Survey on Image Encryption Schemes, Bio cryptography and Efficient Encryption Algorithms

被引:17
|
作者
Murugan, Chinnandi Arul [1 ]
Karthigaikumar, P. [2 ]
机构
[1] Karpagam Coll Engn, Dept Elect & Telecommun Engn, Coimbatore, Tamil Nadu, India
[2] Karpagam Coll Engn, Dept Elect & Commun Engn, Coimbatore, Tamilnadu, India
来源
MOBILE NETWORKS & APPLICATIONS | 2023年 / 28卷 / 04期
关键词
Advanced encryption standard; Encryption; S-box; Pipelining; Bio-cryptosystem; AES; FPGA;
D O I
10.1007/s11036-018-1058-3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptography protects the data stored in the network from unauthorized access. It is very essential to transfer data with high security. Biometrics is a unique part of human beings and it is a widely-known person authenticator. The exchange of all medical data has been done across the globe abundantly. Advanced Encryption Standard (AES) encryption algorithm is used for high security and it is most powerful cryptographic algorithm. This algorithm is widely preferred because of its long term security and has wide range of application and protocols. Protecting data over the network has become a significant issue due to enormous exchange of sensitive information takes place. Cryptography is used for secret information transmission in various fields like hospitals, research, medical applications etc., This article is a survey of familiar encryption techniques from which researches can acquire conception of suitable techniques to be used.
引用
收藏
页码:1385 / 1390
页数:6
相关论文
共 50 条
  • [41] Efficient authenticated encryption schemes with public verifiability
    Wang, GL
    Bao, F
    Ma, CS
    Chen, KF
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3258 - 3261
  • [42] Meteosat Images Encryption based on AES and RSA Algorithms Meteosat Image Encryption
    Belkaid, Boukhatem Mohammed
    Mourad, Lahdir
    Mehdi, Cherifi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (06) : 203 - 208
  • [43] A survey of image encryption for healthcare applications
    Priyanka
    Singh, Amit Kumar
    EVOLUTIONARY INTELLIGENCE, 2023, 16 (03) : 801 - 818
  • [44] Exploration of Polynomial Multiplication Algorithms for Homomorphic Encryption Schemes
    Migliore, Vincent
    Real, Maria Mendez
    Lapotre, Vianney
    Tisserand, Arnaud
    Fontaine, Caroline
    Gogniat, Guy
    2015 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG), 2015,
  • [45] A Survey on the Techniques of Medical Image Encryption
    Pavithra, V.
    Jeyamala, C.
    2018 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC 2018), 2018, : 319 - 326
  • [46] A survey of image encryption for healthcare applications
    Amit Kumar Priyanka
    Evolutionary Intelligence, 2023, 16 : 801 - 818
  • [47] An efficient chaotic image encryption scheme
    Khan, Majid
    Shah, Tariq
    NEURAL COMPUTING & APPLICATIONS, 2015, 26 (05): : 1137 - 1148
  • [48] Efficient Fingervein Sample Image Encryption
    Shekhawat, Sanjay
    Hofbauer, Heinz
    Prommegger, Bernhard
    Uhl, Andreas
    2020 8TH INTERNATIONAL WORKSHOP ON BIOMETRICS AND FORENSICS (IWBF 2020), 2020,
  • [49] An Efficient Image Database Encryption Algorithm
    Tiwari, Kamlesh
    Siddiqui, Ehtesham Akhtar
    Gupta, Phalguni
    EMERGING INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, 2012, 304 : 400 - 407
  • [50] A Novel Image Encryption Algorithm using AES and Visual Cryptography
    Kalubandi, Venkata Krishna Pavan
    Vaddi, Hemanth
    Ramineni, Vishnu
    Loganathan, Agilandeeswari
    PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2016, : 808 - 813