0% found this document useful (0 votes)
12 views6 pages

CSEIT194731

research paper

Uploaded by

sanjeevkunte
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views6 pages

CSEIT194731

research paper

Uploaded by

sanjeevkunte
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

National Conference on Communication Technology & Network Security In association with

International Journal of Scientific Research in Computer Science, Engineering and Information Technology
© 2019 IJSRCSEIT | Volume 4 | Issue 7 | ISSN : 2456-3307
A Survey on Image Encryption Techniques
Vishwas C.G.M1, Dr. R Sanjeev Kunte2
1 Assistant Professor Department of IS&E, J.N.N College of Engineering, Shivamogga, Karnataka, India
2Professor, Department of CS & E, J.N.N College of Engineering, Shivamogga, Karnataka, India

ABSTRACT
Security of data/images is one of the important aspects and it is still an expanding domain of digital transfer.
Encryption of images is one of the well known mechanisms to preserve the secrecy of images over the Internet.
This medium is vulnerable to attacks and hence efficient encryption algorithms are necessary for securely
transmitting the data. Various techniques have been proposed in literature to cope up the ever growing need of
security. This paper is an effort to compare the most popular techniques available for image encryption.
Keywords : Encryption, Decryption, Cryptography.

I. INTRODUCTION Encryption is defined as the conversion of plain text


into a form called a cipher text that cannot be read by
With the increasing growth of multimedia others without decrypting the encrypted text.
applications, security is an important issue in Decryption is the reverse process of encryption which
transmission of multimedia data. The main aim of is the process of converting the cipher text into its
image encryption is to transmit the image securely original plain text, so that it can be read [1]. In order
over the network so that no unauthorized user can be to fulfill such a task, many image encryption methods
able to decrypt the image. Therefore the information have been proposed in the literature.
has to be protected while transmitting it. Important
information such as credit cards and banking There are two main types of cryptography: 1.Secret
transactions need to be secured. For this reason, many key cryptography and 2.Public key cryptography.
techniques exist which are Image encryption, video Secret key cryptography is also known as symmetric
encryption, chaos based encryption that have their key cryptography. Here, both the sender and the
have applications in many fields including the medical receiver have the information regarding the same
imaging, internet communication, transmission, secret key. Messages are encrypted by the sender using
military communication, tele-medicine etc. the key and decrypted by the receiver using the same
Encryption techniques are very useful tools to protect key.
secret information. In this paper we survey on
different techniques for image encryption.

This paper is organized as follows. In Section 1; we


present general guide line about cryptography. In

We Survey on already existing work. Finally, we


conclude in section 3. Fig 1. A simple model of symmetric key encryption

CSEIT194731 | Published : 11 Oct 2019 | September-October-2019 [ 4 (7) : 165-170 ]


165
Vishwas C.G.M et al Int J Sci Res CSE & IT, September-October-2019; 4(7) : 165-170

Fig 1 shows the process of symmetric cryptography. II. LITERATURE SURVEY


Both parties agree on the secret key that both of them Aloka Sinha and Kehar Singh [2] proposed the digital
will use in this connection. Sender starts sending its signature based image encryption scheme. First the
data encrypted with the shared key. On the other hand, original image is encoded and digital signature is added
receiver uses the same key to decrypt the encrypted to the original image. Bose- Chaudhuri
message. Hochquenghem (BCH) type of code is used for
Public key cryptography, also called asymmetric key encoding of the image. After the decryption of the
cryptography, uses a pair of keys for encryption and image, digital signature is used for authentication of
decryption as shown in Fig. 2. Where as in public key the image and digital signatures are created and
cryptography, keys work in pairs of matched public verified by means of cryptography. One-way hash
and private keys. function was used to produce the digital signature of
an image. Standard digital image algorithms were used
to convert a message of any length into a fixed length
message digest which is usually 128 bits long. MD2,
MD4, MD5 and Secure Hash Algorithm (SHA) are the
standard techniques for creating hash. This encryption
technique provides three layers of security.

