Recent Trends in Image Encryption: A Review

Ibrahim M. Harram

Abstract


Security of multimedia data is gaining acceptance owing to the growth and acceptability of images in various applications and in telecommunication. Encryption is one of the ways to ensure high security of images as they are used in many fields such as in secure medical imaging services, military intelligence, internet and intranet communication, e-banking etc. These images are stored or transmitted through a network; hence the security of such image data is important. In this work, recently developed encryption techniques are studied and analyzed to promote further development of more encryption methods to ensure additional security and versatility. All the techniques reviewed came into existence within the last five years (2011-2015) and are found to be useful for the present day encryption applications. Each technique is unique in its own way, which might be suitable for different applications. As time goes on, new encryption techniques are evolving. Hence, fast and secure conventional encryption techniques will always be needed in applications requiring high rate of security.

Full Text:

PDF

References


Abraham L. & Daniel N. (2013). An Improved Color Image Encryption Algorithm with Pixel Permutation and Bit Substitution. International Journal of Research in Engineering Technology (IJRET) Vol. 2, Issue 11. eISSN 2319-1163.pp.333-338.

Brindha K., Sharma R. & Saini S. (2014). Use of Symmetric Algorithm for Image Encryption. International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE) Vol. 2, Issue 5. pp.4401-4407.

Debbarma M., Kumari L. & Rajiha J. L. (2013). 2D chaos Based Color Image Encryption Using Pseudorandom Key Generation. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Vol. 2, Issue 4. pp.387-392.

El-Khamy S. E., Lofty M. & Ali A. H. (2012). A New Fuzzy PN Codes Based Image Encryption Technique. Electrical & Electronics Department, Faculty of Engineering, Alexandria University. Alexandria 21544, Egypt.

Harram I. M., Bakura M. U. M. & Gwoma Z. M. (2014). Simulation of AES Based Data Encryption in Vb.net. International Journal of Recent Developments in Engineering & Technology (IJRDET) Vol. 2, Issue 4. pp.5-9.

Kester Q. A Cryptographic Image Encryption Technique for Facial Blurring of Images. International Journal of Advanced Technology and Engineering Research (IJATER) Vol. 3, Issue 3. pp. 1-7.

Naskar P. K. & Chaudhuri A. (2014). A Secure Symmetric Image Encryption Based on Bit-Wise Operation. International Journal of Images, Graphics and signal Processing (IJIGSP) No. 2, pp. 30-38.

Nichat S. P. & Sikchi S. S. (2013). Image Encryption Using Hybrid Genetic Algorithm. International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Vol. 3, Issue 1. pp.428-431.

Pakshwar R., Tridevi V. K. & Richhariya V. (2013). A Survey on Different Image Encryption and Decryption Techniques. International Journal of Computer Science and Information Technologies (IJCSIT) Vol. 4, Issue 1. pp.113-116.

Panduranga H. T., Kumar S. K. N. & Kumar H. S. S. (2013). Hardware Software Co-Simulation of the Multiple Image Encryption Technique Using the Xilinx System Generator. International Journal of Information Process System (IJIPS) Vol. 9, No. 3. pp.499-510.

Sethi N. & Vijay S. (2013). Comparative Image Encryption Methods Analysis Using New Transformed-Mapped technique. Conference on Advances in Communication and Control system (CACCS). Dehrandum Institute of Technology, Dehrandum-248001

Sharma V., Agnihotri H. C. & Patil C. H. (2014). An Image Encryption and Decryption technique Using Two Chaotic Schemes. International Journal of Research in Advent Technology (IJRAT) Vol. 2, No. . pp.313-316.

Singh P. & Singh K. (2013). Image Encryption and Decryption Using Blowfish Algorithm in MATLAB. International Journal of Scientific and Engineering Research (IJSER) Vol. 1, Issue 7. pp.150-154.

Sridevi S. S. P., KarthigaiKumar, P. Siva Mangai, N.M. and Vanathi, P.T. (2012). Survey on Efficient, Low-power, AES Image Encryption and Bio-cryptography Schemes. Smart Computing Review, vol. 2, no. 6. pp. 379-390.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2016 Journal of Information Sciences and Computing Technologies

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

 

Copyright © 2014 Journal of Information Sciences and Computing Technologies. All rights reserved.

ISSN: 2394-9066

For any help/support contact us at jiscteditor@scitecresearch.com.