{"title":"A systematic literature review on chaotic maps-based image security techniques","authors":"Dilbag Singh , Sharanpreet Kaur , Mandeep Kaur , Surender Singh , Manjit Kaur , Heung-No Lee","doi":"10.1016/j.cosrev.2024.100659","DOIUrl":null,"url":null,"abstract":"<div><p>Images play a substantial role in various applications such as medical imaging, satellite imaging, and military communications. These images often contain confidential and sensitive information, and are typically transmitted over public networks. As a result, they are vulnerable to various security threats. Therefore, efficient image security techniques are necessary to protect these images from unauthorized access and modification. This paper aims to present a systematic study of chaotic map-based image security techniques. Due to poor selection criteria, existing studies on image security techniques suffer from high overlap among the reviewed methods. Moreover, these reviews often lack depth and cover a limited number of articles. In this paper, we study three well-known chaotic map-based image security models: image encryption, image steganography, and image watermarking. Articles were selected from reputable databases such as IEEE Xplore, Scopus, and Web of Science (WOS). This paper provides a systematic analysis of the fundamental concepts, performance metrics, and security aspects of chaotic map-based image security techniques. Comparisons are drawn among the existing techniques to evaluate their relative strengths. From this extensive review, various issues associated with the current chaotic map-based image security techniques are highlighted. Finally, future directions in the field of chaotic map-based image security are discussed, which can guide researchers in their future work.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"54 ","pages":"Article 100659"},"PeriodicalIF":13.3000,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Science Review","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1574013724000431","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Images play a substantial role in various applications such as medical imaging, satellite imaging, and military communications. These images often contain confidential and sensitive information, and are typically transmitted over public networks. As a result, they are vulnerable to various security threats. Therefore, efficient image security techniques are necessary to protect these images from unauthorized access and modification. This paper aims to present a systematic study of chaotic map-based image security techniques. Due to poor selection criteria, existing studies on image security techniques suffer from high overlap among the reviewed methods. Moreover, these reviews often lack depth and cover a limited number of articles. In this paper, we study three well-known chaotic map-based image security models: image encryption, image steganography, and image watermarking. Articles were selected from reputable databases such as IEEE Xplore, Scopus, and Web of Science (WOS). This paper provides a systematic analysis of the fundamental concepts, performance metrics, and security aspects of chaotic map-based image security techniques. Comparisons are drawn among the existing techniques to evaluate their relative strengths. From this extensive review, various issues associated with the current chaotic map-based image security techniques are highlighted. Finally, future directions in the field of chaotic map-based image security are discussed, which can guide researchers in their future work.
图像在医疗成像、卫星成像和军事通信等各种应用中发挥着重要作用。这些图像通常包含机密和敏感信息,通常通过公共网络传输。因此,它们很容易受到各种安全威胁。因此,有必要采用高效的图像安全技术来保护这些图像免遭未经授权的访问和修改。本文旨在对基于混沌图的图像安全技术进行系统研究。由于选择标准不完善,现有的图像安全技术研究存在方法高度重叠的问题。此外,这些综述往往缺乏深度,涵盖的文章数量有限。本文研究了三种著名的基于混沌图的图像安全模型:图像加密、图像隐写术和图像水印。文章选自 IEEE Xplore、Scopus 和 Web of Science (WOS) 等著名数据库。本文对基于混沌图的图像安全技术的基本概念、性能指标和安全方面进行了系统分析。对现有技术进行了比较,以评估它们的相对优势。通过广泛的综述,本文强调了与当前基于混沌图的图像安全技术相关的各种问题。最后,讨论了基于混沌图的图像安全领域的未来发展方向,为研究人员今后的工作提供指导。
期刊介绍:
Computer Science Review, a publication dedicated to research surveys and expository overviews of open problems in computer science, targets a broad audience within the field seeking comprehensive insights into the latest developments. The journal welcomes articles from various fields as long as their content impacts the advancement of computer science. In particular, articles that review the application of well-known Computer Science methods to other areas are in scope only if these articles advance the fundamental understanding of those methods.