Survey on Image Encryption Schemes, Bio cryptography and Efficient Encryption Algorithms

被引:17
|
作者
Murugan, Chinnandi Arul [1 ]
Karthigaikumar, P. [2 ]
机构
[1] Karpagam Coll Engn, Dept Elect & Telecommun Engn, Coimbatore, Tamil Nadu, India
[2] Karpagam Coll Engn, Dept Elect & Commun Engn, Coimbatore, Tamilnadu, India
来源
MOBILE NETWORKS & APPLICATIONS | 2023年 / 28卷 / 04期
关键词
Advanced encryption standard; Encryption; S-box; Pipelining; Bio-cryptosystem; AES; FPGA;
D O I
10.1007/s11036-018-1058-3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptography protects the data stored in the network from unauthorized access. It is very essential to transfer data with high security. Biometrics is a unique part of human beings and it is a widely-known person authenticator. The exchange of all medical data has been done across the globe abundantly. Advanced Encryption Standard (AES) encryption algorithm is used for high security and it is most powerful cryptographic algorithm. This algorithm is widely preferred because of its long term security and has wide range of application and protocols. Protecting data over the network has become a significant issue due to enormous exchange of sensitive information takes place. Cryptography is used for secret information transmission in various fields like hospitals, research, medical applications etc., This article is a survey of familiar encryption techniques from which researches can acquire conception of suitable techniques to be used.
引用
收藏
页码:1385 / 1390
页数:6
相关论文
共 50 条
  • [31] Analysis and Comparison of Image Encryption Algorithms
    Oeztuerk, Ismet
    Sogukpinar, Ibrahim
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 3, 2005, 3 : 26 - 30
  • [32] Encryption of optical image using BCGH and visual cryptography
    Yi, SY
    Ryu, CS
    Kim, DG
    Lee, SH
    18TH CONGRESS OF THE INTERNATIONAL COMMISSION FOR OPTICS: OPTICS FOR THE NEXT MILLENNIUM, TECHNICAL DIGEST, 1999, 3749 : 276 - 277
  • [33] VLSI Implementation of Image Encryption Using DNA Cryptography
    Vinotha, P.
    Jose, Deepa
    INTELLIGENT COMMUNICATION TECHNOLOGIES AND VIRTUAL MOBILE NETWORKS, ICICV 2019, 2020, 33 : 190 - 198
  • [34] Efficient Video Encryption using Lightweight Cryptography Algorithm
    Hussain, Syed Saiq
    Ibrahim, Muhammad Sohail
    Mir, Syed Zain
    Yasin, Sajid
    Majeed, Muhammad Kashif
    Ghani, Azfar
    2018 3RD INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCES AND TECHNOLOGY (ICEEST), 2018,
  • [35] A survey of certificateless encryption schemes and security models
    Dent, Alexander W.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (05) : 349 - 377
  • [36] A survey of certificateless encryption schemes and security models
    Alexander W. Dent
    International Journal of Information Security, 2008, 7 : 349 - 377
  • [37] A Survey on Homomorphic Encryption Schemes: Theory and Implementation
    Acar, Abbas
    Aksu, Hidayet
    Uluagac, A. Selcuk
    Conti, Mauro
    ACM COMPUTING SURVEYS, 2018, 51 (04)
  • [38] A Survey on Encryption Schemes in Wireless Sensor Networks
    Hayouni, Haythem
    Hamdi, Mohamed
    Kim, Tai-Hoon
    2014 7TH INTERNATIONAL CONFERENCE ON ADVANCED SOFTWARE ENGINEERING AND ITS APPLICATIONS (ASEA), 2014, : 39 - 43
  • [39] Survey on the research and development of searchable encryption schemes
    Shen, Zhi-Rong
    Xue, Wei
    Shu, Ji-Wu
    Ruan Jian Xue Bao/Journal of Software, 2014, 25 (04): : 880 - 895
  • [40] Towards the Growth of Image Encryption and Authentication Schemes
    Rajput, Amitesh Singh
    Mishra, Nishehol
    Sharma, Sanjeev
    2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2013, : 454 - 459