Sei sulla pagina 1di 4

National Conference on Innovations And Emerging Technologies For Future Smart Cities-(NCIETFSC’17)

A Survey on Image Encryption and Decryption


Techniques
G. Subitcha M. Marimuthu
UG Scholar Assistant Professor
Department of Computing Department of Computing
Coimbatore Institute of Technology Coimbatore Institute of Technology

Abstract --A tremendous growth has been viewed in the past few B. Symmetric Encryption
decades in the technological fields, the rise of growth on hand
also lead its path to the level of security endurance on those These can also be referred to as public key
data. As the information must be safeguarded in order to its protection mode, since the key's are the same that are used
path to prevent it from being leaked to the unauthorized for both encrypting and decrypting the data by both the
persons, the method used for hiding and un hiding the data are sender and the receiver, it is like a public key which leads to
referred as encrypting and decrypting the data. This encryption
less protection and easy to obtain the message from sender.
techniques has been applied in different types of data like text,
image, audio clips, videos etc., this paper presents an overview
C. Shared Secret Encryption
of the available image encryption techniques.
It is like a security password or key known only to
Keywords: Image Encryption, Decryption, Permutation,
Symmetric Key the required authorities, both the sender and the receiver have
own set of passwords to encrypt the data, this method also be
I. INTRODUCTION referred as PRE SHARED KEY. Under similar categories of
encryption models the image encryption algorithms are
The enormous development in technology requires categorized into three main models they are,
secured communication in open networks. Open networks are
highly vulnerable due to attackers present in between the  Position Permutation Based Algorithm
communication channel. In order to secure the data and  Value Transformation Based Algorithm
image, lot of image encryption methods are proposed by  Position-substitution Based Algorithm
researchers. This paper describes the view of image
encryption and the different reviews on the types of image II. LITERATURE REVIEW
encryption.
M. Zeghid et al. [3] proposed a technique of image
A. Image Encryption encryption used for the digital data which uses Advanced
Encryption Standard (AES), along with an added key stream
Encryption is the process of converting a processed generator (A5/1, W7) to the AES to ensure improving the
set of data which has some secret message into an hidden encryption performance.
format known as encrypt which helps from hiding the data
from the masked people. There are different types of
encryption techniques algorithm which are used for packeting
the new data’s they are

 Symmetric Encryption
 Shared Secret Encryption

1
National Conference on Innovations And Emerging Technologies For Future Smart Cities-(NCIETFSC’17)

improvement DES. The result shows high starting value


sensitivity, and high security and the encryption speed.

A criterion for choosing chaos map to drive image bit


permutation based on chaos permutation information entropy
is proposed by CAO Guang-hui et al. [8] An algorithm for
image bit permutation is designed based on the fact that the
output trajectory of chaotic system is very unpredictable.
Image smallest granularity scrambling, namely, bit space
maximum scrambling is implemented by applying the chaos
Mohammad Ali Bani Younes and Aman Jantan [4] introduce that has been selected. Image substitution algorithm
a new permutation technique based on the combination of according to the principle of chaos map stretch and fold is
image permutation and a well known encryption algorithm designed to finish image encryption transformation to
called RijnDael. The original image was divided into 4 pixels enhance the ability to resist attack.
× 4 pixels blocks and permutated, finally image is rearranged.
Seyed Mohammad Seyedzade et al. [9] have proposed a
An advanced version of hill chipper method has been novel algorithm for image encryption based on SHA-512
proposed by Bibhudendra Acharya et al. [5]. In the theory in hash function. The algorithm consists of two main sections:
a way through which the images are encrypted at a faster rate The first does preprocessing operation to shuffle one half of
and also up comes the problem of encryption with image. The second uses hash function to generate a random
homogenous backgrounds. The key technique used for number mask.
encryption are C + Ek(p)=Kp and for decryption is
Ibrahim S I Abuhaiba and Maaly A S Hassan [10] presented
P = Dk(c) = K ^ - 1C = K ^ - 1 Kp = P a new effective method for image encryption which employs
magnitude and phase manipulation using Differential
An image encryption model developed by Sesha Pallavi Evolution (DE) approach. They have carried out key space
Indrakanti and P.S.Avadhani [6] have described the analysis, statistical analysis, and key sensitivity analysis to
permutation model which is done by rearranging the demonstrate the security of the new image encryption
elements without altering the pixels or bits of the image , procedure
which results in an highly secured image with adjacent pixels
assurances. Authors used three various stages for this type of Rasul Enayatifar and Abdul Hanan Abdullah [11] have
encryption, in first stage the image is been split up into proposed a new method based on a hybrid model composed
blocks and in second stage the separated image is been taken of a genetic algorithm and a chaotic function for image
to the generation phase where the key is generated, the third encryption. In their technique, first a number of encrypted
phase is the shared phase of identification phase where the images are constructed using the original image with the help
share and key are generated and given to the receiver. The of the chaotic function. In the next stage, these encrypted
key being generated is of 64 bit, which is split up into 8 images are employed as the initial population for starting the
different components each sharing and working on its own operation of the genetic algorithm. Chaotic function is the
subsets. main concept held behind this methodology, due to its
deterministic work approach. During the first phase the
Zhang Yun-peng et al. [7] proposed an chaotic encryption, image is chosen and five pixels are chosen for encryption key
DES encryption and a combination of image encryption leading to the logical map function for encrypting part. On
algorithm. The technique follows new encryption scheme second level, the logistic map obtained from five pixel is
which uses the logistic sequencer to make the pseudo-random worked on a formula,
sequence, carries on the RGB with this sequence to the image
chaotically, then makes double time encryptions with P=[p1,p2,p3,p4,p5](decimal”)

