{"title":"彩色图像加密技术综述","authors":"A. Dawood, Qabeela Q. Thabit, Taqwa O. Fahad","doi":"10.33971/bjes.23.1.8","DOIUrl":null,"url":null,"abstract":"Today, with the continuous increase in the use of computer networks and the rapid evolution of information technologies. The secure transmission of data over the Internet has become an urgent necessity to preserve the privacy of users and protect sensitive information from theft and distortion. images are most of this transferred data, so it was necessary to protect it by encrypting them using algorithms that ensure the protection of information access to the receiver. Color images contain sensitive information and details that must be secured and protected. This paper produces a comprehensive review of image encryption methods and classifies them based on various concepts such as chaotic maps, DNA, etc. with comparisons between existing approaches to accessing different security parameters. Additionally, the types of encryption keys were reviewed along with some common types of attacks and the most important methods for measuring encryption efficiency.","PeriodicalId":150774,"journal":{"name":"Basrah journal for engineering science","volume":"117 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Comprehensive Review of Color Image Encryption Technology\",\"authors\":\"A. Dawood, Qabeela Q. Thabit, Taqwa O. Fahad\",\"doi\":\"10.33971/bjes.23.1.8\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Today, with the continuous increase in the use of computer networks and the rapid evolution of information technologies. The secure transmission of data over the Internet has become an urgent necessity to preserve the privacy of users and protect sensitive information from theft and distortion. images are most of this transferred data, so it was necessary to protect it by encrypting them using algorithms that ensure the protection of information access to the receiver. Color images contain sensitive information and details that must be secured and protected. This paper produces a comprehensive review of image encryption methods and classifies them based on various concepts such as chaotic maps, DNA, etc. with comparisons between existing approaches to accessing different security parameters. Additionally, the types of encryption keys were reviewed along with some common types of attacks and the most important methods for measuring encryption efficiency.\",\"PeriodicalId\":150774,\"journal\":{\"name\":\"Basrah journal for engineering science\",\"volume\":\"117 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-07-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Basrah journal for engineering science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.33971/bjes.23.1.8\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Basrah journal for engineering science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.33971/bjes.23.1.8","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Comprehensive Review of Color Image Encryption Technology
Today, with the continuous increase in the use of computer networks and the rapid evolution of information technologies. The secure transmission of data over the Internet has become an urgent necessity to preserve the privacy of users and protect sensitive information from theft and distortion. images are most of this transferred data, so it was necessary to protect it by encrypting them using algorithms that ensure the protection of information access to the receiver. Color images contain sensitive information and details that must be secured and protected. This paper produces a comprehensive review of image encryption methods and classifies them based on various concepts such as chaotic maps, DNA, etc. with comparisons between existing approaches to accessing different security parameters. Additionally, the types of encryption keys were reviewed along with some common types of attacks and the most important methods for measuring encryption efficiency.