Have a personal or library account? Click to login
A Survey on Key(s) and Keyless Image Encryption Techniques Cover

A Survey on Key(s) and Keyless Image Encryption Techniques

Open Access
|Nov 2017

References

  1. 1. Stallings, W. Cryptography and Network Security. 5th Edition. Pearson Publishers, Prentice Hall, 2011.
  2. 2. Salama, D., A, Minaam, H., M. Abdual-Kader, M. Mohamed Hadhou d. Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types. - International Journal of Network Security, Vol. 2, 2010, No 2, pp. 78-87.
  3. 3. Gong-Bin, Q., J. Qing-Feng, Q. Shui-Sheng. A New Image Encryption Scheme Based on DES Algorithm and Chua’s Circuit. - In: Proc. of IEEE International Workshop on Imaging Systems and Techniques, 2009, pp. 168-172.
  4. 4. Ling, B., L. Lichen, Z. Jan. Image Encryption Algorithm Based on Chaotic Map and S-DES. - Advanced Computer Control (ICACC), IEEE, Vol. 5, 2010, pp 41-44.10.1109/ICACC.2010.5486998
  5. 5. Kaufman, C., R. Perlman, M. Speciner. Network Security: Private Communication in aPublic World. Upper Saddle River, NJ, US, Prentice Hall Press, 2002.
  6. 6. Nie, T., T. Zhang. A Study of DESand Blowfish Encryption Algorithm. - In: Proc. of TENCONIEEE Region 10 Conference, 2009, pp. 1-4.10.1109/TENCON.2009.5396115
  7. 7. Xiao, H., Q. Shuisheng, D. Chengliang. A Composite Image Encryption Scheme Using AESand Chaotic Series. - In: Proc. of 1st ISDPE, IEEE, 2007, pp. 277-279.
  8. 8. Msolli, A., A. Helali, H. Maaref. Image Encryption with the AES Algorithm in Wireless Sensor Network. - In: Proc. of 2nd International Conference on Advanced Technologies for Signal and Image Processing, IEEE, 2016, pp. 41-45.10.1109/ATSIP.2016.7523055
  9. 9. Schneier, B. Description ofa New Variable-Length Key, 64-Bit Block Cipher (Blowfish). - In: Proc. of International Workshop on FSE, Springer, Vol. 809, 1994, pp. 191-204.10.1007/3-540-58108-1_24
  10. 10. Aurora, T., P. Arora. Blowfish Algorithm. - IJCSCE, Vol. 2, NCRAET-2013, Special Issue, pp. 238-243.
  11. 11. Ali, M., B. Younes, A. Jantan. Image Encryption Using Block-Based Transformation Algorithm. - IAENG International Journal of Computer Science, Vol. 35, 2008, No 1, pp. 407-415.
  12. 12. Rise, R. E., S.-H. Cho, D. Kaylor. RC4 Encryption. 2008. https://www.math.washington.edu/~nichifor/310_2008_Spring/Pres_RC4%20Encryption.pdf
  13. 13. Stošić, L., M. Bogdanović. RC4 Stream Cipher and Possible Attacks on WEP. - IJACSA, Vol. 3, 2012, No 3, pp. 110-114.10.14569/IJACSA.2012.030319
  14. 14. Mousa, A., A. Hamad. Evaluation of the RC4 Algorithm for Data Encryption. - International Journal of Computer Science and Application, Vol. 3, 2006, No 2, pp. 44-56.
  15. 15. Ginting, R. U., R. Y. Dillak. Digital Color Image Encryption Using RC4 Stream Cipher and Chaotic Logistic Map. - ICITEE, IEEE, 2013, pp. 101-105.10.1109/ICITEED.2013.6676220
  16. 16. Sasidharan, S., D. S. Philip. A Fast Partial Image Encryption Scheme with Wavelet Transform and RC4. - International Journal of Advances in Engineering & Technology, Vol. 1, 2011, No 4, pp. 322-331.
  17. 17. Riad, A. M., A. H. Hussein, H. M. Kasem, A. A. El-Azm. A New Efficient Image Encryption Technique Based on Arnold and IDEA Algorithms. - ICIIP, Vol. 46, 2012, pp. 140-145.
  18. 18. Singh, H. P., S. Verma, S. Mishr. Secure-International Data Encryption Algorithm. - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 2, 2013, No 2, pp. 780-792.
