Encryption Algorithms for Color Images: A Brief Review of Recent Trends
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 10
Abstract
The recent years have witnessed rapid developments in the field of image encryption algorithms for secure color image processing. Image encryption algorithms have been classified in different ways in the past. This paper reviews the different image encryption algorithms developed during the period 2007-2015, highlighting their contrasting features. At the same time a broad classification of the said algorithms into: (1) full encryption algorithm and (2) partial encryption algorithm, each further sub-classified with respect to their domain orientations (spatial, frequency and hybrid domains) have been attempted. Efforts have also been made to cover different algorithms useful for color images of various color spaces like Red-Green-Blue (RGB), Hue-Saturation-Intensity (HSI), Cyan-Magenta-Yellow (CMY) etc. Chaotic cryptosystems, various transforms like wavelets, affine transforms etc. and visual cryptography systems are being discussed in detail.
Authors and Affiliations
Anuja Parameshwaran, Wen-Zhan Song
Performance Evaluation of Adaptive Virtual Machine Load Balancing Algorithm
The conception of Cloud computing has not only reshaped the field of distributed systems but also extend businesses potential. Load balancing is a core and challenging issue in Cloud Computing. How to use Cloud com...
Exploratory Analysis of the Total Variation of Electrons in the Ionosphere before Telluric Events Greater than M7.0 in the World During 2015-2016
This exploratory observational study analyzes the variation of the total amount of vertical electrons (vTEC) in the ionosphere, 17 days before telluric events with grades greater than M7.0 between 2015 and 2016. Thirty t...
Analysis of the Impact of Different Parameter Settings on Wireless Sensor Network Lifetime
The importance of wireless sensors is increasing day by day due to their large demand. Sensor networks are facing some issues in which battery lifetime of sensor node is critical. It depends on the nature and application...
Power Analysis Attacks on ECC: A Major Security Threat
Wireless sensor networks (WSNs) are largely deployed in different sectors and applications, and Elliptic Curve Cryptography (ECC) is proven to be the most feasible PKC for WSN security. ECC is believed to provide same le...
Consequences of Customer Engagement in Social Networking Sites : Employing Fuzzy Delphi Technique for Validation
The consequences of the customer engagement in the Social Networking Sites (SNS) community have direct impact on the brand. This present research was conducted to examine the cohesive mechanisms for item verification on...