A REVIEW ON RECENT TRENDS IN IMAGE ENCRYPTION TECHNIQUES

ANURAG CHOUKSEY, HARSH PRATAP SINGH, KAILASH PATIDAR

Abstract


Abstract-

 

To protect image data, image encryption is an appropriate way. There is a unique feature of image and text data. The available encryption algorithms are good for text data. But it is not suitable for multimedia data because the characteristic of multimedia data is totally different from text data. All multimedia data has got a lot of redundancy but text data does not possess any redundancy. The pixel value of a location is highly correlated to values of its neighboring pixels. Like, a sound sample is correlated to its next sample and its previous samples. This correlation proves to be attack points to any standard encryption algorithm. Because they can predict the values of neighboring pixels or next sound sample by finding out pixel value at a location or one sound sample with reasonable accuracy. In this paper we recount some of the saga undergone by this field; we review the main achievements in the field of chaotic cryptography, starting with the definition of chaotic systems and their properties and the difficulties it has to outwit. According to their intrinsic dynamics, chaotic cryptosystems are classified depending on whether the system is discrete or continuous. Due to their simplicity and rapidity the discrete chaotic systems based on iterative maps have received a lot of attention. In this paper we have presented an advanced method of encryption using chaotic map.


Keywords


CHAOTIC CRYPTOSYSTEM, ITERATIVE MAP, ENCRYPTION ALGORITHMS, NEIGHBORING PIXELS.

Full Text:

Untitled

References


REFERENCES

Michael Eziashi Osadebey , “ Integrated Content – Based Image retrieval Using Texture, Shape And Spatial Information ”, Master Thesis Report in Media Signal Processing, pp. 3-5 February 2006.

Image, Richard E. Woods, “Digital Image Processing”, Prentice Hall Processing in IDL”, IDL Publication Version 7.1 May 2009.

National Institute of Standards and Technology, “Data Encryption Standard (DES),” http://csrc.nist.gov/publications/fips/fips46-fips46-3.pdf, 1999.

National Institute of Standards and Technology, “Advanced Encryption Standards (AES),” http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.

H. El-din. H. Ahmed, H. M. Kalash, and O. S. Farag Allah, “Encryption quality analysis of the RC5 block cipher algorithm for digital images”, Menoufia University, Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia-32952, Egypt, 2006.

Li. Shujun, X. Zheng “Cryptanalysis of a chaotic image encryption method”, Inst. of Image Process. Xi'an Jiaotong Univ, Shaanxi, This paper appears in: Circuits and Systems, ISCAS, IEEE International Symposium on Publication, Vol. 2, and page: 708,711, 2002.

Amitava Nag, Jyoti Prakash Singh, Srabani Khan, Saswati Ghosh andSushanta Biswas, D. Sarkar, Partha Pratim Sarkar, “ImageSignal Processing, Communication Computing and Networking Technology,2011.

P.Vijayram Reddy, K.Venkatesh Sharma and Dr.P. Mall sham, P.RadhaDevi, “Secure Image Transmission through Unreliable Channels”, IJCSE ,Vol. 02, No. 06, 2053-2058, 2010.

M. Abomhara, Omar Zakaria, Othman O. Khalifa ,“An Overview of Video Encryption Techniques”, International Journal of Computer Theory and Engineering, Vol. 2, No. 1 1793-8201, February, 2010.

San Diego, California, USA “Applications of Digital Image Processing”, Part of the SPIE International Symposium on Optical Engineering and Applications, 10-14 August 2008.

Chin- Chen Chang, Min-Shian Hwang, Tung-Shou Chen, “A New Encryption Algorithm for Image Cryptosystems”, The Journal of system and Software 58, 83-91, 2001.

Aloka Sinha , Kehar Singh, “A Technique for Image Encryption using Digital Signature”, Optics Communications,Vol-218 ,229-234 ,2003.

Jiancheng Zou , Rabab K. Ward , Dongxu Qi, “A New Digital Image Scrambling Method Based on Fibonacci Number”, Proceeding of the IEEE Inter Symposium On Circuits and Systems, Vancouver ,Canada ,Vol .03 , PP .965-968 , 2004.

Mohammad Ali Bani Younes and Aman Jantan ,“ Image Encryption Using Block-Based Transformation Algorithm”, lAENG International Journal of Computer Science, 35: I, 2008.

Q. D. Sun, W. X. Ma, W. Y. Yan, H. Dai , “A Random Scrambling Method for Digital Image Encryption: Comparison with the Technique Based on Arnold Transform”, Journal of Shanghai Second Polytechnic University, vol. 25, no. 3, pp. 159-163, 2008.

Jiri Fridrich, “Image Encryption Based on Chaotic Maps”, Proceeding of IEEE Conference On Systems, Man, and Cybernetics, pp. 1 105-II 10, 1997.

J. Cheng; J.1. Guo, “A new chaotic key-based design for image encryption and decryption”, IEEE International Symposium on Circuits and Systems, vol A, no. 4, pp. 49 - 52, May. 2000.

H. Zhao, W. Y. Wen, “A Survey of Digital Image Scrambling Techniques,” Fujian Compute, No. 12, pp. 10, 12. 2007.

Z. J. Tang, X. Lu, W. M. Wei, S. Z. Wang, et al, “Image Scrambling Based on Bit Shuffling of Pixels,” Journal of Optoelectronics Laser, vol. 18, no. 12, pp. 1486- 1488, 1495, 2007.

Qiudong Sun, Wenying Yan, Jiangwei Huang, Wenxin Ma, “Image Encryption Based on Bit-plane Decomposition and Random Scrambling”, Journal of Shanghai Second Polytechnic University , vol. 09 ,2012.

W. Xiao, J. Zhang and W. Wu, “ A Watermarking Algorithm Based on Chaotic Encryption” , Proceedings of IEEE TENCON, pp. 545-548, 2002.

S. Li and X. Zheng, “On The Security of An Image Encryption Method”, In Proceedings IEEE Int. Conference on Image Processing (ICIP), Vol. 2, pp.925 928,2002.

John Justin M, Manimurugan S, “A Survey on Various Encryption Techniques”, (IJSCE) ISSN: 2231-2307, Volume-2, Issue-1, March 2012.

M. Ashtiyani, P. M. Birgani, and H. M. Hosseini, “Chaos-Based Medical Image Encryption Using Symmetric Cryptography”, 3rd International Conference on Information and Communication Technologies: From Theory to Applications (ICTTA), pp. 1-5, 7-11 April 2008.

L. Tang, “Methods for Encrypting and Decrypting MPEG Video Data Efficiently”, Proceedings of the 4th ACM International Conference on Multimedia, pp. 219 229, 1996.

W. Zheng, M. Luttrell, J. Wen, M. Severa and W. Jin, “A Format Complain Configurable Encryption Framework for Access Control of Multimedia Proceedings”, International Workshop on Multimedia Signal Processing, pp. 435-440, 2001.

R. Karri, K. Wu, P. Mishra, and Y. Kim, “ Concurrent Error Detection Schemes for Fault-Based Side-Channel Cryptanalysis of Symmetric Block Ciphers”, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 21, No. 12, pp. 1509- 1517, Dec. 2002.

Z. H. Guan, F. Huang and W. Guan, “ Chaos-Based Image Encryption Algorithm”, Physics Letters A, Vol. 346, No. 1-3, pp. 153-157, 10 October 2005.

H. Gao, Y. Zhang, S. Liang and D. Li, “A New Chaotic Algorithm forImage Encryption”, Chaos, Solitons & Fractals, Vol. 29, No. 2, pp. 393-399 , July 2006.


Refbacks

  • There are currently no refbacks.