  19. 19. Worthington, B. An Introduction to Hill Ciphers Using Linear Algebra. University of North Texas, 2010, pp 1-24.
  20. 20. Bibhudendra, A., S. K. Panigrahy, S. K. Patra, G. Panda. Image Encryption Using Advanced Hill Cipher Algorithm. - IJRTER, Vol. 1, 2009, No 1 pp. 663-667.
  21. 21. Mishra, D. C., R. K. Sharma. Grayscale-Image Encryption Using Random Hill Cipher over SLn(F) Associated with Discrete Wavelet Transformation. - AAM: An International Journal, Vol. 8, 2013, No 2, pp. 777-791.
  22. 22. Yang, C., M. Hua, S. Jia. Image Encryption Algorithm Based on Chaotic Mapping and Chinese Remainder Theorem. - Metallurgical and Mining Industry, 2015, No 4, pp. 206-212.
  23. 23. Kong, L., L. Li. A New Image Encryption Algorithm Based on Chaos. - In: Proc. of 35th Chinese Control Conference, IEEE, 2016, pp. 4932-4937.10.1109/ChiCC.2016.7554120
  24. 24. Chen, T., M. Zhang, J. Wu, C. Yuen, Y. Tong. Image Encryption and Compression Based on Kronecker Compressed Sensing and Elementary Cellular Automata Scrambling. - Optics & Laser Technology, Elsevier, Vol. 84, 2016, pp. 118-133.10.1016/j.optlastec.2016.05.012
  25. 25. Hua, Z., Y. Zhou. Image Encryption Using 2D Logistic-Adjusted-Sine Map. - Information Sciences, Elsevier, Vol. 339, 2016, pp. 237-253.10.1016/j.ins.2016.01.017
  26. 26. Tang, Z., J. Song, X. Zhang, R. Sun. Multiple-Image Encryption with Bit-Plane Decomposition and Chaotic Maps. - Optics and Lasers in Engineering, Elsevier, Vol. 80, 2016, pp. 1-11.10.1016/j.optlaseng.2015.12.004
  27. 27. Ye, G. Image Scrambling Encryption Algorithm of Pixel Bit Based on Chaos Map. - Pattern Recognition Letters, Elsevier, Vol. 31, 2010, pp. 347-354.10.1016/j.patrec.2009.11.008
  28. 28. Abdul, N., M. Abbas. Image Encryption Based on Independent Component Analysis and Arnold’s Cat Map. - Egyptian Informatics Journal, Elsevier, Vol. 17, 2015, pp. 139-146.10.1016/j.eij.2015.10.001
  29. 29. Lin, Z.-H., H.-X. Wang. Image Encryption Based on Chaos with PWL Memristor in Chua’s Circuit. - ICCCAS, IEEE, 2009, pp. 964-968.
  30. 30. Zhang, H., R. Cai. Image Encryption Algorithm Based on Bit-Plane Scrambling and Multiple Chaotic Systems Combination. - ICISS, IEEE, 2010, pp. 113-117.
  31. 31. Tang, Z., X. Zhang, W. Lan. Efficient Image Encryption with Block Shuffling and Chaotic Map. - Multimed Tools Appl., Springer, Vol. 74, 2014, No 15, pp. 5429-5448.10.1007/s11042-014-1861-1
  32. 32. Zhang, Y. P., P. Xu, L. Z. Xiang. Research of Image Encryption Algorithm Based on Chaotic Magic Square. - Advances in ECWAC, Springer, Vol. 2, 2012, pp. 103-109.10.1007/978-3-642-28658-2_16
  33. 33. Wang, D., C.-C. Chang, Y. Liu, G. Song, Y. Liu. Digital Image Scrambling Algorithm Based on Chaotic Sequence and Decomposition and Recombination of Pixel Values. - International Journal of Network Security, Vol. 17, 2015, No 3, pp. 322-327.
  34. 34. Milanov, E. The RSA Algorithm. 3 June 2009. https://www.math.washington.edu/~morrow/336_09/papers/Yevgeny.pdf
  35. 35. Vinothini, Saranya, Vasumath i. A Study on RSA Algorithm for Cryptography. - IJCSIT, Vol. 5, 2014, pp. 5708-5709.
