ArticlePDF Available

Abstract

In present times, the protection of multimedia data is becoming very important. The protection of this multimedia data can be done with encryption. There are so many different techniques should be used to protect confidential image data from unauthorized access. In this paper, we survey on existing work which is used different techniques for image encryption and we also give general introduction about cryptography.
A preview of the PDF is not available
... So, other metrics are measure to determine the degree of image encryption [9 14]. Our proposed scheme 2 has been applied to the original image, and compared with some different chaotic maps as Arnold cat map, Baker map, Hénon map and RC6 algorithms [14][15] as can be shown in Figure 6. It is clear that the different algorithms show hidden details of the image. ...
... We measure the deviation between original and encrypted image to determine the quality of image encryption [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18]. Table 2 illustrates the maximum deviation measuring factor using proposed scheme 1 [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17] of the encrypted images. ...
... We measure the deviation between original and encrypted image to determine the quality of image encryption [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18]. Table 2 illustrates the maximum deviation measuring factor using proposed scheme 1 [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17] of the encrypted images. As we can see, the CBC mode with W 2 achieved better results compared to other cases and CFB mode with W 2 makes the worst results between all modes. ...
Article
Full-text available
In this paper we present the applications of image encryption techniques and channel coding techniques, to design scheme effective for secure image transmission over wireless channels, we present three proposed scheme as follow: First scheme apply image encryption by a combination of hybrid chaotic maps using Baker map and our proposed Hénon chaotic map 3 in three different modes of operations, beside using fractional Fourier transform (FRFT). Second image encryption scheme is combine the main advantages of FRFT, Arnold cat map for confusion and our proposed Hénon chaotic map 3 for diffusion. Third scheme based on combination of hybrid chaotic encryption and low density parity check (LDPC) to secure transmission of image over wireless channel. Our proposed scheme improve throughput. The proposed scheme enhanced the performance parameters and achieved both security and reliability of image transmission over wireless channels.
... These keys consist of a public key, which is freely available, and a private key, which must be kept secret. This is a very broad idea of Image encryption's main types [4]. ...
... The discussion emphasizes the shortcomings of existing image encryption schemes based on low-dimensional chaotic systems and synchronous sequence ciphers, facilitating the way for the proposed novel approach. The incorporation of wavelet transform and Arnold mapping in the encryption process adds an additional layer of complexity to prevent potential attacks.In an article by the authors of[4]is discussing the growing importance of security in the field of digital communication and image storage. With encryption emerging as an important solution, the research navigates through the diverse array of techniques designed to protect sensitive image data from falling into unauthorized hands. ...
Thesis
Full-text available
This paper explores the significance of protecting image data in business appli�cations through various Image Encryption Techniques, focusing on DNA Cod�ing, Chaos theory, Jigsaw Transform, and Pseudo-Random Number Generators (PRNGs). Emphasizing the Jigsaw Transform as a key method, this technique in�volves dividing an image into non-overlapping blocks and rearranging them based on a secret key. This process ensures heightened security for transmitted or stored images, addressing confidentiality, integrity, and authenticity. The paper illus�trates the applications of image data in sectors like Healthcare and Finance, and evaluates the proposed technique’s performance using diverse metrics. From Visual Analysis to Information Entropy, the study concludes that the Jigsaw Transform considered as a robust solution for securing image data in business applications.
... In the current context of digital communication and data security, the practice of encrypting images plays a crucial role in protecting visual data from illegal access and manipulation. The intersection of cryptography and image processing has led to the development of sophisticated methods designed to guarantee the secrecy and integrity of images [1,2]. This research investigates the field of image encryption, specifically emphasizing improving the security of the commonly utilized Advanced Encryption Standard (AES) algorithm when employed in the Electronic Codebook (ECB) mode. ...
