IJERT-A review of different techniques used in image encryption (original) (raw)

A survey report on Different Techniques of Image Encryption

ijetae.com

In the present world when whole web is now coming on from text data to multimedia data, one of the major security concerns is the protection of this multimedia data. Image, which covers the highest percentage of the multimedia data, its protection is very important. This can be achieved by Image encryption. There are so many different techniques should be used to protect confidential image data from unauthorized access. In this paper, I had done the literature review on existing work which is used different techniques for image encryption from 1999 to 2011 and also given general introduction about cryptography and encryption.

IJERT-A Survey Report on Image Encryption Techniques

International Journal of Engineering Research and Technology (IJERT), 2013

https://www.ijert.org/a-survey-report-on-image-encryption-techniques https://www.ijert.org/research/a-survey-report-on-image-encryption-techniques-IJERTV2IS101165.pdf In these days as multimedia data transferred over insecure channel, it becomes an important issue to encrypt image with a suitable image encryption algorithms. An image encryption is different from text due to large processing, pixels definition, time to encrypt and size. This is also a different approach due to different type of attacks possible on text and image data. In this paper we study some encryption technique on the basis of their classification. Major technique are classified in different categories are, (I) Pixel Position permutation based algorithm, (II) value transformation based algorithm and (III) visual transformation based algorithm. We aim to frame this paper as literature survey of these classifications.

Review of Image Encryption using Different Techniques

Academic journal of Nawroz University, 2022

Encryption is one of the measures that ensure the security of images used in various fields such as military understanding, secure clinical imaging offices, Internet and intranet media, electronic banking, and individual association images such as Facebook, WhatsApp, Twitter, etc. On this huge number of images that are sent in a free and open link either during selection or messaging; Then their security ends up being a central need in individual insurance organizations and the arrangement. This article audits and summarizes various image encryption systems to further develop advanced image encryption strategies that operate with expanded flexibility and security.

A Survey on Existing Image Encryption Techniques

In today's technical World people always concern with security of data before sending it over the internet. Security of data provides protection to data from unauthorized access. There is large no. of algorithms are available to secure the data. Cryptography plays a key role in data security. In modern cryptographic system encryption techniques are most widely in use. It provides security to data so that it can be used in confidential area like military, net banking, online transactions, medical, scientific etc. In this paper we mainly focus on some existing encryption techniques. Every technique comes with its good and bad features. It gives a brief review to researcher to choose a particular type of encryption scheme for some selected type of data so that it can be efficient and more secure.

A Survey Paper on Image Encryption Techniques

IJSRD, 2013

Security is an important issue in digital data transmission and storage. The security can be provided by image encryption. Encryption is one of the ways to provide high security when images are transmitted over the network. Image encryption techniques scrambled the pixels of the image and decrease the correlation among the pixels, so that we will get lower correlation among the pixel and get the encrypted image which is hard to understand. There are so many different image encryption techniques available to protect confidential image data from unauthorized access. Image encryption techniques which provide transmission of digital images in more secure way. Encryptions algorithms that are good for textual data may not be suitable for multimedia data because images contain large data. This paper present survey of various encryption methods with its advantages and disadvantages.

A Survey On Different Image Encryption and Decryption Techniques

– This paper focuses mainly on the different kinds of image encryption and decryption techniques. In addition focuses on image encryption techniques, As the use digital techniques for transmitting and storing images are increasing, it becomes an important issue that how to protect the confidentiality, integrity and authenticity of images. There are various techniques which are discovered from time to time to encrypt the images to make images more secure. This paper presents a survey of over 25 research papers dealing with image encryption techniques scrambled the pixels of the image and decrease the correlation among the pixels, so that we will get lower correlation among the pixel and get the encrypted image. In this paper a Survey of Different Image Encryption and encryption techniques that are existing is given. It additionally focuses on the functionality of Image encryption and decryption techniques.

A Survey and Analysis of the Image Encryption Methods

At the present time, the protection of multimedia data has become a very important process which can be achieved by encryption. Basically, so many different techniques have been used to protect private image data from those who illegally try to have access. An efficient cryptographic scheme is one that has a space of a large key that resists brute force search time, less execution time complexity/ Highspeed and should be able to provide high confusion and diffusion for good security. In this paper, we survey an existing work which uses classic and modern techniques for image encryption, as the classic techniques used for text based on alphabets as basic elements while the modern techniques overcome this limitation by used mathematical algorithms for coding the information due to their digital system. A comparison has been conducted between several ciphers techniques (classic and modern) for images based on various parameters such as: Histogram, Correlation, Number of Pixels Change Rate (NPCR), Unified Average Changing Intensity (UACI), Peak Signal to Noise Ratio (PSNR), Entropy and Time complexity. An analysis of simulation result shows that chaotic encryption technique especially hyper-chaotic is the most efficient among the all.

Recent Trends in Image Encryption: A Review

2016

Security of multimedia data is gaining acceptance owing to the growth and acceptability of images in various applications and in telecommunication. Encryption is one of the ways to ensure the security of images as they are used in many fields such as in secure medical imaging services, military intelligence, internet and intranet communication, e-banking etc. These images are stored or transmitted through a network; hence the security of such image data is important. In this work, recently developed encryption techniques are studied and analyzed to promote further development of more encryption methods to ensure additional security and versatility. All the techniques reviewed came into existence within the last five years (2011-2015) and are found to be useful for the present day encryption applications. Each technique is unique in its own way, which might be suitable for different applications. As time goes on, new encryption techniques are evolving. Hence, fast and secure conventi...

A Comprehensive Review About Image Encryption Methods

Harran Üniversitesi Mühendislik Dergisi, 2022

In today's technology world, data security has a great importance. Because each data type has its own characteristics, there are various methods of providing this security. The main subject of this study is the security of image data which are more complex structures than text data. Using traditional encryption methods alone to ensure security in image data types can create security weaknesses. For this reason, nowadays, some traditional methods are combined with each other or different methods to encrypt image data. In this study, 131 articles were examined and image encryption methods were classified according to the traditional methods, some new methods or combinations of some methods, that they contain. Studies on both colored and gray level images have been handled together. Finally, the images used in the articles were compared with each other in many ways and the results were presented graphically.

Subject Review: Image Encryption Based on Multi Techniques

International Journal of Engineering Research and Advanced Technology (IJERAT), 2021

The enormous advancements in communication network, particularly the internet networks, that employed to allow numerous individuals to exchange various forms of data, Security of data has become a big issue. As a result, the usage of cipherment and decipherment ways is becoming more popular. Sundry cipherment means have been created to ensure data security, the chaos encryption system being one of the most widely employed in recent years. In this research, a review of diverse image cipherment algorithms have been reviewed, which researchers can gain insight into the most efficient techniques to employ.