A Survey and Analysis of the Image Encryption Methods (original) (raw)
Related papers
Subject Review: Image Encryption Based on Multi Techniques
International Journal of Engineering Research and Advanced Technology (IJERAT), 2021
The enormous advancements in communication network, particularly the internet networks, that employed to allow numerous individuals to exchange various forms of data, Security of data has become a big issue. As a result, the usage of cipherment and decipherment ways is becoming more popular. Sundry cipherment means have been created to ensure data security, the chaos encryption system being one of the most widely employed in recent years. In this research, a review of diverse image cipherment algorithms have been reviewed, which researchers can gain insight into the most efficient techniques to employ.
Review on Different Chaotic Based Image Encryption Techniques
2014
In present times, Due to the rapidly growth of digital and multimedia applications, more multimedia data are developed and transmitted through the networks in ,art, entertainment, advertising, education, training and commercial areas, which may have important information that should not be accessed by the general users. Therefore issue of protecting the confidentiality, integrity, security, privacy as well as the authenticity of images has become an important issue for communication and storage of images. In recent years, various encryption techniques are developed and applied to protect the confidential images from unauthorized users. This paper has a review on the aspects and existing different image encryption techniques based on chaos to design an image cryptosystem. In this paper, first a general introduction given for cryptography and images encryption and followed by discussion of different chaotic based image encryption techniques and related works for each technique reviewe...
Image Encryption Techniques (2011)
This paper lays down the various image encryption techniques and specifically gives an account of chaos based encryption of images. The kinds of techniques studied include image encryption using digital signatures, lossless image compression and encryption using SCAN, mirror like image encryption, chaotic image encryption and colour image encryption using double random phase coding. Image encryption is different from text encryption because of the larger scale of data, higher redundancy and stronger correlation of pixels in images. Hence traditional encryption algorithms are not suitable for digital image encryption. To overcome these drawbacks we present a chaos based algorithm for images. This algorithm is based on scrambling of pixels where the randomness of chaos is utilized. The data are scrambled in the order of randomness of elements based on the chaotic map and reshuffled again to their original positions in the decryption process. Compared to traditional methods, chaotic image key encryption has a larger space, simple implementation, robustness and the advantages of faster encryption.
PROTECTION OF IMAGE OVER INTERNET USING DIFFERENT CHAOTIC ENCRYPTION METHOD: A SURVEY
AGU International Journal of Engineering & Technology , 2017
Image security is a very important area for today's research fields. It is essential so that any data violation and corruption can be prevented. Due to the marvelous growth of information technology, security of image has become a major concern. Encryption is one of the ways to ensure high security for images. Image encryption plays an important role in the field of image security. Most of the image encryption techniques have some security and performance issues. In recent years, encryption technology has been developed quickly and many image encryption methods have been used to secure image from unauthorized access. Lots of image encryption algorithm has been executed in previous researches. The chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. In this paper we will analyze some of the chaotic image encryption methods used randomly for image security in order to find out a better solution form the previous results.
Image Based Encryption Techniques : A Review
2014
Now a day’s rapid increasing growth of internet and multimedia data, security is main problem in storage and communication of images. The solution of this multimedia data can be solved by using encryption. There are various techniques available to protect the image data from unauthorized access. In this paper, authors reviewed different existing techniques of image encryption and also discussed the basic knowledge of Cryptography. Keywords— Chaotic Map, Cryptography, Decryption, Encryption, SCAN pattern, Security.
Chaos Image Encryption Methods: A Survey Study
Bulletin of Electrical Engineering and Informatics, 2017
With increasing dependence on communications over internet and networks, secure data transmission is coming under threat. One of the best solutions to ensure secure data transmissions is encryption. Multiple forms of data, such as text, audio, image, and video can be digitally transmitted, nowadays images being the most popular and old encryption techniques such as: AES,DES,RSA etc., show low security level when used for image encryption. This problem was resolved by using of chaos encryption which is an acceptable form of encryption for image data. The sensitivity to initial conditions and control parameters make chaos encryption suitable for image applications. This study discusses various chaos encryption techniques.
A Survey of Image Encryption Algorithms
3D Research, 2017
Security of data/images is one of the crucial aspects in the gigantic and still expanding domain of digital transfer. Encryption of images is one of the well known mechanisms to preserve confidentiality of images over a reliable unrestricted public media. This medium is vulnerable to attacks and hence efficient encryption algorithms are necessity for secure data transfer. Various techniques have been proposed in literature till date, each have an edge over the other, to catch-up to the ever growing need of security. This paper is an effort to compare the most popular techniques available on the basis of various performance metrics like differential, statistical and quantitative attacks analysis. To measure the efficacy, all the modern and grown-up techniques are implemented in MATLAB-2015. The results show that the chaotic schemes used in the study provide highly scrambled encrypted images having uniform histogram distribution. In addition, the encrypted images provided very less degree of correlation coefficient values in horizontal, vertical and diagonal directions, proving their resistance against statistical attacks. In addition, these schemes are able to resist differential attacks as these showed a high sensitivity for the initial conditions, i.e. pixel and key values. Finally, the schemes provide a large key spacing, hence can resist the brute force attacks, and provided a very less computational time for image encryption/decryption in comparison to other schemes available in literature.
A Comparative Review on Non-chaotic and Chaotic Image Encryption Techniques
Intelligent Computing and Innovation on Data Science, 2021
In the new era, multimedia technology is used extensively. Multimedia data transfers over the Internet are not adequately stable. Data protection is needed for digital images transfer to avoid unauthorized entities. Many encryption strategies have been established for multimedia data over a medium that is not stable. This paper aims to compare the techniques used in encoding multimedia content. This paper explains the process for assessment for chaos image encryption algorithm. The chaos-based image encryption algorithm is used mainly because of its high protection and efficiency. Parameters such as MSC, encryption quality and avalanche effect check the image's quality. This paper presents a comparative review of non-chaotic and chaotic image encryption techniques.
Image Encryption Techniques Using Chaotic Schemes: A Review
2010
Cryptography is about communication in the presence of an adversary. It encompasses many problems like encryption, authentication, and key distribution to name a few. The field of modern cryptography provides a theoretical foundation based on which one can understand what exactly these problems are, how to evaluate protocols that purport to solve them and how to build protocols in whose security one can have confidence. Advanced digital technologies have made multimedia data widely available. Recently, multimedia applications become common in practice and thus security of multimedia data has become main concern. The basic issues pertaining to the problem of encryption has been discussed and also a survey on image encryption techniques based on chaotic schemes has been dealt in the present communication. The chaotic image encryption can be developed by using properties of chaos including deterministic dynamics, unpredictable behavior and non-linear transform. This concept leads to te...
Image Encryption Techniques: A Selected Review
In recent years, encryption technology has been developed quickly and many image encryption methods have been used. As a result of Development Of computer network technology, communication of information through personal computer is becoming more convenient. It also gives opportunities to hackers to attack the network. Therefore, the communication security is now an important issue for multimedia. This paper proposed various encryption techniques for color or gray scale image based on chaotic system and other traditional methods. New image encryption techniques for images have suggested several advantages over the traditional encryption algorithms such as high security, speed and computational power. This paper presents numbers of image encryption techniques from which researchers can get an idea for efficient techniques to be used.