Recent Trends in Image Encryption: A Review

  • Ibrahim M. Harram Department of Elect.& Electronics Engineering Technology, The Federal Polytechnic, Damaturu, Yobe State, Nigeria
  • Mala U. M. Bakura Department of Electrical and Electronics Engineering, University of Maiduguri, Borno State, Nigeria
  • Ali M. Mohammed Department of Elect.& Electronics Engineering Technology, The Federal Polytechnic, Damaturu, Yobe State, Nigeria
  • Abdullahi M. Kire Department of Elect.& Electronics Engineering Technology, The Federal Polytechnic, Damaturu, Yobe State, Nigeria
Keywords: Security of multimedia data

Abstract

Security of multimedia data is gaining acceptance owing to the growth and acceptability of images in various applications and in telecommunication. Encryption is one of the ways to ensure high security of images as they are used in many fields such as in secure medical imaging services, military intelligence, internet and intranet communication, e-banking etc. These images are stored or transmitted through a network; hence the security of such image data is important. In this work, recently developed encryption techniques are studied and analyzed to promote further development of more encryption methods to ensure additional security and versatility. All the techniques reviewed came into existence within the last five years (2011-2015) and are found to be useful for the present day encryption applications. Each technique is unique in its own way, which might be suitable for different applications. As time goes on, new encryption techniques are evolving. Hence, fast and secure conventional encryption techniques will always be needed in applications requiring high rate of security.

Downloads

Download data is not yet available.

References

Abraham L. & Daniel N. (2013). An Improved Color Image Encryption Algorithm with Pixel Permutation and Bit Substitution. International Journal of Research in Engineering Technology (IJRET) Vol. 2, Issue 11. eISSN 2319-1163.pp.333-338.

Brindha K., Sharma R. & Saini S. (2014). Use of Symmetric Algorithm for Image Encryption. International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE) Vol. 2, Issue 5. pp.4401-4407.

Debbarma M., Kumari L. & Rajiha J. L. (2013). 2D chaos Based Color Image Encryption Using Pseudorandom Key Generation. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Vol. 2, Issue 4. pp.387-392.

El-Khamy S. E., Lofty M. & Ali A. H. (2012). A New Fuzzy PN Codes Based Image Encryption Technique. Electrical & Electronics Department, Faculty of Engineering, Alexandria University. Alexandria 21544, Egypt.

Harram I. M., Bakura M. U. M. & Gwoma Z. M. (2014). Simulation of AES Based Data Encryption in Vb.net. International Journal of Recent Developments in Engineering & Technology (IJRDET) Vol. 2, Issue 4. pp.5-9.

Kester Q. A Cryptographic Image Encryption Technique for Facial Blurring of Images. International Journal of Advanced Technology and Engineering Research (IJATER) Vol. 3, Issue 3. pp. 1-7.

Naskar P. K. & Chaudhuri A. (2014). A Secure Symmetric Image Encryption Based on Bit-Wise Operation. International Journal of Images, Graphics and signal Processing (IJIGSP) No. 2, pp. 30-38.

Nichat S. P. & Sikchi S. S. (2013). Image Encryption Using Hybrid Genetic Algorithm. International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Vol. 3, Issue 1. pp.428-431.

Pakshwar R., Tridevi V. K. & Richhariya V. (2013). A Survey on Different Image Encryption and Decryption Techniques. International Journal of Computer Science and Information Technologies (IJCSIT) Vol. 4, Issue 1. pp.113-116.

Panduranga H. T., Kumar S. K. N. & Kumar H. S. S. (2013). Hardware Software Co-Simulation of the Multiple Image Encryption Technique Using the Xilinx System Generator. International Journal of Information Process System (IJIPS) Vol. 9, No. 3. pp.499-510.

Sethi N. & Vijay S. (2013). Comparative Image Encryption Methods Analysis Using New Transformed-Mapped technique. Conference on Advances in Communication and Control system (CACCS). Dehrandum Institute of Technology, Dehrandum-248001

Sharma V., Agnihotri H. C. & Patil C. H. (2014). An Image Encryption and Decryption technique Using Two Chaotic Schemes. International Journal of Research in Advent Technology (IJRAT) Vol. 2, No. . pp.313-316.

Singh P. & Singh K. (2013). Image Encryption and Decryption Using Blowfish Algorithm in MATLAB. International Journal of Scientific and Engineering Research (IJSER) Vol. 1, Issue 7. pp.150-154.

Sridevi S. S. P., KarthigaiKumar, P. Siva Mangai, N.M. and Vanathi, P.T. (2012). Survey on Efficient, Low-power, AES Image Encryption and Bio-cryptography Schemes. Smart Computing Review, vol. 2, no. 6. pp. 379-390.

Published
2016-05-31
How to Cite
Harram, I. M., Bakura, M. U. M., Mohammed, A. M., & Kire, A. M. (2016). Recent Trends in Image Encryption: A Review. Journal of Information Sciences and Computing Technologies, 5(3), 519-528. Retrieved from http://scitecresearch.com/journals/index.php/jisct/article/view/729
Section
Articles