当前位置: X-MOL 学术Comput. Sci. Rev. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A systematic literature review on chaotic maps-based image security techniques
Computer Science Review ( IF 13.3 ) Pub Date : 2024-08-26 , DOI: 10.1016/j.cosrev.2024.100659
Dilbag Singh , Sharanpreet Kaur , Mandeep Kaur , Surender Singh , Manjit Kaur , Heung-No Lee

Images play a substantial role in various applications such as medical imaging, satellite imaging, and military communications. These images often contain confidential and sensitive information, and are typically transmitted over public networks. As a result, they are vulnerable to various security threats. Therefore, efficient image security techniques are necessary to protect these images from unauthorized access and modification. This paper aims to present a systematic study of chaotic map-based image security techniques. Due to poor selection criteria, existing studies on image security techniques suffer from high overlap among the reviewed methods. Moreover, these reviews often lack depth and cover a limited number of articles. In this paper, we study three well-known chaotic map-based image security models: image encryption, image steganography, and image watermarking. Articles were selected from reputable databases such as IEEE Xplore, Scopus, and Web of Science (WOS). This paper provides a systematic analysis of the fundamental concepts, performance metrics, and security aspects of chaotic map-based image security techniques. Comparisons are drawn among the existing techniques to evaluate their relative strengths. From this extensive review, various issues associated with the current chaotic map-based image security techniques are highlighted. Finally, future directions in the field of chaotic map-based image security are discussed, which can guide researchers in their future work.

中文翻译:


基于混沌地图的图像安全技术的系统文献综述



图像在医学成像、卫星成像和军事通信等各种应用中发挥着重要作用。这些图像通常包含机密和敏感信息,并且通常通过公共网络传输。因此,它们容易受到各种安全威胁。因此,需要高效的图像安全技术来保护这些图像免受未经授权的访问和修改。本文旨在介绍对基于混沌地图的图像安全技术的系统研究。由于选择标准不佳,现有的图像安全技术研究在审查的方法之间存在高度重叠的问题。此外,这些评论通常缺乏深度并且涵盖的文章数量有限。在本文中,我们研究了三种著名的基于混沌地图的图像安全模型:图像加密、图像隐写和图像水印。文章选自 IEEE Xplore、Scopus 和 Web of Science (WOS) 等知名数据库。本文对基于混沌地图的图像安全技术的基本概念、性能指标和安全方面进行了系统分析。在现有技术之间进行比较,以评估它们的相对优势。从这篇广泛的评论中,强调了与当前混乱的基于地图的图像安全技术相关的各种问题。最后,讨论了基于混沌地图的图像安全领域的未来发展方向,为研究人员未来的工作提供了指导。
更新日期:2024-08-26
down
wechat
bug