Summary
Many algorithms specifically designed for encrypting digital images are proposed since mid-1990s. There are two major groups of image encryption algorithms: non-chaos selective methods, and chaos-based selective or non-selective methods. Most of these algorithms are designed for a specific image format (compressed or uncompressed), and some of them are even format compliant. There are schemes that offer a light encryption (degradation), while other offer stronger form of encryption. Some of the algorithms are even scalable and have different modes ranging from degradation to strong encryption. The user is expected to choose a method based on its properties, so that it best suits a given image security application.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
(2005). Image Encryption Algorithms. In: Multimedia Encryption and Watermarking. Multimedia Systems and Applications, vol 28. Springer, Boston, MA. https://doi.org/10.1007/0-387-26090-0_5
Download citation
DOI: https://doi.org/10.1007/0-387-26090-0_5
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-24425-9
Online ISBN: 978-0-387-26090-7
eBook Packages: Computer ScienceComputer Science (R0)