{"title":"S A Review of DES and AES algorithms for image Encryption","authors":"Suhad Muhajer","doi":"10.29350/qjps.2022.27.1.1512","DOIUrl":null,"url":null,"abstract":" Today the encryption of images has be a requirement to protect a secret image from unauthorized arrival. Different techniques have been presented and sophisticated in spatial, frequency and hybrid domains to encrypt the image securely. Depending on on the security requirements, encryption methods can be classified as full encryption or partial encryption. This paper proposes a review of several image encryption methods based on AES and DES. The results of previous research have shown that good results in many security analysis such as time execution, entropy, differential attacks, histogram and others. Comparison between AES and DES based on number of factors are presented in this work.","PeriodicalId":7856,"journal":{"name":"Al-Qadisiyah Journal Of Pure Science","volume":"16 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Al-Qadisiyah Journal Of Pure Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.29350/qjps.2022.27.1.1512","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Today the encryption of images has be a requirement to protect a secret image from unauthorized arrival. Different techniques have been presented and sophisticated in spatial, frequency and hybrid domains to encrypt the image securely. Depending on on the security requirements, encryption methods can be classified as full encryption or partial encryption. This paper proposes a review of several image encryption methods based on AES and DES. The results of previous research have shown that good results in many security analysis such as time execution, entropy, differential attacks, histogram and others. Comparison between AES and DES based on number of factors are presented in this work.