CSEIT194731
CSEIT194731
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
© 2019 IJSRCSEIT | Volume 4 | Issue 7 | ISSN : 2456-3307
A Survey on Image Encryption Techniques
Vishwas C.G.M1, Dr. R Sanjeev Kunte2
1 Assistant Professor Department of IS&E, J.N.N College of Engineering, Shivamogga, Karnataka, India
2Professor, Department of CS & E, J.N.N College of Engineering, Shivamogga, Karnataka, India
ABSTRACT
Security of data/images is one of the important aspects and it is still an expanding domain of digital transfer.
Encryption of images is one of the well known mechanisms to preserve the secrecy of images over the Internet.
This medium is vulnerable to attacks and hence efficient encryption algorithms are necessary for securely
transmitting the data. Various techniques have been proposed in literature to cope up the ever growing need of
security. This paper is an effort to compare the most popular techniques available for image encryption.
Keywords : Encryption, Decryption, Cryptography.
number of blocks by using smaller block sizes resulted if the key matrix is not invertible then it may not be
in a lower correlation and higher entropy. possible to decrypt the encrypted message. Also, as it
Experimental results showed that a direct relationship is not required to find inverse of the matrix for
exists between number of blocks and entropy. And an decryption, the computational complexity can be
inverse relationship exists between number of blocks reduced.
and correlation.
Sesha Pallavi Indrakanti and P.S.Avadhani [7]
A Combination of Permutation Technique for image proposed Permutation based Image Encryption
encryption was proposed by Mohammad Ali Bani Technique in which image encryption based on
Younes and Aman Jantan [5]. This approach depends random pixel permutation exists. In this technique,
on the concept that, in natural images the values of the first for image encryption, image is split into blocks,
neighboring pixels are strongly correlated. This means later permutation is applied based on random number.
that the value of any given pixel can be reasonably Next, in the key generation phase, a key is built by
predicted from the values of its neighbors. It is using the values used in the encryption process. The
necessary to disturb the high correlation among image last stage is where the identification process is
pixels to increase the security level of the encrypted involved in the numbering of the shares which are
images. Here, a new permutation technique is generated from the secret image. These shares and the
introduced based on the combination of image key are then sent to the receiver. The key is generated
permutation and an encryption algorithm called with valid information about the values used in the
RijnDael. Here the original image is divided into 4 encryption process which is a unique one from others.
pixels × 4 pixels blocks, which are then rearranged into A new image encryption technique based on a new
a permuted image by using a permutation process. The chaotic system by adding two chaotic systems: the
permutation process is defined as the operation of Lorenz chaotic system and the Rössler chaotic system
dividing and replacing an arrangement of the original was proposed by Qais H. Alsafasfeh and Aouda A.
image. The results show that the correlation between Arfoa [8]. The main strength of this technique is that
image elements is significantly decreased by using the it provides stronger security. Data encryption standard
combination technique which leads to higher entropy. (DES) is not useful for image encryption because of the
This technique enhances the security level of the special storage characteristics of an image.
encrypted images by reducing the correlation among Experimental analysis shows that the image
image elements and increasing its entropy value by encryption algorithm has the advantages of high speed,
decreasing the mutual information among the large key space, high- level security and high obscure
encrypted image variables. level.
Bibhudendra Acharya et.al.[6] proposed an Image Ibrahim S I Abuhaiba and Maaly A S Hassan [9]
encryption using Advanced Hill Cipher Algorithm. describe an Image Encryption using Differential
The available Hill cipher algorithm is classified as a Evolution Approach in Frequency Domain. This
symmetric key algorithm. The proposed advanced Hill scheme employs magnitude and phase manipulation
(AdvHill) encryption technique uses an involuntary using Differential Evolution (DE) approach. First the
key matrix which overcomes the problem of two dimensional keyed discrete Fourier transform is
encrypting the images with homogeneous background. performed on the original image. Then Crossover is
It also overcomes the drawback of using a random key performed between two components of the encrypted
matrix in Hill cipher algorithm for encryption, where image, which are selected based on Linear Feedback
Shift Register (LFSR) index generator. Keyed mutation Huang-PeiXiao and Guo-ji Zang [13] describe an
will be performed on the real parts of a certain algorithm using two chaotic systems . One chaotic
components selected based on LFSR index generator. system generates a chaotic sequence, which changes
In this process, shuffling of the positions of image into a binary stream using a threshold function. The
pixels is done. Final encrypted image is found to be other chaotic system is used to construct a
fully distorted increasing the robustness of the said permutation matrix. Firstly, using the binary stream as
scheme. a key stream, randomly the pixel values of the images
is modified. Then, the modified image is encrypted
Nidhal Khdhair El Abbadi et.al., [10] proposed new again by the permutation matrix.
