encryption Techniques
The rapid growth of digital media has increased the need to protect image data from unauthorized access, particularly in fields such as medical imaging, military communication, and online content distribution. This paper provides a comprehensive review of advanced image encryption techniques aimed a...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2025-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/11029017/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849429905032347648 |
|---|---|
| author | K. Mahalakshmi Sivakumar Nagarajan |
| author_facet | K. Mahalakshmi Sivakumar Nagarajan |
| author_sort | K. Mahalakshmi |
| collection | DOAJ |
| description | The rapid growth of digital media has increased the need to protect image data from unauthorized access, particularly in fields such as medical imaging, military communication, and online content distribution. This paper provides a comprehensive review of advanced image encryption techniques aimed at preserving the confidentiality and integrity of visual information. The analysis includes traditional cryptographic methods, such as AES, RSA, and Blowfish, as well as quantum encryption, chaos-based encryption, DNA encryption, frequency domain techniques, neural network-based methods, and compressive sensing. Each technique was evaluated based on key performance metrics, including the resistance to differential and statistical attacks, computational efficiency, noise resilience, key sensitivity, and encryption speed. Through comparative analysis, this study highlights the strengths, weaknesses, and applicability of these methods in various contexts. The review concludes by discussing the current challenges and suggesting future research directions to improve the security, scalability, and real-time processing capabilities of image encryption systems. |
| format | Article |
| id | doaj-art-da9d6429c26f45b4a9cc801d4dc2063f |
| institution | Kabale University |
| issn | 2169-3536 |
| language | English |
| publishDate | 2025-01-01 |
| publisher | IEEE |
| record_format | Article |
| series | IEEE Access |
| spelling | doaj-art-da9d6429c26f45b4a9cc801d4dc2063f2025-08-20T03:28:10ZengIEEEIEEE Access2169-35362025-01-011310978310981310.1109/ACCESS.2025.357815811029017Comprehensive Review and Analysis of Image Encryption TechniquesK. Mahalakshmi0https://orcid.org/0009-0009-1303-8810Sivakumar Nagarajan1https://orcid.org/0000-0002-8945-6412Department of Mathematics, School of Advanced Sciences, Vellore Institute of Technology, Vellore, IndiaSchool of Computer Science and Engineering, Vellore Institute of Technology, Vellore, IndiaThe rapid growth of digital media has increased the need to protect image data from unauthorized access, particularly in fields such as medical imaging, military communication, and online content distribution. This paper provides a comprehensive review of advanced image encryption techniques aimed at preserving the confidentiality and integrity of visual information. The analysis includes traditional cryptographic methods, such as AES, RSA, and Blowfish, as well as quantum encryption, chaos-based encryption, DNA encryption, frequency domain techniques, neural network-based methods, and compressive sensing. Each technique was evaluated based on key performance metrics, including the resistance to differential and statistical attacks, computational efficiency, noise resilience, key sensitivity, and encryption speed. Through comparative analysis, this study highlights the strengths, weaknesses, and applicability of these methods in various contexts. The review concludes by discussing the current challenges and suggesting future research directions to improve the security, scalability, and real-time processing capabilities of image encryption systems.https://ieeexplore.ieee.org/document/11029017/Image encryptioncryptographychaos-based encryptionquantum encryptionneural network encryptionfederated learning for encryption |
| spellingShingle | K. Mahalakshmi Sivakumar Nagarajan Comprehensive Review and Analysis of Image Encryption Techniques IEEE Access Image encryption cryptography chaos-based encryption quantum encryption neural network encryption federated learning for encryption |
| title | Comprehensive Review and Analysis of Image Encryption Techniques |
| title_full | Comprehensive Review and Analysis of Image Encryption Techniques |
| title_fullStr | Comprehensive Review and Analysis of Image Encryption Techniques |
| title_full_unstemmed | Comprehensive Review and Analysis of Image Encryption Techniques |
| title_short | Comprehensive Review and Analysis of Image Encryption Techniques |
| title_sort | comprehensive review and analysis of image encryption techniques |
| topic | Image encryption cryptography chaos-based encryption quantum encryption neural network encryption federated learning for encryption |
| url | https://ieeexplore.ieee.org/document/11029017/ |
| work_keys_str_mv | AT kmahalakshmi comprehensivereviewandanalysisofimageencryptiontechniques AT sivakumarnagarajan comprehensivereviewandanalysisofimageencryptiontechniques |