S.Vani Kumari and G.Neelima [3] proposed the image


encryption by using Chaotic Logistic Map and Arnold
Fig 2. Asymmetric encryption Cat Map. In this scheme, first block based shuffling is
Nowadays when sensitive information is stored on performed using Arnold cat transformation. After
computers and transmitted over the Internet, safety block based shuffling, pixel shuffling is performed by
and security of information must be ensured. using certain number of iterations of Arnold cat map.
Considering this, image is also an important part of The Arnold cat map is used to change the positions of
information. Therefore it is very important to protect the blocks/pixel values of the original image. The
the image from unauthorized access. shuffled image contain the same pixel values as that of
the original image. To encrypt the pixels of an image,
eight different types of operations are used and which
operation should be used is decided by the logistic map.
It is concluded that chaos-based image encryption
technology is very useful for real-time secure image.
Fig 3. Image encryption process
Fig 3 shows a general image encryption process using Mohammad Ali Bani Younes and Arnan Jantan [4]
any image encryption algorithm and the resultant proposed an image encryption using block-based
encrypted image. Decryption is the reverse process of transformation algorithm. A block-based
encryption which gives back the original image. There transformation algorithm along with blowfish
exists many algorithms in the literature to protect algorithm is used for encryption and decryption. First
image from unauthorized access which is described in the original image is divided into blocks and then it is
the next section. rearranged into a transformed image using a
transformation algorithm. Later, blowfish algorithm is
used for encryption. It is observed that increasing the

Volume 4, Issue 7, September-October-2019 | http://ijsrcseit.com


166
Vishwas C.G.M et al Int J Sci Res CSE & IT, September-October-2019; 4(7) : 165-170

number of blocks by using smaller block sizes resulted if the key matrix is not invertible then it may not be
in a lower correlation and higher entropy. possible to decrypt the encrypted message. Also, as it
Experimental results showed that a direct relationship is not required to find inverse of the matrix for
exists between number of blocks and entropy. And an decryption, the computational complexity can be
inverse relationship exists between number of blocks reduced.
and correlation.
Sesha Pallavi Indrakanti and P.S.Avadhani [7]
A Combination of Permutation Technique for image proposed Permutation based Image Encryption
encryption was proposed by Mohammad Ali Bani Technique in which image encryption based on
Younes and Aman Jantan [5]. This approach depends random pixel permutation exists. In this technique,
on the concept that, in natural images the values of the first for image encryption, image is split into blocks,
neighboring pixels are strongly correlated. This means later permutation is applied based on random number.
that the value of any given pixel can be reasonably Next, in the key generation phase, a key is built by
predicted from the values of its neighbors. It is using the values used in the encryption process. The
necessary to disturb the high correlation among image last stage is where the identification process is
pixels to increase the security level of the encrypted involved in the numbering of the shares which are
images. Here, a new permutation technique is generated from the secret image. These shares and the
introduced based on the combination of image key are then sent to the receiver. The key is generated
permutation and an encryption algorithm called with valid information about the values used in the
RijnDael. Here the original image is divided into 4 encryption process which is a unique one from others.
pixels × 4 pixels blocks, which are then rearranged into A new image encryption technique based on a new
a permuted image by using a permutation process. The chaotic system by adding two chaotic systems: the
permutation process is defined as the operation of Lorenz chaotic system and the Rössler chaotic system
dividing and replacing an arrangement of the original was proposed by Qais H. Alsafasfeh and Aouda A.
image. The results show that the correlation between Arfoa [8]. The main strength of this technique is that
image elements is significantly decreased by using the it provides stronger security. Data encryption standard
combination technique which leads to higher entropy. (DES) is not useful for image encryption because of the
This technique enhances the security level of the special storage characteristics of an image.
encrypted images by reducing the correlation among Experimental analysis shows that the image
image elements and increasing its entropy value by encryption algorithm has the advantages of high speed,
decreasing the mutual information among the large key space, high- level security and high obscure
encrypted image variables. level.

