Securing Images using Encryption Techniques A Survey  
  Authors : Vrinda A; Mr. Arun Anoop M

 

In modern world, security is a big issue and securing important data is hence very essential, so that the data cannot be intercepted or misused for illegal purposes. Cryptography is the art or science of encompassing the principles and methods of transforming an intelligible message into that is unintelligible and then retransforming that message back to its original form. Image trafficking across the network is increasing rapidly. Security has become an inseparable issue in digital image transport over the internet. The most widely used and accepted technique for securing digital images is cryptography and various encryption techniques which involves permutation based encryption and visual encryption techniques are summarized here.

 

Published In : IJCAT Journal Volume 1, Issue 2

Date of Publication : 31 March 2014

Pages : 12 - 16

Figures : 06

Tables : 02

Publication Link : IJCAT-2014/1-2/Securing-Images-using-Encryption-Techniques-A-Survey

 

 

 

Vrinda A : She obtained her BTech in Information Technology from university of Calicut in the year 2007. She was a member of faculty in the department of information technology at Amrita School Of Engineering,ettimadai, Coimbatore from 2007 to 2009.Later she took up employment as lecturer in department of information technology in MESCE,kuttippuram, kerala. Presently she is pursuing her MTech programme in computer science and engineering at MESCE kuttippuram. She has 5 years of teaching experience.Her research interests covers areas of network security, cryptography and mobile ad-hoc networks.

Mr. Arun Anoop M : He obtained his BTech in Computer Science and Engineering from cochin university in the year 2008.He completed his PG diploma in information security and system administration from DOEACC center, NIT , Calicut and obtained his MTech in Information Technology from kalasalingam university in the year 2011.Presently he is working as Assistant Professor in Computer Science and Engineering, MESCE, kuttippuram, kerala.Before joining MESCE he has worked as teaching assistant in information technology in kalasalingam university, krishnankoil, Tamilnadu. He is having 3.6 years of teaching experience. He has attended many workshops, FDPs and conferences. His areas of interest are network security, wireless sensor networks, protocol design, formal languages and theoretical computer science. He has presented 3 papers in National and International Conferences. He has published 8 journals and guided 6 Mtech students.

 

 

 

 

 

 

 

Network Security

Image Encryption

Visual Cryptography

The encrypted images using combinational approach is more scrambled as compared to individual technique. In future, these image encryption techniques can be combined with other Cryptographic methods (Encryption +Steganography) to build a perfectly secure Cryptographic method for high security information transfer. Visual cryptography Scheme (VCS) is an emerging cryptography technology which uses the characteristics of human vision system to decrypt images without involving complex computation. A combination of many of the techniques discussed above could help secure digital image transfer in internets.

 

 

 

 

 

 

 

 

 

[1] D. Somdip, “SD-EI: A cryptographic technique to encrypt images,." IEEE International Conference on Cyber Security, CyberWarfare and Digital Forensic (CyberSec ), june 2012.

[2] S. K. P. Bibhudendra Acharya, Saroj Kumar Panigrahy and G. Panda, “Image encryption using advanced hill cipher algorithm," vol. abs/vol 1. , International Journal of Recent Trends in Engineering, May 2009.

[3] D. Somdip, “SD-AEI: An advanced encryption technique for images." IEEE Second International Conference on Digital Information Processing and Communications (ICDIPC), 2012,

[4] S. Dey, “Amalgamation of cyclic bit operation in sd-ei image encryption method: An advanced version of SD-EI method: SD-EI ver-2." International Journal of Cyber- Security and Digital Forensics (IJCSDF) 1(3): 221-225 The Society of Digital Information and Wireless Communications (SDIWC), 2012.

[5] S. P. Indrakanti and P.S.Avadhani,” Permutation based image encryption technique," International Journal of Computer Applications, August 2011, p. 0975 8887.,vol 28,No 8.

[6] A. Saroj Kumar Panigrahy, Bibhudendra and D. Jena.,”Image encryption. using self-invertible key matrix of hill cipher algorithm,." 1st International Conference on Advances in Computing, Chikhli, India, february 2008, pp. 21 22.

[7] S. Ghatak and J. K. Mandal, “Constant aspect ratio based (2, 2) visual cryptography through meaningful shares." IEEE international conference Westbengal, 2011.

[8] L. J. Anbarasi and N. S. Alex, “Enhanced image secret sharing via error diffusion in halftone visual cryptography." IEEE international conference, 2011.

[9] Rajan and J. James, “Enhanced color visual secret sharing scheme using modified error diffusion." International Conference on Research Trends in Computer Technologies Proceedings published in International Journal of Computer Applications,ICRTC, 2013.

[10] G. R. A. F. I. Zhi Zhou Member, IEEE and G. D. Crescenzo, “Halftone visual cryptography." IEEE Transactions on imageprocessing, 2010.