  36. 36. Anandakumar, S. Image Cryptography Using RSA Algorithm in Network Security. - IJCSET, Vol. 5, 2015, No 9, pp. 326-330.
  37. 37. Chandel, G. S., P. Patel. A Review: Image Encryption with RSAand RGB Randomized Histograms. - IJARCCE, Vol. 2, 2013, No 11, pp. 4391-4401.
  38. 38. Oswald, E. Introduction to Elliptic Curve Cryptography. 2005. http://www.vanilla47.com/PDFs/Cryptography/Miscellenea/Introduction_to_Elliptic_Curve_Cryptography.pdf
  39. 39. Mohamed, A., S. Eldeen, Abdellatif, A. Elkouny, S. Elraml y. DES Algorithm Security Fortification Using Elliptic Curve Cryptography. - ICCES, IEEE, 2015, pp. 335-340.10.1109/ICCES.2015.7393071
  40. 40. Suganya, N., S. Sathiy a. Encryption of Image Matrix Using Elliptic Curve Cryptography. - IJITE, Vol. 2, 2012, pp. 229-232.
  41. 41. Shuangyuan, Y., L. Zhengding, H. Shuihu a. An Asymmetric Image Encryption Based on Matrix Transformation. - ISCIT, IEEE, Vol. 1, 2004, pp. 66-69.
  42. 42. Kester, Q.-A., L. Nana, A. C. Paseu. A New Hybrid Asymmetric Key-Exchange and Visual Cryptographic Algorithm for Securing Digital Images. - In: Proc. of International Conference on AST, IEEE, 2013, pp. 1-5.10.1109/ICASTech.2013.6707497
  43. 43. Sasi, S., D. L. Swarna Jyothi. A Heuristic Approach for Secured Transmission of Image Based on Bernstein Polynomial. - In: Proc. of International Conference on Circuits, Communication, Control and Computing, IEEE, 2013, pp. 312-315.10.1109/CIMCA.2014.7057813
  44. 44. Chhotaray, S. K., A. Chhotaray, G. Sankar Rath. A New Method of Generating Public Key Matrix and Using It for Image Encryption. - In: Proc. of 2nd International Conference on Signal Processing and Integrated Networks (SPIN), IEEE, 2015, pp. 453-458.10.1109/SPIN.2015.7095272
  45. 45. Elashry, I., O. Allah, A. Abbas, S. El-Rabaie, F. El-Samie. Homomorphic Image Encryption. - Journal of Electronic Imaging, Vol. 18, 2009, No 3, pp. 1-14.10.1117/1.3167847
  46. 46. El-Fishawy, N., O. Zaid. Quality of Encryption Measurement of Bitmap Images with Rc6, Mrc6, and Rijndael Block Cipher Algorithms. - International Journal of Network Security, Vol. 5, 2007, No. 3, pp. 241-251.
  47. 47. Kamali, S., R. Shakerian, M. Hedayati, M. Rahman i. A New Modified Version of Advanced Encryption Standard Based Algorithm for Image Encryption. - In: Proc. of International Conference on Electronics and Information Engineering, IEEE, Vol. 1, 2010, pp. 1-141.10.1109/ICEIE.2010.5559902
  48. 48. Ahmad, J., F. Ahmed. Efficiency Analysis and Security Evaluation of Image Encryption Schemes. - International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS, Vol. 12, 2012, No 4, pp. 18-31.
  49. 49. Shannon, C. Communication Theory of Secrecy Systems. - Bell System Technical Journal, Vol. 28, 1949, No 4, pp. 656-715. 10.1002/j.1538-7305.1949.tb00928.x
  50. 50. Lian, S. Multimedia Content Encryption: Techniques and Applications. Auerbach Publications, CRC Press, Taylor and Francis Group. 2008.10.1201/9781420065282
  51. 51. Elkamchouchi, H., M. Makar. Measuring Encryption Quality for Bitmap Images Encrypted with Rijndael and Kamkar Block Ciphers. - In: Proc. of 22nd IEEE National, Radio Science Conference (NRSC’05), 2005, pp. 277-284.10.1109/NRSC.2005.194011
  52. 52. Ahmed, H., H. Kalash, O. Allah. Encryption Efficiency Analysis and Security Evaluation of Rc6 Block Cipher for Digital Images. - In: Proc. of International Conference on Electrical Engineering, IEEE, 2007, pp. 1-7.10.1109/ICEE.2007.4287293
  53. 53. El-lskan darani, M., S. Darwish, S. Abugub a. A Robust and Secure Scheme for Image Transmission over Wireless Channels. - In: Proc. of 42nd Annual International Conference on CST, IEEE, 2008, pp. 51-55.10.1109/CCST.2008.4751276
  54. 54. Ranjan, K. H. S., H. R. P. Kumar, K. B. Sudeepa, G. Aithal. Enhanced Security System Using Visual Cryptograhy and Symmetric Encryption. - International Journal of Advances in Engineering & Technology (IJAET), Vol. 6, 2013, No 3, pp. 1211-1219.
