CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

A Review on Various Digital Image Encryption Techniques and Security Criteria

by Mohit Kumar, Akshat Aggarwal, Ankit Garg
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 96 - Number 13
Year of Publication: 2014
Authors: Mohit Kumar, Akshat Aggarwal, Ankit Garg
10.5120/16854-6720

Mohit Kumar, Akshat Aggarwal, Ankit Garg . A Review on Various Digital Image Encryption Techniques and Security Criteria. International Journal of Computer Applications. 96, 13 ( June 2014), 19-26. DOI=10.5120/16854-6720

@article{ 10.5120/16854-6720,
author = { Mohit Kumar, Akshat Aggarwal, Ankit Garg },
title = { A Review on Various Digital Image Encryption Techniques and Security Criteria },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 96 },
number = { 13 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 19-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume96/number13/16854-6720/ },
doi = { 10.5120/16854-6720 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:21:39.248615+05:30
%A Mohit Kumar
%A Akshat Aggarwal
%A Ankit Garg
%T A Review on Various Digital Image Encryption Techniques and Security Criteria
%J International Journal of Computer Applications
%@ 0975-8887
%V 96
%N 13
%P 19-26
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Images excessively contribute to communication in this era of multimedia. When a user transfers images over an unsecured communication network, then the absolute protection is a challenging issue to conserve the confidentiality of images. Encryption is a method of retaining the secrecy of images. This paper provides the succinct introduction to the cryptography, moreover, includes a concise description of various elemental securities' criteria of the image encryption algorithms. This work presents the survey of diverse image encryption techniques and comparison of discrete image encoding approaches, at last discloses a conclusion and suggests future works.

References
  1. Nag, Jyoti Prakash Singh, Srabani Khan, Sushanta Biswas, D. Sarkar, Partha Pratim Sarkar "Image Encryption Using Affine Transform and XOR Operation" 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN 2011), 21-22 July 2011, pages : 309-312.
  2. Long Bao, Yicong Zhou, C. L. Philip Chen, Hongli Liu "A New Chaotic System for Image Encryption" 2012 International Conference on System Science and Engineering, June 30-July 2, 2012, pages: 69-73 .
  3. Qiudong Sun, Ping Guan, Yongping Qiu, Yunfeng Xue "A Novel Digital Image Encryption Method Based on One-dimensional Random Scrambling" 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, 29-31 May 2012, page: 1669-1672.
  4. Amnesh Goel, Nidhi Chandra "A Technique for Image Encryption Based On Explosive n*n Block displacement Followed By Inter-Pixel Displacement of RGB Attribute of A Pixel" 2012 International Conference on Communication Systems and Network Technologies, 11-13 May 2012, page: 884-888.
  5. Saraswati D. Joshi, Dr. V. R. Udupi, Dr. D. R. Joshi, "A Novel Neural Network Approach for Digital Image Data Encryption/Decryption", Power, Signals, Controls and Computation (EPSCICON), 2012 International Conference on 3-6 Jan. 2012, pages: 1-4.
  6. Mohammed Abbas Fadhil Al-Husainy, "A Novel Encryption Method for Image Security", International Journal of Security and Its Applications, vol. 6, no. 1, January 2012, pages: 1-8.
  7. Anchal Jain, Navin Rajpal, "A Two Layer Chaotic Network Based Image Encryption Technique", Computing and Communication Systems (NCCCS), 2012 National Conference on 21-22 Nov. 2012, pages: 1-5.
  8. Nidhi Sethi, Deepika Sharma, "A New Cryptographic Approach for Image Encryption", Parallel, Distributed and Grid Computing (PDGC), 2012 2nd IEEE International Conference on 6-8 Dec. 2012, pages: 905-908.
  9. Somdip Dey, "SD-AEI: An Advanced Encryption Technique for Images", Digital Information Processing and Communications (ICDIPC), 2012 Second International Conference on 10-12 July 2012, pages: 68-73.
  10. Hazem Mohammad Al-Najjar, "Digital Image Encryption Algorithm Based on Multi-Dimensional Chaotic System and Pixels Location", International Journal of Computer Theory and Engineering, Vol. 4, No. 3, June 2012, pages: 354-357.
  11. Dattatherya, S. Venkata Chalam & Manoj Kumar Singh, "Unified Approach with Neural Network for Authentication, Security and Compression of Image: UNICAP", International Journal of Image Processing (IJIP), Volume (6), Issue (1), 25 Feb 2012, pages: 13-25.
  12. Pia Singh, Karamjeet Singh, "Image Encryption and Decryption Using Blowfish Algorithm in MATLAB", International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013, pages: 150-154.
  13. Riah Ukur Ginting, Rocky Yefrences Dillak, "Digital Color Image Encryption Using RC4 Stream Cipher and Chaotic Logistic Map", Information Technology and Electrical Engineering (ICITEE), 2013 International Conference on 7-8 Oct. 2013, pages: 101-105.
  14. Gurpreet Singh, Amandeep Kaur, "GS-IES: An Advanced Image Encryption Scheme" International Journal of Engineering Research & Technology, Vol. 2 Issue 9, September – 2013, pages: 465-468.
  15. D. R. Stinson, Cryptography, Theory and Practice. Third edition: Chapman & Hall/CRC, 2006.
  16. William Stallings, Cryptography and Network Security, Principles and Practice. Fifth edition.
  17. Shujiang Xu, Yinglong Wang, Jizhi Wang, Yucui Guo, "A Fast Image Encryption Scheme Based on a Nonlinear Chaotic Map", 2010 2nd International Conference on Signal Processing Systems (ICSPS), 5-7 July 2010, pages: v2-326-v2-330.
  18. Linhua Zhang, Xiaofeng Liao, Xuebing Wang, "An image encryption approach based on chaotic maps", Chaos, Solitons & Fractals. Volume 24, Issue 3, May 2005, Pages 759–765.
  19. http://en. wikipedia. org/wiki/Histogram
  20. Karl Pearson (1895), "Contributions to the Mathematical Theory of Evolution II, Skew Variation in Homogeneous Material". Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 186: 343–414.
  21. Xu Shujiang Wang Yinglong, Guo Yucui Wang Cong, "A Novel Chaos-based Image Encryption Scheme", International Conference on Information Engineering and Computer Science (ICIECS) 2009, 19-20 Dec. 2009, pages: 1- 4.
  22. http://www. waset. org/journals/waset/v3/v3-7. pdf Analysis and Comparison of Image Encryption Algorithms by Ismet Öztürk and Ibrahim Soukpinar.
  23. Abhinav Srivastava, "A survey report on Different Techniques of Image Encryption", International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 6, June 2012, pages: 163-167.
  24. Khaled Loukhaoukha, Jean-Yves Chouinard, and Abdellah Berdai, "A Secure Image Encryption Algorithm Based on Rubik's Cube Principle", Journal of Electrical and Computer Engineering, Volume 2012 (2012), Article ID 173931, 13 pages.
Index Terms

Computer Science
Information Sciences

Keywords

Encrypted image histogram image image encryption image security parameters permutation and substitution scrambling XOR operation.