... Image encryption is utilized to safeguard visual data that is considered secure. In order to protect privacy and ensure the integrity of digital environments, it is imperative to enhance the level of encryption employed [1,14,15]. The process of converting plain data into ciphered data through the application of cryptographic methods renders it incomprehensible without the utilization of decryption mechanisms. ...
Article
Full-text available
The field of secure digital communication and data security has placed significant emphasis on the issue of image encryption. The present work introduces a unique methodology for improving image encryption by utilizing the Advanced Encryption Standard (AES) cipher in the Electronic Codebook (ECB) mode. The suggested methodology leverages the inherent resilience of AES while integrating a novel DNA-segment-based augmentation to reinforce the encryption process. This technique aims to mitigate the constraints associated with the Electronic Codebook (ECB) mode in picture encryption, with the ultimate goal of attaining an elevated standard of security and confidentiality. The efficacy of the suggested methodology is assessed through extensive experimentation, illuminating its potential to offer a sophisticated kind of image encryption that is well-suited for contemporary data security concerns.
... Parameters such as Information En-tropy, Noise attack, Execution Time, Mean Squared Error are explained. Similarly, [6] reviews commonly known and trivial image encryption algorithms. It includes the use of modified AES, Affine Cipher with XOR, Permutation based Encryption and S-box based Encryption along with others mentioned in previous article. ...
Preprint
Full-text available
Various block cipher algorithms are developed keeping feistel cipher as base. These algorithms comprise of substitution boxes, permutation boxes and transposition technique. They follow symmetric key encryption method. This paper also proposes a symmetric key block cipher technique which can be used for encrypting both text and images before transmitting these over internet. The algorithm has 16 rounds of operations with a unique combination of s-boxes, p-boxes and transposition method. The key generation is dynamic similar to AES and key size can be extended as per requirement. Three different images of different qualities were tested and a 49.997% average diffusion in original image was observed along with original image being decrypted as it was. The security in terms of brute force attack, differential and linear cryptanalysis was analysed and a comparison with AES was also performed. At the end it was concluded that the algorithm mentioned is an effective an secure method of encrypting images to transmit over the communication channels.
... scrambling operations [7,8]. Various operations and architectures were proposed to encrypt data, such as DNA coding [9][10][11], Substitution box(S-box) [12,13], Neural Network [14,15] and XOR operation [16][17][18]. ...
Chapter
This research presents a method to encrypt and compress images using two-dimensional sparse decomposition, chaotic systems, and convolutional layers. The original image is first encrypted via the convolutional layers in the proposed approach, inspired by deep neural networks. This step is called CLE, which stands for convolution layer-based encryption, as it helps to increase the security level of encryption. Then, the encrypted image is compressed by two orthogonal matrices created by the chaotic systems and singular value decomposition. After that, the compressed image is quantized and mapped. In the next step, the pixels of the quantized matrix are scrambled to reduce the correlation between neighboring pixels. Then, the XOR operation is applied for the final part of the encryption process. In the decryption process, the direct inverse operators cannot be used. Therefore, the convolutional layer-based sparse decomposition (CLSD) approach is proposed to recover the original image by half quadratic splitting approach. Due to HQS, the proposed decryption approach is converted to two repetitive steps. The simulation results and the security analyses demonstrate that the proposed image reconstruction method performs well for various compression ratios.
... Good protection is provided by rearranging the remaining of the image and use a shuffling technique. Selected encryption is the latest approach to reducing computational requirements for massive amounts of images [4]. ...
Thesis
Security and privacy of information or data nowadays have turned into a critical concern; progressed techniques for secure transmission and recovery of digital images are progressively required for various military, restorative, country security, and different applications. Different sorts of strategies for increment security information or data as of now is created, one basic path is by cryptographic systems. Keep up the security of the message by changing information or data into an alternate frame, so the message can't be perceived. The basic idea behind the thesis is to optimize security by combining the two algorithms namely Haar wavelet transformation and RC4 encryption algorithm. Haar wavelet transformation is used to compress the image for simplicity and estimate high-speed performance we can send it over the network quickly. RC4 encryption is utilized to encrypt the image for image security and transform image safely and securely over any network.
