Digital Image Encryption Techniques: Article Review

Main Article Content

Enas Ali Jameel
Sameera Abbas Fadhel

Abstract

 In this age of the multi-media, images have an important impact on communication. When users upload images over an insecure communication network, total security is a difficult problem to address in order to maintain image confidentiality. Also, encryption is a technique for keeping images secret. This study gives a basic introduction to cryptography, as well as a concise overview regarding the many image encryption algorithms' elemental security criteria. This paper includes an overview of several image encryption approaches as well as a comparison of discrete image encoding techniques, before coming to a conclusion and recommending future research.


fig5.jpg


Article Details

How to Cite
Jameel, E. A., & Fadhel, S. A. (2022). Digital Image Encryption Techniques: Article Review. Technium: Romanian Journal of Applied Sciences and Technology, 4(2), 24–35. https://doi.org/10.47577/technium.v4i2.6026
Section
Articles

References

Stinson, D. R. (2005). Cryptography: theory and practice. Chapman and Hall/CRC.

Choo, K. K. R., Domingo-Ferrer, J., & Zhang, L. (2016). Cloud Cryptography: Theory, Practice and Future Research Directions. Future Gener. Comput. Syst., 62 (C), 51-53.

Marwaha, M., & Bedi, R. (2013). Applying encryption algorithm for data security and privacy in cloud computing. International Journal of Computer Science Issues (IJCSI), 10 (1), 367.

Hou, J., Jiang, M., Guo, Y., & Song, W. (2019). Efficient identity-based multi-bit proxy re-encryption over lattice in the standard model. Journal of Information Security and Applications, 47, 329-334.

Srivastava, A. (2012). A survey report on Different Techniques of Image Encryption. International Journal of Emerging Technology and Advanced Engineering, 2 (6), 163-167.

Chowdhary, C. L., Patel, P. V., Kathrotia, K. J., Attique, M., Perumal, K., & Ijaz, M. F. (2020). Analytical study of hybrid techniques for image encryption and decryption. Sensors, 20 (18), 5162

Patel, S., Bharath, K. P., & Kumar, R. (2020). Symmetric keys image encryption and decryption using 3D chaotic maps with DNA encoding technique. Multimedia Tools and Applications, 79 (43), 31739-31757.

Kengnou Telem, A. N., Meli Segning, C., Kenne, G., & Fotsin, H. B. (2014). A simple and robust gray image encryption scheme using chaotic logistic map and artificial neural network. Advances in Multimedia, 2014.

Lakshmi, C., Thenmozhi, K., Rayappan, J. B. B., Rajagopalan, S., Amirtharajan, R., & Chidambaram, N. (2021). Neural-assisted image-dependent encryption scheme for medical image cloud storage. Neural Computing and Applications, 33 (12), 6671-6684.

Chalam, S. V., & Singh, M. K. (2012). Unified Approach with Neural Network for Authentication, Security and Compression of Image: UNICAP. International Journal of Image Processing (IJIP), 6 (1), 13.

Bao, L., Zhou, Y., Chen, C. P., & Liu, H. (2012, June). A new chaotic system for image encryption. In 2012 International Conference on System Science and Engineering (ICSSE) (pp. 69-73). IEEE.

Sethi, N., Sharma, D. (2012, December). A new cryptology approach for image encryption. In 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing (pp. 905-908). IEEE.

Xu, S., Wang, Y., Guo, Y., & Wang, C. (2009, December). A novel chaos-based image encryption scheme. In 2009 International Conference on Information Engineering and Computer Science (pp. 1-4). IEEE.

Fu, C., Lin, B. B., Miao, Y. S., Liu, X., & Chen, J. J. (2011). A novel chaos-based bit-level permutation scheme for digital image encryption. Optics communications, 284 (23), 5415-5423.

Yang, H., Wong, K. W., Liao, X., Zhang, W., & Wei, P. (2010). A fast image encryption and authentication scheme based on chaotic maps. Communications in Nonlinear Science and Numerical Simulation, 15 (11), 3507-3517.

Loukhaoukha, K., Chouinard, J. Y., & Berdai, A. (2012). A secure image encryption algorithm based on Rubik's cube principle. Journal of Electrical and Computer Engineering, 2012.

Diaconu, A. V., & Loukhaoukha, K. (2013). An improved secure image encryption algorithm based on Rubik's cube principle and digital chaotic cipher. Mathematical Problems in Engineering, 2013.

