Affiliation:
1. HARRAN ÜNİVERSİTESİ
2. ISTANBUL UNIVERSITY-CERRAHPASA
Abstract
Data security is now the most vital and most important issue of governments, companies and individuals in the technology age we live in. Among the data types, images have a special importance because of the important information they contain. Transferring or storing images requires extra security measures. In this study, the performances of the image encryption methods were compared with each other by applying them to the most popular and most used images in the image processing area. Four different experiments were carried out. Performance of the seven particular encryption methods compared to each other and the obsevations and measurements was presented.
Publisher
Beykent University Journal of Science and Engineering
Reference14 articles.
1. [1] Srividya, G. & Nandakumar, P.. (2011). A Triple-Key chaotic image encryption method. ICCSP 2011 - 2011 International Conference on Communications and Signal Processing.
2. [2] Chai, X., Zheng, X., Gan, Z., Han, D., & Chen, Y. (2018). An image encryption algorithm based on chaotic system and compressive sensing. Signal Processing, 148, 124-144.
3. [3] Zhang, Y., Li, Y., & Su, J. (2018). Iterative learning control for image feature extraction with multiple-image blends. EURASIP Journal on Image and Video Processing, 2018(1), 1-11.
4. [4] Jiang, N., Zhao, N., & Wang, L. (2016). LSB based quantum image steganography algorithm. International Journal of Theoretical Physics, 55(1), 107-123.
5. [5] Muhammad, K., Ahmad, J., Farman, H., & Zubair, M. (2015). A novel image steganographic approach for hiding text in color images using HSI color model. arXiv preprint arXiv:1503.00388.