Recent Trends in Image Encryption: A Review
Abstract
Security of multimedia data is gaining acceptance owing to the growth and acceptability of images in various applications and in telecommunication. Encryption is one of the ways to ensure high security of images as they are used in many fields such as in secure medical imaging services, military intelligence, internet and intranet communication, e-banking etc. These images are stored or transmitted through a network; hence the security of such image data is important. In this work, recently developed encryption techniques are studied and analyzed to promote further development of more encryption methods to ensure additional security and versatility. All the techniques reviewed came into existence within the last five years (2011-2015) and are found to be useful for the present day encryption applications. Each technique is unique in its own way, which might be suitable for different applications. As time goes on, new encryption techniques are evolving. Hence, fast and secure conventional encryption techniques will always be needed in applications requiring high rate of security.
Downloads
References
Abraham L. & Daniel N. (2013). An Improved Color Image Encryption Algorithm with Pixel Permutation and Bit Substitution. International Journal of Research in Engineering Technology (IJRET) Vol. 2, Issue 11. eISSN 2319-1163.pp.333-338.
Brindha K., Sharma R. & Saini S. (2014). Use of Symmetric Algorithm for Image Encryption. International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE) Vol. 2, Issue 5. pp.4401-4407.
Debbarma M., Kumari L. & Rajiha J. L. (2013). 2D chaos Based Color Image Encryption Using Pseudorandom Key Generation. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Vol. 2, Issue 4. pp.387-392.
El-Khamy S. E., Lofty M. & Ali A. H. (2012). A New Fuzzy PN Codes Based Image Encryption Technique. Electrical & Electronics Department, Faculty of Engineering, Alexandria University. Alexandria 21544, Egypt.
Harram I. M., Bakura M. U. M. & Gwoma Z. M. (2014). Simulation of AES Based Data Encryption in Vb.net. International Journal of Recent Developments in Engineering & Technology (IJRDET) Vol. 2, Issue 4. pp.5-9.
Kester Q. A Cryptographic Image Encryption Technique for Facial Blurring of Images. International Journal of Advanced Technology and Engineering Research (IJATER) Vol. 3, Issue 3. pp. 1-7.
Naskar P. K. & Chaudhuri A. (2014). A Secure Symmetric Image Encryption Based on Bit-Wise Operation. International Journal of Images, Graphics and signal Processing (IJIGSP) No. 2, pp. 30-38.
Nichat S. P. & Sikchi S. S. (2013). Image Encryption Using Hybrid Genetic Algorithm. International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Vol. 3, Issue 1. pp.428-431.
Pakshwar R., Tridevi V. K. & Richhariya V. (2013). A Survey on Different Image Encryption and Decryption Techniques. International Journal of Computer Science and Information Technologies (IJCSIT) Vol. 4, Issue 1. pp.113-116.
Panduranga H. T., Kumar S. K. N. & Kumar H. S. S. (2013). Hardware Software Co-Simulation of the Multiple Image Encryption Technique Using the Xilinx System Generator. International Journal of Information Process System (IJIPS) Vol. 9, No. 3. pp.499-510.
Sethi N. & Vijay S. (2013). Comparative Image Encryption Methods Analysis Using New Transformed-Mapped technique. Conference on Advances in Communication and Control system (CACCS). Dehrandum Institute of Technology, Dehrandum-248001
Sharma V., Agnihotri H. C. & Patil C. H. (2014). An Image Encryption and Decryption technique Using Two Chaotic Schemes. International Journal of Research in Advent Technology (IJRAT) Vol. 2, No. . pp.313-316.
Singh P. & Singh K. (2013). Image Encryption and Decryption Using Blowfish Algorithm in MATLAB. International Journal of Scientific and Engineering Research (IJSER) Vol. 1, Issue 7. pp.150-154.
Sridevi S. S. P., KarthigaiKumar, P. Siva Mangai, N.M. and Vanathi, P.T. (2012). Survey on Efficient, Low-power, AES Image Encryption and Bio-cryptography Schemes. Smart Computing Review, vol. 2, no. 6. pp. 379-390.
Copyright (c) 2016 Journal of Information Sciences and Computing Technologies
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
TRANSFER OF COPYRIGHT
JISCT is pleased to undertake the publication of your contribution to Journal of Information Sciences and Computing Technologies
The copyright to this article is transferred to JISCT(including without limitation, the right to publish the work in whole or in part in any and all forms of media, now or hereafter known) effective if and when the article is accepted for publication thus granting JISCT all rights for the work so that both parties may be protected from the consequences of unauthorized use.