{"title":"Image Cryptography: A Systematic Review","authors":"Mahmoud Magdy, N. Ghali, S. Ghoniemy, K. Hosny","doi":"10.1109/icci54321.2022.9756107","DOIUrl":null,"url":null,"abstract":"In recent years due to the observed growth of online multimedia applications, communication, and computer technologies, image security has been an essential demand. This survey paper summarizes existing image security approaches, their merits and demerits, and the area of future work. Along with the survey, the authors present a brief discussion of different multimedia data, as well as the attacks that affect the image transmission, general concepts of multimedia security, primary requirements, and recent applications. Multimedia security is classified into cryptography and data hiding techniques, including digital watermarking, steganography, and hybridization. Recent research work for cryptography techniques is discussed in the following sections.","PeriodicalId":122550,"journal":{"name":"2022 5th International Conference on Computing and Informatics (ICCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Computing and Informatics (ICCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/icci54321.2022.9756107","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In recent years due to the observed growth of online multimedia applications, communication, and computer technologies, image security has been an essential demand. This survey paper summarizes existing image security approaches, their merits and demerits, and the area of future work. Along with the survey, the authors present a brief discussion of different multimedia data, as well as the attacks that affect the image transmission, general concepts of multimedia security, primary requirements, and recent applications. Multimedia security is classified into cryptography and data hiding techniques, including digital watermarking, steganography, and hybridization. Recent research work for cryptography techniques is discussed in the following sections.