Advancements in image encryption: A comprehensive review of design principles and performance metrics

IF 13.3 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Biswarup Yogi , Ajoy Kumar Khan
{"title":"Advancements in image encryption: A comprehensive review of design principles and performance metrics","authors":"Biswarup Yogi ,&nbsp;Ajoy Kumar Khan","doi":"10.1016/j.cosrev.2025.100759","DOIUrl":null,"url":null,"abstract":"<div><div>With the rise of digital image sharing in fields like healthcare, defence, and multimedia, strong image encryption is needed to protect sensitive information. This study provides a detailed overview of the analysis of image encryption algorithms, focusing on their design principles and performance metrics. This study covers different encryption methods, from traditional symmetric and asymmetric to modern chaos-based and quantum encryption. The design principles include substitution-permutation, diffusion, and key generation strategies. They are carefully evaluated to understand their actual input towards achieving high security. This study discusses key performance metrics such as encryption speed, sensitivity to key changes, statistical and differential attacks, computational complexity, and efficiency required to analyze the feasibility of various algorithms in practical applications. Explores issues such as the balance between security and resource limits, scalability, and adaptability to new threats. The analysis highlights the strengths and weaknesses of existing techniques, providing useful insights for developing next-generation encryption methods for specific applications. The combination of theoretical concepts along with performance evaluations presented in this work thus provides a significant and valuable reference source for research and practice aimed at designing effective yet secure image encryption algorithms in this rapidly growing world of technology.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100759"},"PeriodicalIF":13.3000,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Science Review","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1574013725000358","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

With the rise of digital image sharing in fields like healthcare, defence, and multimedia, strong image encryption is needed to protect sensitive information. This study provides a detailed overview of the analysis of image encryption algorithms, focusing on their design principles and performance metrics. This study covers different encryption methods, from traditional symmetric and asymmetric to modern chaos-based and quantum encryption. The design principles include substitution-permutation, diffusion, and key generation strategies. They are carefully evaluated to understand their actual input towards achieving high security. This study discusses key performance metrics such as encryption speed, sensitivity to key changes, statistical and differential attacks, computational complexity, and efficiency required to analyze the feasibility of various algorithms in practical applications. Explores issues such as the balance between security and resource limits, scalability, and adaptability to new threats. The analysis highlights the strengths and weaknesses of existing techniques, providing useful insights for developing next-generation encryption methods for specific applications. The combination of theoretical concepts along with performance evaluations presented in this work thus provides a significant and valuable reference source for research and practice aimed at designing effective yet secure image encryption algorithms in this rapidly growing world of technology.
图像加密的进展:对设计原则和性能指标的全面回顾
随着数字图像共享在医疗、国防和多媒体等领域的兴起,需要强大的图像加密来保护敏感信息。本研究提供了图像加密算法分析的详细概述,重点是其设计原则和性能指标。本研究涵盖了不同的加密方法,从传统的对称和非对称到现代基于混沌和量子的加密。设计原则包括置换、扩散和密钥生成策略。他们被仔细评估,以了解他们对实现高安全性的实际投入。本研究讨论了在实际应用中分析各种算法可行性所需的关键性能指标,如加密速度、对密钥更改的敏感性、统计和差分攻击、计算复杂性和效率。探讨安全与资源限制、可伸缩性和对新威胁的适应性之间的平衡等问题。该分析强调了现有技术的优点和缺点,为开发针对特定应用程序的下一代加密方法提供了有用的见解。因此,在这个快速发展的技术世界中,理论概念与性能评估的结合为旨在设计有效而安全的图像加密算法的研究和实践提供了重要而有价值的参考来源。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Computer Science Review
Computer Science Review Computer Science-General Computer Science
CiteScore
32.70
自引率
0.00%
发文量
26
审稿时长
51 days
期刊介绍: Computer Science Review, a publication dedicated to research surveys and expository overviews of open problems in computer science, targets a broad audience within the field seeking comprehensive insights into the latest developments. The journal welcomes articles from various fields as long as their content impacts the advancement of computer science. In particular, articles that review the application of well-known Computer Science methods to other areas are in scope only if these articles advance the fundamental understanding of those methods.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信