{"title":"图像加密的进展:对设计原则和性能指标的全面回顾","authors":"Biswarup Yogi , Ajoy Kumar Khan","doi":"10.1016/j.cosrev.2025.100759","DOIUrl":null,"url":null,"abstract":"<div><div>With the rise of digital image sharing in fields like healthcare, defence, and multimedia, strong image encryption is needed to protect sensitive information. This study provides a detailed overview of the analysis of image encryption algorithms, focusing on their design principles and performance metrics. This study covers different encryption methods, from traditional symmetric and asymmetric to modern chaos-based and quantum encryption. The design principles include substitution-permutation, diffusion, and key generation strategies. They are carefully evaluated to understand their actual input towards achieving high security. This study discusses key performance metrics such as encryption speed, sensitivity to key changes, statistical and differential attacks, computational complexity, and efficiency required to analyze the feasibility of various algorithms in practical applications. Explores issues such as the balance between security and resource limits, scalability, and adaptability to new threats. The analysis highlights the strengths and weaknesses of existing techniques, providing useful insights for developing next-generation encryption methods for specific applications. The combination of theoretical concepts along with performance evaluations presented in this work thus provides a significant and valuable reference source for research and practice aimed at designing effective yet secure image encryption algorithms in this rapidly growing world of technology.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100759"},"PeriodicalIF":13.3000,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Advancements in image encryption: A comprehensive review of design principles and performance metrics\",\"authors\":\"Biswarup Yogi , Ajoy Kumar Khan\",\"doi\":\"10.1016/j.cosrev.2025.100759\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>With the rise of digital image sharing in fields like healthcare, defence, and multimedia, strong image encryption is needed to protect sensitive information. This study provides a detailed overview of the analysis of image encryption algorithms, focusing on their design principles and performance metrics. This study covers different encryption methods, from traditional symmetric and asymmetric to modern chaos-based and quantum encryption. The design principles include substitution-permutation, diffusion, and key generation strategies. They are carefully evaluated to understand their actual input towards achieving high security. This study discusses key performance metrics such as encryption speed, sensitivity to key changes, statistical and differential attacks, computational complexity, and efficiency required to analyze the feasibility of various algorithms in practical applications. Explores issues such as the balance between security and resource limits, scalability, and adaptability to new threats. The analysis highlights the strengths and weaknesses of existing techniques, providing useful insights for developing next-generation encryption methods for specific applications. The combination of theoretical concepts along with performance evaluations presented in this work thus provides a significant and valuable reference source for research and practice aimed at designing effective yet secure image encryption algorithms in this rapidly growing world of technology.</div></div>\",\"PeriodicalId\":48633,\"journal\":{\"name\":\"Computer Science Review\",\"volume\":\"57 \",\"pages\":\"Article 100759\"},\"PeriodicalIF\":13.3000,\"publicationDate\":\"2025-04-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Science Review\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1574013725000358\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Science Review","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1574013725000358","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Advancements in image encryption: A comprehensive review of design principles and performance metrics
With the rise of digital image sharing in fields like healthcare, defence, and multimedia, strong image encryption is needed to protect sensitive information. This study provides a detailed overview of the analysis of image encryption algorithms, focusing on their design principles and performance metrics. This study covers different encryption methods, from traditional symmetric and asymmetric to modern chaos-based and quantum encryption. The design principles include substitution-permutation, diffusion, and key generation strategies. They are carefully evaluated to understand their actual input towards achieving high security. This study discusses key performance metrics such as encryption speed, sensitivity to key changes, statistical and differential attacks, computational complexity, and efficiency required to analyze the feasibility of various algorithms in practical applications. Explores issues such as the balance between security and resource limits, scalability, and adaptability to new threats. The analysis highlights the strengths and weaknesses of existing techniques, providing useful insights for developing next-generation encryption methods for specific applications. The combination of theoretical concepts along with performance evaluations presented in this work thus provides a significant and valuable reference source for research and practice aimed at designing effective yet secure image encryption algorithms in this rapidly growing world of technology.
期刊介绍:
Computer Science Review, a publication dedicated to research surveys and expository overviews of open problems in computer science, targets a broad audience within the field seeking comprehensive insights into the latest developments. The journal welcomes articles from various fields as long as their content impacts the advancement of computer science. In particular, articles that review the application of well-known Computer Science methods to other areas are in scope only if these articles advance the fundamental understanding of those methods.