2
National Conference on Innovations And Emerging Technologies For Future Smart Cities-(NCIETFSC’17)

These p represent the 5 pixels each holding 8 bits. Bhaskar monadl, tarni mandal, [14] have presented a new
scheme of light weight encryption method where an plain
Level 3: each part of the image is repeated with the level 2 image is Re-arranged using a sequence .Techniques like
tasks. On the last session, the equation and the initial value of pseudo random number (PRN) and encrypted by Deoxyribo
the picture are used in terms of, Nucleic Acid (DNA) are used to generate the encrypted
image with lighter weight. Tow PRN are used in this
NewValue = round(Uik*255) *oldvalue.
process, the First PRN to re-arrange the images and the
Thus the method results in a high stability in areas of second one to generate random DNA sequence .In terms, the
common attacks. convey that, The number of rounds of re-arrangement and
encryption enriches their level of security.
A new optical interference-based multiple-image encryption
using spherical wave illumination and gyrator transform is Tariq Shah et al. [15] proposed a criterion to analyze the
proposed by Muhammad Rafiq Abuturab [12]. In this prevailing S-boxes and study their strengths and weaknesses
proposal, each secret color image is divided into normalized in order to determine their suitability in image encryption
red, green, and blue component images and independently applications. The proposed criterion uses the results from
encoded into corresponding phase-only component images. correlation analysis, entropy analysis, contrast analysis,
Then each phase-only component image of all the images are homogeneity analysis, energy analysis, and mean of absolute
combined together to produce a single-phase-only component deviation analysis. These analyses are applied to advanced
image as an input component image, which is bounded with a encryption standard (AES), affine-power-affine (APA), gray,
random phase mask to form a complex image. The two Lui J, residue prime, S8 AES, SKIPJACK, and Xyi Sboxes.
phase-only masks are analytically obtained from the inverse
Jun Li et al [16] presented an compressive encryption
Fourier transformation of the complex image. The host image
technique .By using an Double Random Phase Encoding
is chosen as the first phase-only mask, and the complex
(DRPE) method the image is led to a white sense stationary
image hidden in the host image is regarded as the second
noise patter, and the image is compressed and encrypted, the
phase-only mask. The spherical wave is generated to
decryption of the image can be done using a Three
simultaneously illuminate phase-only masks. Then two
constructed holograms and correct keys, they assume that this
modulated masks are gyrator transformed. The corresponding
method is effective and suitable for optical image security
transformed images are phase truncated to obtain encrypted
transmission in future encryption works.
images and amplitude truncated to construct decryption keys.
Amrane houas et al [17] proposed a new algorithm to
Ravi Prakash Dewangan and Chandrashekhar Kamargaonkar
encrypt binary images. Proposed method use some basic
[13] have proofed their thoughts that the pixels that are
steps to be followed, they are to reduce the amount of data,
obtained from an encrypted image can be represented into
that is need to present the image, image is split into blocks
combined performance of 1D,2D key that are used for
and represent them in new basis with obtaining a key image
encryption ,which leads to an faster encryption and redundant
and encrypted image. The decryption is done in terms of
brutal force attack. An image encryption can be done using
subtraction between each encrypted image and the key-
three methods they are pixels, blocks and permutation. All
image, then they are summed up at last to obtain the original
these three methods are been implemented in this approach,
one
the image is been separated into blocks, they undergo row
and column pixel permutation, the pixel permutation and III. CONCLUSION
block permutation are mostly similar in terms of working.
The Encrypted key for the image is been developed at the Nowadays, the security of digital images become more and
time interval of splitting up of blocks and the pixel more important since the communications of digital products
permutation, the decryption is done between the pixel over open network occur more and more frequently. In this
permutation and the block representation. paper, we have surveyed existing work on image encryption.
We also give general guide line about cryptography and the