... Within this domain, predominant keywords such as image, security, steganography, protocols, and cryptography hold substantial weight ,as show in Fig. 4. Image information security pertains to safeguarding the con dentiality (Patel et al., 2011), integrity, and availability of image data to preclude unauthorized access, interference, or damage Shrivastava, 2012 . An encryption protocol employing cryptographic algorithms, authentication, and secure communication serves to shield data security. ...
Preprint
Full-text available
With the rapid advancement of big data technologies, the need for robust data security and privacy measures has intensified. Big data technologies have revolutionized the collection and analysis of a vast volume of research literature, offering unparalleled avenues for scholarly inquiry. Identifying prevalent research topics and discerning developmental trends is paramount, especially when grounded in an expansive literature base. This study examined abstracts and author keywords from 4,311 pertinent articles published between 1980 and 2023, sourced from the Web of Science core collection. The content of abstracts and author keywords underwent LDA theme modeling analysis. Consequently, five predominant research topics emerged: security and privacy measures for mobile applications, encryption protocols tailored for image security, privacy considerations in healthcare, intricate access control combined with security in cloud computing through attribute encryption, and ensuring security and information integrity for big data within the Internet of Things framework. The LDA model proficiently pinpoints these salient topics, assisting researchers in comprehending the current state of the domain and guiding potential future research trajectories.
... Moreover, it can be further divided into full encryption and partial encryption according to the percentage of the data encrypted. Finally it can be classified into compression and non-compression methods [1]. ...
Article
Full-text available
Due to the growth of multimedia applications, the protection of this multimedia data becomes a very important issue of communication and storage; especially when it is transferred over an insecure channel, where apart from preventing illegal data access, images are used in many fields such as medical science and military. The protection of images can be done with image encryption. The majority of encrypted image transmission schemes does not adequately take into account the effect of bit errors occurring during transmission and this issue is considered a problem that should be handled by an efficient coding scheme. Hence, error correction code should be applied after encryption to protect encrypted images against channel errors. In this paper, we present a survey of image encryption techniques and channel coding techniques.
Article
Full-text available
With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. In this paper, we analyze the Advanced Encryption Standard (AES), and we add a key stream generator (A5/1, W7) to AES to ensure improving the encryption performance; mainly for images characterised by reduced entropy. The implementation of both techniques has been realized for experimental purposes. Detailed results in terms of security analysis and implementation are given. Comparative study with traditional encryption algorithms is shown the superiority of the modified algorithm.
Article
Full-text available
The S-box is used in various block ciphers and the complexity of encryption essentially depends on the strength of S-box. The strength of an S-box can be measured by analyzing its statistical and algebraic properties. The S-box is the only non-linear component in various block ciphers capable of creating confusion. Many S-boxes have been proposed with similar algebraic and statistical properties. Therefore, it is sometimes difficult to choose an S-box for a particular application. The performances of these S-boxes vary and depend on the nature of data and their application. In this paper, we propose a criterion to analyze the prevailing S-boxes and study their strengths and weaknesses in order to determine their suitability in image encryption applications. The proposed criterion uses the results from correlation analysis, entropy analysis, contrast analysis, homogeneity analysis, energy analysis, and mean of absolute deviation analysis. These analyses are applied to advanced encryption standard (AES), affine-power-affine (APA), gray, Lui J, residue prime, S8 AES, SKIPJACK, and Xyi Sboxes. The results of these analyses are further examined and a majority logic criterion is used to determine the appropriateness of an S-box to image encryption applications.