  55. 55. Naor, M., A. Shamir. Visual Cryptography. - Proceedings of Advances in Cryptology, EUROCRYPT 94, Springer-Verlag, LNCS, Vol. 950, 1994, pp. 1-12.10.1007/BFb0053419
  56. 56. Prabir, K. Naskar, Ayan Chaudhuri, Debarati Basu, Atal Chaudhur i. A Novel Image Secret Sharing Scheme. - In: Proc. of 2nd International Conference on Emerging Applications of Information Technology, IEEE, 2011, pp. 177-180.
  57. 57. Sharma, H., N. Kumar, G. K. Jha. Enhancement of Security in Visual Cryptography System Using Cover Image Share Embedded Security Algorithm (CISEA). - In: Proc. of International Conference on Computer & Communication Technology (ICCCT’11), IEEE, 2011, pp. 462-467.10.1109/ICCCT.2011.6075137
  58. 58. Kafri, O., E. Keren. Encryption of Pictures and Shapes by Random Grids. - Optics Letters, Vol. 12, 1987, pp. 377-379.10.1364/OL.12.000377
  59. 59. Hawkes, L. W., A. Yasinsac, C. Cline. An Application of Visual Cryptography to Financial Documents. Technical Report, Florida State University, 2000.
  60. 60. Li, M.-J., J. S.-T. Juan. A Flexible Multiple-Secret Image Sharing Scheme by Shifting Random Grids. - In: Proc. of 17th International Symposium on Consumer Electronics (ISCE’13), IEEE, 2013, pp. 289-290.10.1109/ISCE.2013.6570232
  61. 61. Joy, J., Y. Chang, S. Justice, T. Juan. Multi VSS Scheme by Shifting Random Grids. - World Academy of Science, Engineering and Technology, Vol. 67, 2012, pp. 936-942.
  62. 62. Jothi, R., A. Ojha. On Multi-Secret Sharing Using Hill Cipher and Random Grids. - In: Proc. of International Conference on Advances in Computer Engineering and Applications (ICACEA’15), IEEE, 2015, pp. 683-687.10.1109/ICACEA.2015.7164778
  63. 63. Chen, W.-K. Image Sharing Method for Gray-Level Images. - Journal of Systems and Software, Vol. 86, 2013, pp. 581-585.10.1016/j.jss.2012.09.040
  64. 64. Sruthy, K., J. R. Ramesh. Random Grid Based Visual Cryptography Usinga Common Share. - In: Proc. of International Conference on Computing and Network Communications (Co Co Net’15), IEEE, 2015, pp. 656-662.
  65. 65. Liu, F., C. Wu. Embedded Extended Visual Cryptography Schemes. - IEEE Transactions on Information Forensics and Security, Vol. 6, 2011, No 2, pp. 307-322.10.1109/TIFS.2011.2116782
  66. 66. Askari, N., H. M. Heys, C. R. Molone y. An Extended Visual Cryptography Scheme without Pixel Expansion for Halftone Images. - In: Proc. of 26th Annual IEEE Canadian Conference on Electrical and Computer Engineering, 2013, pp. 1-6.10.1109/CCECE.2013.6567726
  67. 67. Kang, I., R. Gonzalo, Arce, H.-K. Lee. Color Extended Visual Cryptography Using Error Diffusion. - ICASSP, IEEE, 2009, pp. 1473-1476.
DOI: https://doi.org/10.1515/cait-2017-0046 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 134 - 164
Published on: Nov 30, 2017
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2017 Kumar H. S. Ranjan, Safeeriya S. P. Fathimath, Ganesh Aithal, Surendra Shetty, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.