image encryption algorithm based on Diffie- Hellman
and Singular Value Decomposition. In the proposed Amitava Nag et.al, [14] introduced a novel approach
work, they have suggested a new way to encrypt image using affine transform which is based on shuffling the
based on three main steps: the first one aims to image pixels. This method is a two phase encryption
scrambling the image values by using Fibonacci decryption algorithm. Firstly using XOR operation,
transform. The second step focuses on generating the image is encrypted. Then, the pixel values are
public and private key based on Diffie - Hellman Key redistributed to different locations with 4 bit keys
Exchange which are used encrypt the diagonal matrix using the affine transformation. The transformed
that is created by Singular Value image is then divided into 2 pixels x 2 pixels blocks and
Decomposition (SVD) in third step. The experimental each block is encrypted using XOR operation by four
results show that the proposed image encryption 8-bit keys. The result proves that the correlation
system has a very large key space. Also the proposed between pixel values was significantly decreased after
image encryption algorithm analysis proves better in the affine transform.
case of the security, robustness, correctness and
effectiveness. A mirror like algorithm is presented by Jiun-In Guo
and Jui-Cheng Yen [15]. There are 7 steps in this
S.S. Maniccam and N.G. Bourbakis [11] have presented algorithm. At first, 1-D chaotic system is determined
a novel approach which based on two works: lossless and its initial point x (0) and set k = 0. Then, from the
compression and encryption of binary and gray-scale chaotic system, the chaotic sequence is generated.
pictures. The compression and encryption methods After that, the binary sequence is generated from
are based on the SCAN methodology which is a formal chaotic system. Image pixels are rearranged in the last
language-based 2D spatial-accessing methodologies four stages using swap function according to the
that generate a wide range of scanning paths or space binary sequence.
filling curves.
Seyed Mohammad Seyedzade, et.al., [16] proposed a
Chang-Mok Shin et.al.,[12] proposed an algorithm novel algorithm based on SHA-512 hash function. The
which was multilevel form of image encryption using algorithm had two sections. Firstly, it does pre-
binary phase exclusive OR operation and image processing operation to shuffle one half of image. Then
dividing technique. The same grey level multi-level the hash function is applied to generate a random
image is divided into binary images. Then binary number mask. Then, the mask is XORed with the
pictures are regenerated to binary phase other part of the image that is to be encrypted.
encoding.Then these images are encrypt with binary
random phase images by binary phase XOR operation.
Ismail Amr Ismail et.al.,[17] proposed a chaos- based security functions which might be suitable in some
stream cipher which composes of two chaotic logistic applications so that no one can carry unauthorized
maps and it also consists of an external secret key for access on the image while transferring the image on
encryption of image. In this scheme, an external secret the open network. In general, a well-suited, fast and
key of 104 bit and two chaotic logistic maps are used secure conventional cryptosystem should be chosen so
to differentiate between the plain image and the as to provide high security.
encrypted image. Further, the secret key is modified
after encrypting of each pixel of the plain image which IV. REFERENCES
makes the encrypted image more robust in nature.
There is also a feedback mechanism which increases [1]. John Justin M, Manimurugan S, “A Survey on
the robustness of the said scheme. Various Encryption Techniques”, International
Journal of Soft Computing and Engineering
Rasul Enayatifar and Abdul Hanan Abdullah [18] (IJSCE) ISSN: 2231-2307, Volume-2, Issue-1,
proposed a novel scheme for image encryption based March 2012.
on a hybrid model composed of a chaotic function and [2]. Aloka Sinha and Kehar Singh, “A technique for
a genetic algorithm. In this scheme, with the help of image encryption using digital signature”, Optics
the chaotic function, first a number of encrypted Communications, Vol-2 I 8 (2203), 229- 234.
images are constructed using the original image. In the [3]. S. Vani Kumari and G. Neelima, “An efficient
next stage, these encrypted images are employed as the Image Cryptographic Technique By Applying
initial population for starting the operation of the Chaotic Logistic Map and Arnold Cat Map”,
genetic algorithm. Then, as much as possible, the International Journal of Advanced Research in
genetic algorithm is used to optimize the encrypted Computer Science and Software Engineering,
images. In the end, the best cipher-image is selected as Vol. 3, No. 9, 2013.
the final encryption image. [4]. Mohammad Ali Bani Younes and Aman Jantan,
“Image Encryption Using Block-Based
Kuldeep Singh and Komalpreet Kaur [19] compared Transformation Algorithm”, IAENG
four chaotic maps i.e., Henon, Logistic, Cross chaotic International Journal of Computer Science, 35,
and Ikeda map and noise effects are observed on the 2008.
image. First, the image encryption algorithm is used to [5]. Mohammad Ali Bani Younes and Aman Jantan,
convert the given original image to encrypted image. “An Image Encryption Approach Using a
Then they apply noise on the encrypted image and Combination of Permutation Technique
then decrypt cipher image with noise back to original [6]. Followed by Encryption”, IJCSNS International
image. The conclusion is that the cross chaotic map Journal of Computer Science and Network
shows best results than the other three chaotic maps. Security, VOL.8 , April 2008.