Article
Full-text available
The Hill cipher algorithm is one of the symmetric key algorithms that have several advantages in data encryption. But, the inverse of the key matrix used for encrypting the plaintext does not always exist. Then if the key matrix is not invertible, then encrypted text cannot be decrypted. In the Involutory matrix generation method the key matrix used for the encryption is itself invertible. So, at the time of decryption we need not to find the inverse of the key matrix. The objective of this paper is to encrypt an image using a technique different from the conventional Hill Cipher. In this paper a novel advanced Hill (AdvHill) encryption technique has been proposed which uses an involutory key matrix. The scheme is a fast encryption scheme which overcomes problems of encrypting the images with homogeneous background. A comparative study of the proposed encryption scheme and the existing scheme is made. The output encrypted images reveal that the proposed technique is quite reliable and robust.
Article
Information security is the key in the era of electronic data exchange. Images constitute a large portion of the electronic data. Confidentiality of color images is a difficult process. Most of the image encryption algorithms are complex and compromise on the quality of the image. This paper proposes a new image encryption based on random pixel permutation with the motivation to maintain the quality of the image. The values used in the encryption process are preserved in the form of a 64 bit key and sent to the receivers. The receivers jointly use the key and the shares to see the secret.
Article
In this paper, four chaotic maps are compared and noise effects are observed on image. Firstly, we use the image encryption algorithm to convert original image to encrypted image. Now we apply noise on the encrypted image and then decrypt cipher image with noise back to original image. The Simulation experimental results shows that Cross Chaotic map has got best results. Also, noise has a little effect on original image and can easily be received by the receiver.
Article
Data encryption is widely used to ensure security in open networks such as the internet. Each type of data has its own features, therefore, different techniques should be used to protect confidential image data from unauthorized access. Most of the available encryption algorithms are used for text data, however, due to large data size and real time constrains, algorithms that are good for textual data may not be suitable for multimedia data. In most of the natural images the values of the neighboring pixels are strongly correlated. This means that the value of any given pixel can be reasonably predicted from the values of its neighbors. In this paper, we introduce a new permutation technique based on the combination of image permutation and a well known encryption algorithm called RijnDael. The original image was divided into 4 pixels × 4 pixels blocks, which were rearranged into a permuted image using a permutation process presented here, and then the generated image was encrypted using the RijnDael algorithm. The results showed that the correlation between image elements was significantly decreased by using the combination technique and higher entropy was achieved.
Article
Security in transmission storage of digital images has its importance in today's image communications and confidential video conferencing. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. In this paper, we analyze and present a modification to the Advanced Encryption Standard (MAES) to reflect a high level security and better image encryption. The modification is done by adjusting the ShiftRow Transformation. Detailed results in terms of security analysis and implementation are given. Experimental results verify and prove that the proposed modification to image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that with a comparison to original AES encryption algorithm the modified algorithm gives better encryption results in terms of security against statistical attacks.
Conference Paper
Image encryption is a suitable method to protect image data. Image and text data has their unique features. The available encryption algorithms are good for text data. They may not be suitable for multimedia data. In fact the pixels of natural images are highly correlated to their neighboring pixels. Due to this strong correlation any pixel can be practi cally predicted from the values of its neighbors. In this article, we propose a new location transformation based encryption technique. We redistribute the pixel values to different location using affine transform technique with four 8-bit keys. The transformed image then divided into 2 pixels x 2 pixels blocks and each block is encrypted using XOR operation by four 8-bit keys. The total key size used in our algorithm is 64 bit which proves to be strong enough. The experimental results proved that after the affine transform the correlation between pixel values was significantly decreased. Keywords-Image Correlation, Image encryption, Image histogram, Affine transform, Symmetric key encryption.
Article
This paper presents a new methodology which performs both lossless compression and encryption of binary and gray-scale images. The compression and encryption schemes are based on SCAN patterns generated by the SCAN methodology. The SCAN is a formal language-based two-dimensional spatial-accessing methodology which can efficiently specify and generate a wide range of scanning paths or space filling curves. This paper presents a brief overview of SCAN, compression and decompression algorithms, encryption and decryption algorithms, and test results of the methodology.