3
National Conference on Innovations And Emerging Technologies For Future Smart Cities-(NCIETFSC’17)

different type of encryption algorithm and their charts and [9] S. M. Seyedzade, S. Mirzakuchaki and R. E. Atani, "A novel image
encryption algorithm based on hash function," 2010 6th Iranian Conference
also reviewed on the symmetric and secret key encryption
on Machine Vision and Image Processing, Isfahan, 2010, pp. 1-6.
methods. We conclude that all techniques are useful for real-
time image encryption. Techniques describes in this paper [10] Ibrahim S I Abuhaiba, Maaly A S Hassan, "Image Encryption
that can provide security functions and an overall visual Using Differential Evolution Approach In Frequency Domain", Signal &
Image Processing : An International Journal(SIPIJ) Vol.2, No.1, March
check, which might be suitable in some applications. So no
2011, pp.51-69
one can access image which transferring on open network.
[11] Rasul Enayatifar, Abdul Hanan Abdullah, "Image Security via
In general, a well-studied, fast and secure common image Genetic Algorithm", 2011 International Conference on Computer and
encryption should be developed. Surely our method would Software Modeling, pp.198-203
provide high level security for image transfer. [12] Muhammad Rafiq Abuturab, "Optical interference-based
multiple-image encryption using spherical wave illumination and gyrator
REFERENCES transform," Appl. Opt. 53, 6719-6728 (2014)

[1] D. I. G. Amalarethinam and J. S. Geetha, "Image encryption and [13] Ravi Prakash Dewangan, Chandrashekhar Kamargaonkar "Image
decryption in public key cryptography based on MR," International Encryption using Random Permutation by Different Key Size", International
Conference on Computing and Communications Technologies (ICCCT), Journal of Science, Engineering and Technology Research (IJSETR),
Chennai, 2015, pp. 133-138. Volume 4, Issue 10, October 2015, pp.3531-3535

[2] Gustavus J. Simmons, “Symmetric and Asymmetric Encryption”, [14]Mondal, B., Mandal, T., “A light weight secure image encryption
Computing Surveys, Vol. 11, No. 4, December 1979, pp.305-330 scheme based on chaos & DNA computing” , Journal of King Saud
University – Computer and Information Sciences (2016),
[3] M. Zeghid, M. Machhout, L. Khriji, A. Baganne, and R. Tourki, "A http://dx.doi.org/10.1016/j.jksuci.2016.02.003
Modified AES Based Algorithm for Image Encryption", International
Journal of Computer, Electrical, Automation, Control and Information [15] Tariq Shah, Iqtadar Hussain, Muhammad Asif Gondal and Hasan
Engineering Vol:1, No:3, 2007, pp.745 - 750 Mahmood, "Statistical analysis of S-box in image encryption applications
based on majority logic criterion", International Journal of the Physical
[4] Mohammad Ali Bani Younes, Aman Jantan, "An Image Encryption Sciences Vol. 6(16), pp. 4110-4127, 18 August, 2011, pp.4110-4127
Approach Using a Combination of Permutation Technique Followed by
Encryption", IJCSNS International Journal of Computer Science and
Network Security, VOL.8 No.4, April 2008, pp.191 - 197 [16] Jun Li, Jiao Sheng Li, Yang Yang Pan, Rong Li, "Compressive Optical
Image Encryption", www.nature.com/scientificreports, pp.1-10
[5] Bibhudendra Acharya, Saroj Kumar Panigrahy, Sarat Kumar
Patra,Ganapati Panda, "Image Encryption Using Advanced Hill Cipher [17] Amrane Houas, Zouhir Mokhtari, Kamal Eddine Melkemi,
Algorithm", International Journal of Recent Trends in Engineering, Vol. 1, Abdelmalik Boussaad, "A novel binary image encryption algorithm based on
No. 1, May 2009, pp.663-667 diffuse representation", Engineering Science and Technology, an
International Journal 19 (2016), pp.1887–1894.
[6] Sesha Pallavi Indrakanti, P.S.Avadhani, "Permutation based Image
Encryption Technique", International Journal of Computer Applications
(0975 – 8887), Volume 28– No.8, August 2011, pp.45-47

[7] ZHANG Yun-peng, ZHAI Zheng-jun,LIU Wei, NIE Xuan, CAO Shui-
ping, DAI Wei-di, "Digital Image Encryption Algorithm Based on Chaos
and Improved DES", Proceedings of the 2009 IEEE International Conference
on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009,
pp.480-485

[8] CAO Guang-hui, Hu Kai, Yang He, E Xu, "Algorithm of Image


Encryption based on Permutation Information Entropy", 3rd International
Conference on Computer and Electrical Engineering (ICCEE 2010), pp. 1- 7

Potrebbero piacerti anche