Indian Journal of Science and Technology
Year: 2015, Volume: 8, Issue: 27, Pages: 1-12
Lahieb Mohammed Jawad1,2* and Ghazali Sulong1
1 UTM-IRDA Digital Media Center (MaGIC-X), Faculty of Computing, Universiti Teknologi Malaysia, Skudai - 81310, Johor, Malaysia; [email protected], [email protected]
2 Network Engineering Department, College of Information Engineering, Al-Nahrain University, Baghdad, Iraq
Background/Objectives: Selective image encryption is the best modern approach for reducing the amount of encrypted area. The objective of this paper is to study the strength and limitationof the modern approach. Methods: This survey has mainly focuses on reviewing modern approaches in literature on selective encryption and classifies them into three categories based on region of interest selection, image encryption techniques and key managements. Therefore, their strengths and limitations are identified in order to establish possible solution for the future of selective encryption research. Findings: This survey comprehensively determine the limitations and strengths of the selective image encryption technique based on the fact that this approach saves cost and time via reducing the size of encrypted region. The literature of the different methods is analyzed based on each category. It derived the remaining gaps for selective image encryption approach; a big gap in selective image encryption is on how to split image into significant and insignificant region. Moreover, there is still gap in the security results of traditional encryption algorithm for modern approach and the key space size is also one of an important factor in obtaining high security level for any encryption algorithm. Improvements: This survey identifies the major limitation of its strategies as encryption of certain regions in an image does not guarantee security. Moreover, the traditional encryption algorithms still need security improvements.
Keywords: Block Selection, Image Encryption Domain, Key Management, Region of Interest, Selective Image Encryption, Stream Selection
Subscribe now for latest articles and news.