Sei sulla pagina 1di 3

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 3, May June 2013 ISSN 2278-6856

A review on Image encryption techniques


Sandeep kaur1, Sukhpreet Singh2, Sonia3
1

Lecturer in C.S.E Department, MIMIT, Malout (Punjab)

Assistant Professor, C.S.E Department, Guru Kashi University, Talwandi Sabo (Bathinda), Punjab
3

Associate Professor, I.T. Department, MIMIT Malout (Punjab)

Abstract: Advanced digital technologies have made


multimedia applications widely available over the world. In practice multimedia data is common in different forms such as text, audio, video, graphic and images, so information security becomes main concern in data storage and transmission. Encryption is one way to ensure good security from unauthorized access in many fields like military communication and medical sciences. This paper surveys various encryption techniques on existing work, each one has its own merits and demerits for images and then tries to suggest the future scope in encryption process with some modification keys. Keywords: Encryption, Steganography, scrambling.

There is a major trend is to minimize the computational requirement for the secure multimedia communication. So some selective encryption techniques are used where only parts of the image data are encrypted rather than the full image [11]. Chaotic methods are very sensitive to small change in key so even with the knowledge of the key approximate values; there is no possibility for the attacker to break the cipher [3], [4]. This paper organized as follows in section I we present general guide lines about cryptography. In section II we survey on already existing research papers, finally we conclude in section III.

1. Introduction:
Nowadays information security is becoming more important in data storage and transmission. Images are widely used in several processes, so the protection of image from unauthorized access is very important. Encryption is a process for converting plain text to cipher text. An original message (image) is known as plaintext and Coded message (image) is called cipher text. The evolution of encryption is moving towards a future of endless possibilities. Everyday new methods of encryption techniques are discovered. There exists many traditional encryption techniques like DES, AES or IDEA etc for providing high security to the data that may be textual or image form. It is difficult to use them directly in multimedia data because of some shortcomings on the key space, encryption speed and other aspects. So many other techniques have also been developed for image encryption. On the other hand some scrambling (replacement of pixels with each other) and transformation (image is first divided into blocks the shuffle blocks) techniques are used mainly for image encryption which are very simple and are easy to implement. But due to the simplicity of these techniques, the decryption process is also very simple so a third person can easily crack the algorithm. Thus to provide high degree of security these techniques are combined with other strong techniques [1], [2], [7]. Some complex encryption techniques are also present like image encryption approaches using chaos, stream cipher and hash based techniques [11]. Some researchers have also done improvements in DES and AES [4], [6], [10]. Volume 2, Issue 3 May June 2013

2. Literature review
2.1 New image encryption and compression method based on independent component analysis, 2003. Masanori Ito, Ayman Alfaou, Ali Mansour proposed a new compression and encryption technique is purposed. The compression is done with the help of DCT. Firstly the image is divided into small squares blocks after this DCT (discreet cosine transformation) is applied and obtain DCT components. Most of DCT components have high energy in low frequency bands; they use only low frequency components through a simple low pass filter. After the compression the small blocks are rotated randomly and save the rotation matrix as a key. The encryption technique is inspired by blind source separation. The compressed and rotated DCT blocks are mixed together. It is observed that when compression ratio is between 0.1 to 0.5 the best performance can be achieved. Therefore by using this technique we can achieve a fast and secure image transmission [8]. 2.2 Image based steganography and cryptography, 2003. Domenico Bloisi and Luca Iocchi develop a technique ISC (image based steganography and cryptography) is developed which integrates steganography and cryptography. The encryption is done by one time pad key which is effective type of encryption. On the other hand for steganography the method used is also very effective like F5. The strength of this system resides in the new concept of key image. Involving two images (cover and key) in place of one (cover) which enables to change the cover coefficient randomly. This opportunity does not Page 350