Zhang, L., Liao, X., & Wang, X. (2005). An image encryption approach based on chaotic maps. Chaos, Solitons & Fractals, 24 (3), 759-765.

Gong, Q., Wang, H., Qin, Y., & Wang, Z. (2019). Modified diffractive-imaging-based image encryption. Optics and Lasers in Engineering, 121, 66-73.

Saraf, K. R., Jagtap, V. P., & Mishra, A. K. (2014). Text and image encryption decryption using advanced encryption standard. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), 3 (3), 118-126.

Li, X., Meng, X., Yang, X., Wang, Y., Yin, Y., Peng, X., & Chen, H. (2018). Multiple-image encryption via lifting wavelet transform and XOR operation based on compressive ghost imaging scheme. Optics and lasers in engineering, 102, 106-111.

Singh, A., & Dhanda, N. (2015). DIP using image encryption and XOR operation affine transform. IOSR J. Comput. Eng., 17 (2), 7-15.

[23] Liu, Z., Yang, M., Liu, W., Li, S., Gong, M., Liu, W., & Liu, S. (2012). Image encryption algorithm based on the random local phase encoding in gyrator transform domains. Optics Communications, 285 (19), 3921-3925.

Liu, H., Zhao, B., & Huang, L. (2019). A novel quantum image encryption algorithm based on crossover operation and mutation operation. Multimedia Tools and Applications, 78 (14), 20465-20483.

Stinson, D. R. (2005). Cryptography: theory and practice. Chapman and Hall/CRC.

Sun, Q., Guan, P., Qiu, Y., & Xue, Y. (2012, May). A novel digital image encryption method based on one-dimensional random scrambling. In 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery (pp. 1669-1672). IEEE.

Goel, A., & Chandra, N. (2012, May). A technique for image encryption based on explosive n* n block displacement followed by inter-pixel displacement of RGB attribute of a pixel. In 2012 International Conference on Communication Systems and Network Technologies (pp. 884-888). IEEE.

Joshi, S. D., Udupi, V. R., & Joshi, D. R. (2012, January). A novel neural network approach for digital image data encryption/decryption. In 2012 International Conference on Power, Signals, Controls and Computation (pp. 1-4). IEEE.

Bharadwaj, G. V. S. E., Vijaya, K., Balaga, S. K., & Thanikaiselvan, V. (2018, March). Image Encryption Based on Neural Network Architecture and Chaotic Systems. In 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA) (pp. 767-774). IEEE.

Mert, A. C., Ozturk, E., & Savas, E. (2019). Design and implementation of encryption/decryption architectures for bfv homomorphic encryption scheme. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 28 (2), 353-362.

Singh, A., Singh, V. K., & Yadav, S. (2019, April). Image Encryption Technique Using Huffman Coding and Spatial Transformation. In 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 352-356). IEEE.

Al-Husainy, M. A. F. (2012). A novel encryption method for image security. International Journal of Security and Its Applications, 6 (1), 1-8.

Anandkumar, R., & Kalpana, R. (2019). Designing a fast image encryption scheme using fractal function and 3D Henon Map. Journal of Information Security and Applications, 49, 102390.

Jain, A., & Rajpal, N. (2012, November). A two layer chaotic network based image encryption technique. In 2012 National Conference on Computing and Communication Systems (pp. 1-5). IEEE.

Babaei, A., Motameni, H., & Enayatifar, R. (2020). A new permutation-diffusion-based image encryption technique using cellular automata and DNA sequence. Optik, 203, 164000.

Parida, R. R., Singh, B. K., & Pradhan, C. (2021). A Novel Approach for Image Encryption Using Zaslavskii Map and Arnold's Cat Map. In Data Engineering and Intelligent Computing (pp. 269-282). Springer, Singapore.

Dey, S. (2012, July). SD-AEI: An advanced encryption technique for images. In 2012 Second International Conference on Digital Information Processing and Communications (ICDIPC) (pp. 68-73). IEEE.

Al-Najjar, H. M. (2012). Digital image encryption algorithm based on multi-dimensional chaotic system and pixels location. International Journal of Computer Theory and Engineering, 4 (3), 357.

Similar Articles

<< < 8 9 10 11 12 13 14 15 > >> 

You may also start an advanced similarity search for this article.