Info: Zenodo’s user support line is staffed on regular business days between Dec 23 and Jan 5. Response times may be slightly longer than normal.

Published June 30, 2023 | Version v1
Journal article Open

Subject review: Image encryption techniques

  • 1. Department of computer science, University Al Mustansiriyah, Baghdad, Iraq.

Description

Security is one of the core areas of study in recent days. Encryption of the image is widely known as an effective method for its secure transmission. The objective of any image encryption method is to obtain a top quality hidden image in order to keep information secret. This paper is a study of research authors in the field of image encryption with a research review to see how the field of image encryption has progressed and the best algorithms in their performance.

Files

GJETA-2023-0098.pdf

Files (739.8 kB)

Name Size Download all
md5:43c2238d0a3f7dd4d2ca43230c0adcb6
739.8 kB Preview Download

Additional details