[7]. Bibhudendra Acharya, Saroj Kumar Panigrahy,
III. CONCLUSION Sarat Kumar Patra, and Ganapati Panda, “Image
Encryption Using Advanced Hill Cipher
In today’s digital world, the security of digital images Algorithm”, International Journal of Recent
has become more important. In this paper, we have Trend in Engineering, Vol. 1, No. 1, May 2009.
surveyed existing work on image encryption. We also [8]. Sesha Pallavi Indrakanti, P.S.Avadhani,
give the general guide line about cryptography. The “Permutation based Image Encryption
techniques that are described in this paper can provide Technique”, International Journal of Computer
Applications (0975 – 8887) Volume 28– No.8, [18]. Seyed Mohammad Seyedzade, Reza Ebrahimi
2011. Atani and Sattar Mirzakuchaki, “A Novel Image
[9]. Qais H. Alsafasfeh , Aouda A. Arfoa, “Image Encryption Algorithm Based on Hash Function”,
Encryption Based on the General Approach for 6th Iranian Conference on Machine Vision and
Multiple Chaotic Systems”, Journal of Signal and Image Processing, 2010.
Information Processing, 2011. [19]. Ismail Amr Ismail, Mohammed Amin, Hossam
[10]. Ibrahim S I Abuhaiba , Maaly A S Hassan, Diab ,”A Digital Image Encryption Algorithm
“Image Encryption Using Differential Evolution Based a Composition of Two Chaotic Logistic
Approach In Frequency Domain” Signal & Maps”, International Journal of Network
Image Processing: An International Security, Vol.11, No.1, pp.1 -10, July 2010.
Journal(SIPIJ) Vol.2, No.1, March 2011. [20]. Rasul Enayatifar , Abdul Hanan Abdullah,
[11]. Nidhal Khdhair El Abbadi, Samer Thaaban “Image Security via Genetic Algorithm”,
Abaas, Ali Abd Alaziz “New Image Encryption International Conference on Computer and
Algorithm Based on Diffie-Hellman and Software Modeling IPCSIT Vol.14, 2011.
Singular Value Decomposition”, International [21]. Kuldeep Singh, Komalpreet Kaur, “Image
Journal of Advanced Research in Computer and Encryption using Chaotic Maps and DNA
Communication Engineering Vol. 5, Issue 1, Addition Operation and Noise Effects on it”,
January 2016, pages: 197-201. International Journal of Computer Applications
[12]. S.S.Maniccam, N.G. Bourbakis, “Lossless image (0975 – 8887) Volume 23– No.6, June 2011.
compression and encryption using SCAN”,
Pattern Recognition 34(6): 1229-1245 2001.
[13]. Chang-Mok Shin, Dong-Hoan Seo, Kyu-Bo Cite this article as :
Chol, Ha-Wmn Lee, and SmJmng Kim,
Vishwas C.G.M, Dr. R Sanjeev Kunte, "A Survey on
“Multilevel Image Encryption by Binary Phase
Image Encryption Techniques", International Journal
XOR Operations”, IEEE Proceedings, 2003.
of Scientific Research in Computer Science,
[14]. Huang-Pei Xiao Guo-Ji Zhang, “An Image
Engineering and Information Technology
Encryption Scheme Based On Chaotic Systems”,
(IJSRCSEIT), ISSN : 2456-3307, Volume 4 Issue 7, pp.
IEEE Proceedings of the Fifth International
165-170, September-October 2019.
Conference on Machine Learning and
Journal URL : http://ijsrcseit.com/CSEIT194731
Cybernetics, Dalian, 13-16 August 2006.
[15]. Amitava Nag, Jyoti Prakash Singh, Srabani
Khan, Saswati Ghosh, Sushanta Biswas, D.
Sarkar Partha Pratim Sarkar, “Image Encryption
Using Affine Transform and XOR Operation
”,International Conference on Signal
[16]. Processing, Communication, Computing and
Networking Technologies (ICSCCN 2011).
[17]. Jiun-In Guo, Jui-Cheng Yen, “A new mirror-
like image Encryption algorithm and its VLSI
architecture”, Pattern Recognition and Image
Analysis, vol.10, No.2, pp.236-247, 2000.