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 3, May June 2013 ISSN 2278-6856
give a steganalytic tool the chance of searching for predictable set of modification. As future work, we intend to study steganalytic techniques for ISC and to extend ISC to mobile video communication [9]. 2.3 Image encryption using block based transformation algorithm, 2008. Mohammad Ali Bani Younes and Aman JanatIn develop a simple and strong method has been proposed for image security using a combination of block based image transformation and blowfish algorithm both use the original image and encryption techniques. Here the author uses a transformation algorithm to produce three output images: A ciphered image using blowfish. A transformed image using a transformation process. A transformed image encrypted by blowfish. The correlation and entropy of three images are computed and compared with each other. This technique aims at enhancing the security level of encrypted image by reducing the correlation among image elements and increasing its entropy values. The experimental results of proposed showed that an inverse relationship exists between blocks and correlation, and direct relationship between number of blocks and entropy. The comparative analysis also did which shows that the proposed algorithm resulted in the best performance; the lowest correlation and highest entropy. 2.4 Emended low area 32-bit AES for image encryption/decryption application, 2009. Kuo-Huang, Yi-Cheng Chen, Chung-Cheng Hsieh, ChiWu Huang and Chi-Jeng Chang presents a 32-bit area implementation with a low area of 110 slices which is smallest design among the literature reports. Here the small core, suitable for inexpensive small size FPGA chip implementation, is emended in Xilinx Spartan3E with Micro Blaze processor for image encryption/decryption applications. Spartan circuit board has the on board 50 MHz clock. The most of the processing time is consumed by flash memory read/write and software processing so the future work is concentrate on this weakness that how to speed up the emended system performance[10]. 2.5 Image encryption using DCT and stream cipher, 2009. Aliraz Jolfaei, abdolrasoul Mirghadri proposed method which uses the selective encryption approach where the DC coefficients and some selective AC coefficient are encrypted, hence the DC coefficient carry important visual information and it is difficult to predict the selective AC coefficient this gives the high level of security. The key used in this technique is composed by 6 bytes the first four bytes are used to generate the pseudo random sequence to be used in stream cipher of image, the other 2 bytes will be two prime numbers used to generate the row and column shuffling numbers which are used to shuffle the image. This approach is very fast because it uses the selective encryption rather than full image encryption [11]. Volume 2, Issue 3 May June 2013 This paper also provide knowledge about different types of random bit generators and also explain that why they use NLFSR (non-linear feedback shift register).

3. Conclusion:
Image encryption is attractive area for research in these days because communication with the help of multimedia objects increasing rapidly. In this paper, we have surveyed five techniques developed by different scientist. We have studied chaotic based technique which is very secure because its high sensitivity. Some transformation techniques are used which are also an effective way for encryption. Emended low area 32-bit AES for image encryption/decryption is the smallest design from all encryption techniques. Compression and encryption both are combined and formed a new technique which is effective but needs additional operating requirements. So every technique has its own merits and demerits we can use any technique according to our convenience. Table1: Comparison of different techniques

References:
[1] X.Fei, G.Xi-cong and Luoyang An image encryption algorithm based on scrambling and substitution using hybrid chaotic systems 2009 IEEE. [2] X.Xiaolin and F.Jiali Research and implementation of image encryption algorithm based on zigzag transformation and inner product polarization 2010 IEEE. [3] H.H.Nien, W.T.Huang, C.M.Hung, C.K. Huang and Y.H. Hsu Hybrid image encryption using multichaos-system 2009 IEEE. [4] Z.Yun-peng, Z.Zheng-jun, L.Wei, N.Xuan, C.shuiping, D.Wei-di Digital image encryption algorithm based on chaos and improved DES 2009 IEEE. [5] S.H.Kamali, R.Shakerian, M.Hedayati, M.Rahmani a new modified version of advance encryption standard based algorithm for image encryption 2010 IEEE. [6] M.Zeghid, M.Machhout, L.Khriji, A.Baganne and R.Tourki a modified AES based algorithm for image encryption 2007.

Page 351

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 3, May June 2013 ISSN 2278-6856
[7] M.Younes and A.Janat Image encryption using block based transformation algorithm 2008. [8] M.Ito, A.Alfaou, A.Mansour New image encryption and compression method based on independent component analysis 2003. [9] D.Bloisi and L.Iocchi Image based steganography and cryptography 2003 [10] K.Huang, Y.Chen, C.Hsieh, C.Huang and C.Chang Emended low area 32-bit AES for image encryption/decryption application, 2009 IEEE . [11] A.Jolfaei, A.Mirghadri Image encryption using DCT and stream cipher, 2010 journal of technical and applied information technology

Authors:
Sandeep Kaur, Lecturer C.S.E Department, MIMIT Malout, Qualification: B-Tech(C.S.E) from Guru Gobind Singh College of Engg. & Tech., Talwandi Sabo., M-Tech(Comp. Engg.) from Punjabi University Patiala. Sukhpreet Sing, Assistant Professor, C.S.E Department, Guru Kashi University Talwandi Sabo, Qualification: B-Tech(C.S.E) from Chitkara Instt. of Engg. & Tech., Rajpura, MTech(Comp. Engg.) from Punjabi University Patiala. Sonia Sharma, Associate Professor, I.T. Department, MIMIT Malout, Qualification: BTech(C.S.E), M-Tech(Comp. Engg.), Ph.d Pursuing

Volume 2, Issue 3 May June 2013

Page 352

Potrebbero piacerti anche