An Analytical Survey on Different Secured Image Encryption Techniques  
  Authors : Prabir Kr. Naskar; Sumit Majumdar; Prasenjit Das; Avijit Bose

 

In modern age, secret image transmission over internet is an important issue. So, protections of secret images are major challenge during transmission over internet. Encryption is one of the popular techniques to protect secret images. Modern cryptography provides essential techniques for securing information and protecting multimedia data. Although traditional encryption techniques are not suitable for protection of secret images due to bulk data capacity and high correlation among neighboring pixels. In recent years, many popular encryption techniques have been emerged and many image encryption methods have been used to protect confidential image data from unauthorized access. This paper is an analytical survey of popular secured image encryption techniques from which researches can get an idea for efficient techniques to be used.

 

Published In : IJCAT Journal Volume 1, Issue 8

Date of Publication : 30 September 2014

Pages : 396 - 403

Figures :01

Tables : 01

Publication Link : An Analytical Survey on Different Secured Image Encryption Techniques

 

 

 

Mr. Prabir Kr. Naskar : (B.Tech in Computer Science & Engineering, M.Tech in Computer Technology) is presently working as Assistant Professor in the Department of Computer Science & Engineering, MCKV Institute of Engineering, West Bengal, India for last three years. His current research interests include: cryptography, information sharing, steganography, watermarking and image processing.

Mr. Sumit Majumdar : (B.Tech in Computer Science & Engineering, M.E in Computer Science and Engineering) is presently working as Assistant Professor in the Department of Computer Science & Engineering, MCKV Institute of Engineering, West Bengal, India for last four years. His current research interests include: Pattern recognition, Image processing, cryptography and watermarking.

Mr. Prasenjit Das : is Assistant Professor in the Computer Science and Engineering Department of MCKV Institute of Engineering. He received the M.C.A. and M.Tech. Degree from West Bengal University of Technology. His current research focuses on the data mining, optimization techniques and image processing.

Mr. Avijit Bose : (B.Tech in Computer Science and Engineering, M.Tech in Information Technology) is presently working as Assistant Professor in the Computer Science and Engineering Department of MCKV Institute of Engineering for last ten years. He is the member of IEEE. His current research focuses on the Network security, cryptography, and wireless mobile network.

 

 

 

 

 

 

 

Image encryption

decryption

multilevel image encryption

encryption by random grids

total shuffling

Nowadays, providing security of a secret image is very important. Although, Image encryption is completely different from text encryption. This survey paper shows some important encryption techniques in the span of more than 14 years (1999-2014) and those techniques are studied and analyzed in order to make familiar with the various encryption algorithm used in encrypting the image. To sum up, all the techniques are useful for real time encryption and each technique is unique in its own way, which might be suitable for image as secret data. Every day new encryption technique is developing therefore fast, robust and secure conventional encryption techniques will work with high rate of security.

 

 

 

 

 

 

 

 

 

[1] National Bureau of Standards, “Data Encryption Standard”, FIPS Publication 46, 1977.

[2] NIST, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, Special Publication 800-67.

[3] Daemen, J., and Rijmen, V. "Rijndael: The Advanced Encryption Standard", Dr. Dobb's Journal, 2001.

[4] Rivest, R.; A. Shamir; L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", Communications of the ACM 21 (2), 1978, pp.120–126.

[5] Shuqun Zhang and Mohammed A. Karim, “Color image encryption using double random phase encoding”, Microwave and Optical Technology Letters, 1999, vol. 21(5), pp.318-322.

[6] Jiun-In Guo, Jui-Cheng Yen, “A new mirror-like image Encryption algorithm and its VLSI architecture”, Pattern Recognition and Image Analysis, 2000, vol.10 (2), pp.236-247.

[7] S.S.Maniccam, N.G. Bourbakis, “Lossless image compression and encryption using SCAN”, Pattern Recognition (34), 2001, pp.1229- 1245.

[8] Chin-Chen Chang, Min-Shian Hwang, Tung-Shou Chen, “A new encryption algorithm for image cryptosystems ”, The Journal of Systems and Software (58), 2001, pp.83-91.

[9] Aloha Sinha, Kehar Singh, “A technique for image encryption using digital signature”, Optics Communications, 2003, vol-218, pp.229-234.

[10] Chang-Mok Shin, Dong-Hoan Seo, Kyu-Bo Chol, Ha- Wmn Lee, SmJmng Kim, “Multilevel Image Encryption by Binary Phase XOR Operations”, IEEE Proceeding, 2003, vol.3.

[11] N. K. Pareek, V. Patidar, K. K. Sud, "Image encryption using chaotic logistic map", Image and Vision Computing 24, Elsevier, 2006, pp.926-934.

[12] M. Zeghid, M. Machhout, L. Khriji, A. Baganne, R. Tourki, “A Modified AES Based Algorithm for Image Encryption”, World Academy of Science, Engineering and Technology, International Journal of Computer, Information, Systems and Control Engineering, 2007, vol.01(3), pp.735-740.