Bibhudendra Acharya et.al.[6] proposed an Image Ibrahim S I Abuhaiba and Maaly A S Hassan [9]
encryption using Advanced Hill Cipher Algorithm. describe an Image Encryption using Differential
The available Hill cipher algorithm is classified as a Evolution Approach in Frequency Domain. This
symmetric key algorithm. The proposed advanced Hill scheme employs magnitude and phase manipulation
(AdvHill) encryption technique uses an involuntary using Differential Evolution (DE) approach. First the
key matrix which overcomes the problem of two dimensional keyed discrete Fourier transform is
encrypting the images with homogeneous background. performed on the original image. Then Crossover is
It also overcomes the drawback of using a random key performed between two components of the encrypted
matrix in Hill cipher algorithm for encryption, where image, which are selected based on Linear Feedback

Volume 4, Issue 7, September-October-2019 | http://ijsrcseit.com


167
Vishwas C.G.M et al Int J Sci Res CSE & IT, September-October-2019; 4(7) : 165-170

Shift Register (LFSR) index generator. Keyed mutation Huang-PeiXiao and Guo-ji Zang [13] describe an
will be performed on the real parts of a certain algorithm using two chaotic systems . One chaotic
components selected based on LFSR index generator. system generates a chaotic sequence, which changes
In this process, shuffling of the positions of image into a binary stream using a threshold function. The
pixels is done. Final encrypted image is found to be other chaotic system is used to construct a
fully distorted increasing the robustness of the said permutation matrix. Firstly, using the binary stream as
scheme. a key stream, randomly the pixel values of the images
is modified. Then, the modified image is encrypted
Nidhal Khdhair El Abbadi et.al., [10] proposed new again by the permutation matrix.
image encryption algorithm based on Diffie- Hellman
and Singular Value Decomposition. In the proposed Amitava Nag et.al, [14] introduced a novel approach
work, they have suggested a new way to encrypt image using affine transform which is based on shuffling the
based on three main steps: the first one aims to image pixels. This method is a two phase encryption
scrambling the image values by using Fibonacci decryption algorithm. Firstly using XOR operation,
transform. The second step focuses on generating the image is encrypted. Then, the pixel values are
public and private key based on Diffie - Hellman Key redistributed to different locations with 4 bit keys
Exchange which are used encrypt the diagonal matrix using the affine transformation. The transformed
that is created by Singular Value image is then divided into 2 pixels x 2 pixels blocks and
Decomposition (SVD) in third step. The experimental each block is encrypted using XOR operation by four
results show that the proposed image encryption 8-bit keys. The result proves that the correlation
system has a very large key space. Also the proposed between pixel values was significantly decreased after
image encryption algorithm analysis proves better in the affine transform.
case of the security, robustness, correctness and
effectiveness. A mirror like algorithm is presented by Jiun-In Guo
and Jui-Cheng Yen [15]. There are 7 steps in this
S.S. Maniccam and N.G. Bourbakis [11] have presented algorithm. At first, 1-D chaotic system is determined
a novel approach which based on two works: lossless and its initial point x (0) and set k = 0. Then, from the
compression and encryption of binary and gray-scale chaotic system, the chaotic sequence is generated.
pictures. The compression and encryption methods After that, the binary sequence is generated from
are based on the SCAN methodology which is a formal chaotic system. Image pixels are rearranged in the last
language-based 2D spatial-accessing methodologies four stages using swap function according to the
that generate a wide range of scanning paths or space binary sequence.
filling curves.
Seyed Mohammad Seyedzade, et.al., [16] proposed a
Chang-Mok Shin et.al.,[12] proposed an algorithm novel algorithm based on SHA-512 hash function. The
which was multilevel form of image encryption using algorithm had two sections. Firstly, it does pre-
binary phase exclusive OR operation and image processing operation to shuffle one half of image. Then
dividing technique. The same grey level multi-level the hash function is applied to generate a random
image is divided into binary images. Then binary number mask. Then, the mask is XORed with the
pictures are regenerated to binary phase other part of the image that is to be encrypted.
encoding.Then these images are encrypt with binary
random phase images by binary phase XOR operation.

