A Survey on Image Encryption Techniques

Authors

  • Vishwas C.G.M  Assistant Professor Department of IS&E, J.N.N College of Engineering, Shivamogga, Karnataka, India
  • Dr. R Sanjeev Kunte  Professor, Department of CS & E, J.N.N College of Engineering, Shivamogga, Karnataka, India

Keywords:

Encryption, Decryption, Cryptography.

Abstract

Security of data/images is one of the important aspects and it is still an expanding domain of digital transfer. Encryption of images is one of the well known mechanisms to preserve the secrecy of images over the Internet. This medium is vulnerable to attacks and hence efficient encryption algorithms are necessary for securely transmitting the data. Various techniques have been proposed in literature to cope up the ever growing need of security. This paper is an effort to compare the most popular techniques available for image encryption.

References

  1. John Justin M, Manimurugan S, “A Survey on Various Encryption Techniques”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-1, March 2012.
  2. Aloka Sinha and Kehar Singh, “A technique for image encryption using digital signature”, Optics Communications, Vol-2 I 8 (2203), 229- 234.
  3. S. Vani Kumari and G. Neelima, “An efficient Image Cryptographic Technique By Applying Chaotic Logistic Map and Arnold Cat Map”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, No. 9, 2013.
  4. Mohammad Ali Bani Younes and Aman Jantan, “Image Encryption Using Block-Based Transformation Algorithm”, IAENG International Journal of Computer Science, 35, 2008.
  5. Mohammad Ali Bani Younes and Aman Jantan, “An Image Encryption Approach Using a Combination of Permutation Technique
  6. Followed by Encryption”, IJCSNS International Journal of Computer Science and Network Security, VOL.8 , April 2008.
  7. Bibhudendra Acharya, Saroj Kumar Panigrahy, Sarat Kumar Patra, and Ganapati Panda, “Image Encryption Using Advanced Hill Cipher Algorithm”, International Journal of Recent Trend in Engineering, Vol. 1, No. 1, May 2009.
  8. Sesha Pallavi Indrakanti, P.S.Avadhani, “Permutation based Image Encryption Technique”, International Journal of Computer Applications (0975 – 8887) Volume 28– No.8, 2011.
  9. Qais H. Alsafasfeh , Aouda A. Arfoa, “Image Encryption Based on the General Approach for Multiple Chaotic Systems”, Journal of Signal and Information Processing, 2011.
  10. Ibrahim S I Abuhaiba , Maaly A S Hassan, “Image Encryption Using Differential Evolution Approach In Frequency Domain” Signal & Image Processing: An International Journal(SIPIJ) Vol.2, No.1, March 2011.
  11. Nidhal Khdhair El Abbadi, Samer Thaaban Abaas, Ali Abd Alaziz “New Image Encryption Algorithm Based on Diffie-Hellman and Singular Value Decomposition”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 1, January 2016, pages: 197-201.
  12. S.S.Maniccam, N.G. Bourbakis, “Lossless image compression and encryption using SCAN”, Pattern Recognition 34(6): 1229-1245 2001.
  13. Chang-Mok Shin, Dong-Hoan Seo, Kyu-Bo Chol, Ha-Wmn Lee, and SmJmng Kim, “Multilevel Image Encryption by Binary Phase XOR Operations”, IEEE Proceedings, 2003.
  14. Huang-Pei Xiao Guo-Ji Zhang, “An Image Encryption Scheme Based On Chaotic Systems”, IEEE Proceedings of the Fifth International Conference on Machine Learning and Cybernetics, Dalian, 13-16 August 2006.
  15. Amitava Nag, Jyoti Prakash Singh, Srabani Khan, Saswati Ghosh, Sushanta Biswas, D. Sarkar Partha Pratim Sarkar, “Image Encryption Using Affine Transform and XOR Operation ”,International Conference on Signal
  16. Processing, Communication, Computing and Networking Technologies (ICSCCN 2011).
  17. Jiun-In Guo, Jui-Cheng Yen, “A new mirror- like image Encryption algorithm and its VLSI architecture”, Pattern Recognition and Image Analysis, vol.10, No.2, pp.236-247, 2000.
  18. Seyed Mohammad Seyedzade, Reza Ebrahimi Atani and Sattar Mirzakuchaki, “A Novel Image Encryption Algorithm Based on Hash Function”, 6th Iranian Conference on Machine Vision and Image Processing, 2010.
  19. Ismail Amr Ismail, Mohammed Amin, Hossam Diab ,”A Digital Image Encryption Algorithm Based a Composition of Two Chaotic Logistic Maps”, International Journal of Network Security, Vol.11, No.1, pp.1 -10, July 2010.
  20. Rasul Enayatifar , Abdul Hanan Abdullah, “Image Security via Genetic Algorithm”, International Conference on Computer and Software Modeling IPCSIT Vol.14, 2011.
  21. Kuldeep Singh, Komalpreet Kaur, “Image Encryption using Chaotic Maps and DNA Addition Operation and Noise Effects on it”, International Journal of Computer Applications (0975 – 8887) Volume 23– No.6, June 2011.

Downloads

Published

2019-10-12

Issue

Section

Research Articles

How to Cite

[1]
Vishwas C.G.M, Dr. R Sanjeev Kunte, " A Survey on Image Encryption Techniques, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 7, pp.165-170, September-October-2019.