[13] Shyong Jian Shyu, “Image encryption by random grids”, Pattern Recognition 40, 2007, pp.1014-1031.

[14] Mohammad Ali Bani Younes, Aman Jantan, “Image Encryption Using Block-Based Transformation Algorithm”, IAENG International Journal of Computer Science, 2008, vol.35(1).

[15] Mohammad Ali Bani Younes, Aman Jantan, “An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption”, IJCSNS International Journal of Computer Science and Network Security, 2008, vol.8(4), pp.191-197.

[16] Tiegang Gao, Zengqiang Chen, "Image encryption based on a new total shuffling algorithm", Chaos, Solitons & Fractals, Elsevier, 2008, vol.38(1), pp.213- 220

[17] A. Mitra, Y. V. Subba Rao, S. R. M. Prasanna, "A New Image Encryption Approach using Combinational Permutation Techniques", World Academy of Science, Engineering and Technology, 2008, vol.2, pp.812-816.

[18] Zhang Yun-peng, Liu Wei, Cao Shui-ping, Zhai Zhengjun, Nie Xuan , Dai Wei-di, “Digital image encryption algorithm based on chaos and improved DES”, IEEE International Conference on Systems, Man and Cybernetics, 2009, pp.474-479.

[19] Valerij Rozouvan, “Modulo image encryption with fractal keys”, Optics and Lasers in Engineering 47, 2009, pp.1-6.

[20] Ji Won Yoon, Hyoungshick Kim, "An image encryption scheme with a pseudorandom permutation based on chaotic maps", Commun Nonlinear Sci Number Simulat, Elsevier, 15, 2010, pp.3998–4006.

[21] Amitava Nag, Jyoti Prakash Singh, Srabani Khan, Saswati Ghosh,Sushanta Biswas, D. Sarkar Partha Pratim Sarkar, “Image Encryption Using Affine Transform and XOR Operation”, International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN 2011), IEEE, 2011, pp.309-312.

[22] G. A. Sathish Kumar, K. Bhoopathy Bagan, V. Vivekanand, "A Novel algorithm for image encryption by integrated pixel scrambling plus diffusion [IISPD] utilizing duo chaos mapping applicability in wireless systems", Procedida Computer Science 3, 2011, pp.378- 387

[23] Yan Shen, Guoji Zhang, XCuan Li, Qing Liu, "An Improved Image Encryption Method Based on Total Shuffling Scheme", Advances in CSIE, Springer- Verlag, 2012, vol.2, AISC-169, pp.643-650.

[24] H. T. Panduranga, S. K. Naveen Kumar, "A Novel Image Encryption Technique using Multi-Wave Based Carrier Image", International Conference on Modeling Optimization and Computing (ICMOC), Procedia Engineering, 2012, vol-38, pp.2998-3004.

[25] Amnesh Goel, Nidhi Chandra, "A Technique for Image Encryption with Combination of Pixel Rearrangement Scheme Based on Sorting Group-Wise of RGB Values and Explosive Inter-Pixel Displacement", International Journal of Image, Graphics and Signal Processing, 2012, vol.2, pp.16-22.

[26] Qiudong Sun, Wenying Yan, Jiangwei Huang, Wenxin Ma, “Image Encryption Based on Bit-plane Decomposition and Random Scrambling”, Journal of Shanghai Second Polytechnic University, 2012, IEEE, vol. 09, pp.2630-2633.

[27] Salim M. Wadi, Nasharuddin Zainal, "Rapid Encryption Method based on AES algorithm for Gray Scale HD Image Encryption", ICEEI 2013, Procedia Technology, 2013, vol.11, pp.51-56

[28] P. K. Naskar, A. Chaudhuri, A. Chaudhuri, “A secure symmetric image encryption based on linear geometry”, Applications and Innovations in Mobile Computing (AIMoC), IEEE, 2014, pp.67-74.

[29] Yuanyuan Sun mail, Lina Chen, Rudan Xu, Ruiqing Kong, "An Image Encryption Algorithm Utilizing Julia Sets and Hilbert Curves", PLOS ONE, Vol-9, Issue-1, 2014.

[30] P. K. Naskar, A. Chaudhuri, “A Secure Symmetric Image Encryption Based on Bit-wise Operation”, International Journal of Image, Graphics and Signal Processing (IJIGSP), 2014, vol.6(2), pp.30-38.

[31] Nidhal K. EI Abbadi, Adil Mohamad, Mohammed Abdul-Hameed, "Image Encryption based on Singular Value Decomposition”, Journal of Computer Science 10(7), 2014, pp.1222-1230.

[32] Ruisong Ye, Shaojun Zeng, Peiqian Lun, Junming Ma, Chuting Lai, "An Image Encryption Scheme based on Bit Circular Shift and Bi-directional Diffusion", International Journal of Information Technology and Computer Science, 2014, pp.82-92.

[33] Jun-xi Chen, Z-liang Zhu, Zhengjun Liu, Chong Fu, Libo Zhang, Hi Yu, "A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains", Optics Express, Optical Society of America, 2014, vol.22(6), pp.7349-7361.