Volume 4, Issue 7, September-October-2019 | http://ijsrcseit.com


168
Vishwas C.G.M et al Int J Sci Res CSE & IT, September-October-2019; 4(7) : 165-170

Ismail Amr Ismail et.al.,[17] proposed a chaos- based security functions which might be suitable in some
stream cipher which composes of two chaotic logistic applications so that no one can carry unauthorized
maps and it also consists of an external secret key for access on the image while transferring the image on
encryption of image. In this scheme, an external secret the open network. In general, a well-suited, fast and
key of 104 bit and two chaotic logistic maps are used secure conventional cryptosystem should be chosen so
to differentiate between the plain image and the as to provide high security.
encrypted image. Further, the secret key is modified
after encrypting of each pixel of the plain image which IV. REFERENCES
makes the encrypted image more robust in nature.
There is also a feedback mechanism which increases [1]. John Justin M, Manimurugan S, “A Survey on
the robustness of the said scheme. Various Encryption Techniques”, International
Journal of Soft Computing and Engineering
Rasul Enayatifar and Abdul Hanan Abdullah [18] (IJSCE) ISSN: 2231-2307, Volume-2, Issue-1,
proposed a novel scheme for image encryption based March 2012.
on a hybrid model composed of a chaotic function and [2]. Aloka Sinha and Kehar Singh, “A technique for
a genetic algorithm. In this scheme, with the help of image encryption using digital signature”, Optics
the chaotic function, first a number of encrypted Communications, Vol-2 I 8 (2203), 229- 234.
images are constructed using the original image. In the [3]. S. Vani Kumari and G. Neelima, “An efficient
next stage, these encrypted images are employed as the Image Cryptographic Technique By Applying
initial population for starting the operation of the Chaotic Logistic Map and Arnold Cat Map”,
genetic algorithm. Then, as much as possible, the International Journal of Advanced Research in
genetic algorithm is used to optimize the encrypted Computer Science and Software Engineering,
images. In the end, the best cipher-image is selected as Vol. 3, No. 9, 2013.
the final encryption image. [4]. Mohammad Ali Bani Younes and Aman Jantan,
“Image Encryption Using Block-Based
Kuldeep Singh and Komalpreet Kaur [19] compared Transformation Algorithm”, IAENG
four chaotic maps i.e., Henon, Logistic, Cross chaotic International Journal of Computer Science, 35,
and Ikeda map and noise effects are observed on the 2008.
image. First, the image encryption algorithm is used to [5]. Mohammad Ali Bani Younes and Aman Jantan,
convert the given original image to encrypted image. “An Image Encryption Approach Using a
Then they apply noise on the encrypted image and Combination of Permutation Technique
then decrypt cipher image with noise back to original [6]. Followed by Encryption”, IJCSNS International
image. The conclusion is that the cross chaotic map Journal of Computer Science and Network
shows best results than the other three chaotic maps. Security, VOL.8 , April 2008.
[7]. Bibhudendra Acharya, Saroj Kumar Panigrahy,
III. CONCLUSION Sarat Kumar Patra, and Ganapati Panda, “Image
Encryption Using Advanced Hill Cipher
In today’s digital world, the security of digital images Algorithm”, International Journal of Recent
has become more important. In this paper, we have Trend in Engineering, Vol. 1, No. 1, May 2009.
surveyed existing work on image encryption. We also [8]. Sesha Pallavi Indrakanti, P.S.Avadhani,
give the general guide line about cryptography. The “Permutation based Image Encryption
techniques that are described in this paper can provide Technique”, International Journal of Computer

