In modern world, security is a big issue and
securing important data is hence very essential, so that the data
cannot be intercepted or misused for illegal purposes.
Cryptography is the art or science of encompassing the
principles and methods of transforming an intelligible message
into that is unintelligible and then retransforming that message
back to its original form. Image trafficking across the network is
increasing rapidly. Security has become an inseparable issue in
digital image transport over the internet. The most widely used
and accepted technique for securing digital images is
cryptography and various encryption techniques which involves
permutation based encryption and visual encryption techniques
are summarized here.
Published In : IJCAT Journal Volume 1, Issue 2
Date of Publication : 31 March 2014
Pages : 12 - 16
Figures : 06
Tables : 02
Publication Link : IJCAT-2014/1-2/Securing-Images-using-Encryption-Techniques-A-Survey
Vrinda A : She obtained her BTech in Information Technology from
university of Calicut in the year 2007. She was a member of faculty in
the department of information technology at Amrita School Of
Engineering,ettimadai, Coimbatore from 2007 to 2009.Later she took
up employment as lecturer in department of information technology in
MESCE,kuttippuram, kerala. Presently she is pursuing her MTech
programme in computer science and engineering at MESCE
kuttippuram. She has 5 years of teaching experience.Her research
interests covers areas of network security, cryptography and mobile
ad-hoc networks.
Mr. Arun Anoop M : He obtained his BTech in Computer Science and
Engineering from cochin university in the year 2008.He completed his
PG diploma in information security and system administration from
DOEACC center, NIT , Calicut and obtained his MTech in Information
Technology from kalasalingam university in the year 2011.Presently
he is working as Assistant Professor in Computer Science and
Engineering, MESCE, kuttippuram, kerala.Before joining MESCE he
has worked as teaching assistant in information technology in
kalasalingam university, krishnankoil, Tamilnadu. He is having 3.6
years of teaching experience. He has attended many workshops,
FDPs and conferences. His areas of interest are network security,
wireless sensor networks, protocol design, formal languages and
theoretical computer science. He has presented 3 papers in National
and International Conferences. He has published 8 journals and
guided 6 Mtech students.
[1] D. Somdip, “SD-EI: A cryptographic technique to
encrypt images,." IEEE International Conference on
Cyber Security, CyberWarfare and Digital Forensic
(CyberSec ), june 2012.
[2] S. K. P. Bibhudendra Acharya, Saroj Kumar Panigrahy
and G. Panda, “Image encryption using advanced hill
cipher algorithm," vol. abs/vol 1. , International Journal
of Recent Trends in Engineering, May 2009.
[3] D. Somdip, “SD-AEI: An advanced encryption technique
for images." IEEE Second International Conference on
Digital Information Processing and Communications
(ICDIPC), 2012,
[4] S. Dey, “Amalgamation of cyclic bit operation in sd-ei
image encryption method: An advanced version of SD-EI
method: SD-EI ver-2." International Journal of Cyber-
Security and Digital Forensics (IJCSDF) 1(3): 221-225
The Society of Digital Information and Wireless
Communications (SDIWC), 2012.
[5] S. P. Indrakanti and P.S.Avadhani,” Permutation based
image encryption technique," International Journal of
Computer Applications, August 2011, p. 0975 8887.,vol
28,No 8.
[6] A. Saroj Kumar Panigrahy, Bibhudendra and D.
Jena.,”Image encryption.
using self-invertible key matrix of hill cipher
algorithm,." 1st International Conference on Advances
in Computing, Chikhli, India, february 2008, pp. 21 22.
[7] S. Ghatak and J. K. Mandal, “Constant aspect ratio
based (2, 2) visual cryptography through meaningful
shares." IEEE international conference Westbengal,
2011.
[8] L. J. Anbarasi and N. S. Alex, “Enhanced image secret
sharing via error diffusion in halftone visual
cryptography." IEEE international conference, 2011.
[9] Rajan and J. James, “Enhanced color visual secret
sharing scheme using modified error diffusion."
International Conference on Research Trends in
Computer Technologies Proceedings published in
International Journal of Computer Applications,ICRTC,
2013.
[10] G. R. A. F. I. Zhi Zhou Member, IEEE and G. D.
Crescenzo, “Halftone visual cryptography." IEEE
Transactions on imageprocessing, 2010.