Symmetry in Image Encryption

A special issue of Symmetry (ISSN 2073-8994). This special issue belongs to the section "Computer".

Deadline for manuscript submissions: closed (30 April 2024) | Viewed by 1065

Special Issue Editors


E-Mail Website
Guest Editor
LISAC Laboratory, Faculty of Sciences Dhar El Mahraz, Sidi Mohamed Ben Abdellah University, Fes 30000, Morocco
Interests: image processing; computer vision; data science
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
LISAC Laboratory, Sidi Mohammed Ben Abdellah University, Fez 30000, Morocco
Interests: data science; computer vision; machine learning; reinforcement learning

Special Issue Information

Dear Colleagues,

In the era of digital communication and information security, the preservation of data integrity and confidentiality is paramount. Among others, images are a fundamental and a significant data source in various domains, from healthcare, finance to military and personal communication.

This Special Issue, ‘Symmetry in Image Encryption’ seeks to underscore the intersection and role of symmetry principles, cryptographic techniques, and deep learning in protecting visual information. We invite researchers, practitioners, and experts working in this domain to submit their papers (original research as well as theoretical studies) that uses novel methods, particularly deep learning, to address the symmetrical aspects of image encryption and uncover potential vulnerabilities, thereby contributing to the practical implementation of symmetry-based image encryption techniques.

Potential topics include the following:

  1. Symmetric Cryptographic Algorithms: Investigate the role of symmetric encryption algorithms in securing image data and explore their strengths and limitations, including how deep learning can enhance their effectiveness;
  2. Visual Symmetry Analysis: Explore techniques for detecting and leveraging inherent symmetries within images for encryption and decryption processes, with a focus on how deep learning can aid in this analysis;
  3. Security and Robustness: Discuss the security challenges and potential vulnerabilities associated with symmetric image encryption methods, and propose strategies for enhancing robustness, including the integration of deep learning techniques;
  4. Deep Learning Applications: Highlight practical applications of deep learning in symmetric image encryption, showcasing innovative approaches that leverage neural networks for enhanced security;
  5. Emerging Trends: Explore emerging trends, innovations, and future directions in the field of image encryption, with a focus on the synergies between deep learning and symmetry-related concepts.

Dr. Sabri My Abdelouahed
Dr. Yahyaouy Ali
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Symmetry is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • image encryption
  • symmetric cryptography
  • encryption vulnerabilities
  • image protection
  • image privacy
  • symmetry-based encryption
  • symmetric key cryptography
  • robust encryption
  • visual information security
  • cryptographic techniques
  • symmetry-based decryption
  • deep learning for image encryption

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

22 pages, 3210 KiB  
Article
A Novel Blind Double-Color Image Watermarking Algorithm Utilizing Walsh–Hadamard Transform with Symmetric Embedding Locations
by KVSV Trinadh Reddy and S. Narayana Reddy
Symmetry 2024, 16(7), 877; https://doi.org/10.3390/sym16070877 - 10 Jul 2024
Cited by 1 | Viewed by 611
Abstract
This paper introduces an effective blind watermarking algorithm for double-color images utilizing the Walsh–Hadamard Transform (WHT) with symmetric embedding locations to enhance imperceptibility. The proposed algorithm leverages the energy accumulation capability and significant correlations among coefficients of the WHT. First, the color host [...] Read more.
This paper introduces an effective blind watermarking algorithm for double-color images utilizing the Walsh–Hadamard Transform (WHT) with symmetric embedding locations to enhance imperceptibility. The proposed algorithm leverages the energy accumulation capability and significant correlations among coefficients of the WHT. First, the color host image undergoes partitioning into its respective red (R), green (G), and blue (B) channels, followed by further subdivision into 4 × 4 blocks. Through research, the algorithm determines which WHT coefficients are least visually sensitive to embedding a color image, and as a result, optimizes the embedding locations to achieve better imperceptibility. The extensive simulation results verify the superior performance of the proposed algorithm compared to other related approaches, showcasing its excellence not only in imperceptibility but also in embedding capacity and robustness. Full article
(This article belongs to the Special Issue Symmetry in Image Encryption)
Show Figures

Figure 1

Back to TopTop