Volume 4, Issue 7, September-October-2019 | http://ijsrcseit.com


169
Vishwas C.G.M et al Int J Sci Res CSE & IT, September-October-2019; 4(7) : 165-170

Applications (0975 – 8887) Volume 28– No.8, [18]. Seyed Mohammad Seyedzade, Reza Ebrahimi
2011. Atani and Sattar Mirzakuchaki, “A Novel Image
[9]. Qais H. Alsafasfeh , Aouda A. Arfoa, “Image Encryption Algorithm Based on Hash Function”,
Encryption Based on the General Approach for 6th Iranian Conference on Machine Vision and
Multiple Chaotic Systems”, Journal of Signal and Image Processing, 2010.
Information Processing, 2011. [19]. Ismail Amr Ismail, Mohammed Amin, Hossam
[10]. Ibrahim S I Abuhaiba , Maaly A S Hassan, Diab ,”A Digital Image Encryption Algorithm
“Image Encryption Using Differential Evolution Based a Composition of Two Chaotic Logistic
Approach In Frequency Domain” Signal & Maps”, International Journal of Network
Image Processing: An International Security, Vol.11, No.1, pp.1 -10, July 2010.
Journal(SIPIJ) Vol.2, No.1, March 2011. [20]. Rasul Enayatifar , Abdul Hanan Abdullah,
[11]. Nidhal Khdhair El Abbadi, Samer Thaaban “Image Security via Genetic Algorithm”,
Abaas, Ali Abd Alaziz “New Image Encryption International Conference on Computer and
Algorithm Based on Diffie-Hellman and Software Modeling IPCSIT Vol.14, 2011.
Singular Value Decomposition”, International [21]. Kuldeep Singh, Komalpreet Kaur, “Image
Journal of Advanced Research in Computer and Encryption using Chaotic Maps and DNA
Communication Engineering Vol. 5, Issue 1, Addition Operation and Noise Effects on it”,
January 2016, pages: 197-201. International Journal of Computer Applications
[12]. S.S.Maniccam, N.G. Bourbakis, “Lossless image (0975 – 8887) Volume 23– No.6, June 2011.
compression and encryption using SCAN”,
Pattern Recognition 34(6): 1229-1245 2001.
[13]. Chang-Mok Shin, Dong-Hoan Seo, Kyu-Bo Cite this article as :
Chol, Ha-Wmn Lee, and SmJmng Kim,
Vishwas C.G.M, Dr. R Sanjeev Kunte, "A Survey on
“Multilevel Image Encryption by Binary Phase
Image Encryption Techniques", International Journal
XOR Operations”, IEEE Proceedings, 2003.
of Scientific Research in Computer Science,
[14]. Huang-Pei Xiao Guo-Ji Zhang, “An Image
Engineering and Information Technology
Encryption Scheme Based On Chaotic Systems”,
(IJSRCSEIT), ISSN : 2456-3307, Volume 4 Issue 7, pp.
IEEE Proceedings of the Fifth International
165-170, September-October 2019.
Conference on Machine Learning and
Journal URL : http://ijsrcseit.com/CSEIT194731
Cybernetics, Dalian, 13-16 August 2006.
[15]. Amitava Nag, Jyoti Prakash Singh, Srabani
Khan, Saswati Ghosh, Sushanta Biswas, D.
Sarkar Partha Pratim Sarkar, “Image Encryption
Using Affine Transform and XOR Operation
”,International Conference on Signal
[16]. Processing, Communication, Computing and
Networking Technologies (ICSCCN 2011).
[17]. Jiun-In Guo, Jui-Cheng Yen, “A new mirror-
like image Encryption algorithm and its VLSI
architecture”, Pattern Recognition and Image
Analysis, vol.10, No.2, pp.236-247, 2000.

Volume 4, Issue 7, September-October-2019 | http://ijsrcseit.com


170

You might also like