{"title":"A survey on image cryptography mechanisms: hitherto, and future directions","authors":"Tanisha Gupta , Arvind Selwal , Ajay K. Sharma","doi":"10.1016/j.cosrev.2025.100783","DOIUrl":null,"url":null,"abstract":"<div><div>With the exponential growth in the multimedia data such as images, videos, or audios, the security and confidentiality of the information has emerged as one of the challenging problems. In particular, image data security during communication raises several concerns, where attackers can intercept the communication channel and data security can be breached. Thus, image cryptographic algorithms are a viable solution to secure the images while communication between sender and receiver. Though, there has been significant progress in the field of image cryptography, security and performance of these algorithms is still a challenge to the research community. In this article, we expound a detailed taxonomy-based analysis of the existing state-of-the-art (SOTA) image cryptography techniques. Initially, we devised a novel taxonomy for broad categorization of the image ciphers. Later, the entire survey is organized by considering our own taxonomy for a clear and systematic structure. The analysis of various image ciphers is on the basis of three important aspects such as confidentiality, integrity and authenticity (CIA). Besides, we also illustrate various performance evaluation protocols and cryptanalysis methods that are frequently employed for analyzing the efficacy of the image cryptography algorithms. In addition, we explored the modern methods such as deep convolutional neural networks (DCCN) that are also frequently employed for image cryptography. This study exposes several open research challenges in this active field of image security and also provides future perspectives to the new investigators. One of the imperative challenges is to design lightweight image ciphers with ideal security characteristics. Moreover, authenticated image ciphers is an additional critical parameter for image ciphers, which requires attention of research community.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"58 ","pages":"Article 100783"},"PeriodicalIF":12.7000,"publicationDate":"2025-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Science Review","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1574013725000590","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
With the exponential growth in the multimedia data such as images, videos, or audios, the security and confidentiality of the information has emerged as one of the challenging problems. In particular, image data security during communication raises several concerns, where attackers can intercept the communication channel and data security can be breached. Thus, image cryptographic algorithms are a viable solution to secure the images while communication between sender and receiver. Though, there has been significant progress in the field of image cryptography, security and performance of these algorithms is still a challenge to the research community. In this article, we expound a detailed taxonomy-based analysis of the existing state-of-the-art (SOTA) image cryptography techniques. Initially, we devised a novel taxonomy for broad categorization of the image ciphers. Later, the entire survey is organized by considering our own taxonomy for a clear and systematic structure. The analysis of various image ciphers is on the basis of three important aspects such as confidentiality, integrity and authenticity (CIA). Besides, we also illustrate various performance evaluation protocols and cryptanalysis methods that are frequently employed for analyzing the efficacy of the image cryptography algorithms. In addition, we explored the modern methods such as deep convolutional neural networks (DCCN) that are also frequently employed for image cryptography. This study exposes several open research challenges in this active field of image security and also provides future perspectives to the new investigators. One of the imperative challenges is to design lightweight image ciphers with ideal security characteristics. Moreover, authenticated image ciphers is an additional critical parameter for image ciphers, which requires attention of research community.
期刊介绍:
Computer Science Review, a publication dedicated to research surveys and expository overviews of open problems in computer science, targets a broad audience within the field seeking comprehensive insights into the latest developments. The journal welcomes articles from various fields as long as their content impacts the advancement of computer science. In particular, articles that review the application of well-known Computer Science methods to other areas are in scope only if these articles advance the fundamental understanding of those methods.