Review of Image Encryption using Different Techniques
DOI:
https://doi.org/10.25007/ajnu.v11n3a1301Abstract
Encryption is one of the measures that ensure the security of images used in various fields such as military understanding, secure clinical imaging offices, Internet and intranet media, electronic banking, and individual association images such as Facebook, WhatsApp, Twitter, etc. On this huge number of images that are sent in a free and open link either during selection or messaging; Then their security ends up being a central need in individual insurance organizations and the arrangement. This article audits and summarizes various image encryption systems to further develop advanced image encryption strategies that operate with expanded flexibility and security.
Downloads
References
Liu, Y., et al., Chosen-plaintext attack of an image encryption scheme based on modified permutation–diffusion structure. Nonlinear dynamics, 2016. 84(4): p. 2241-2250.
Padate, R. and A. Patel, Image encryption and decryption using AES algorithm. International Journal of Electronics and Communication Engineering & Technology, 2015: p. 23-29.
Mohammad, O.F., et al., A survey and analysis of the image encryption methods. International Journal of Applied Engineering Research, 2017. 12(23): p. 13265-13280.
Chen, X.-D., et al., Asymmetric encryption of multi-image based on compressed sensing and feature fusion with high quality image reconstruction. Optics & Laser Technology, 2018. 107: p. 302-312.
Chen, T., et al., Image encryption and compression based on kronecker compressed sensing and elementary cellular automata scrambling. Optics & Laser Technology, 2016. 84: p. 118-133.
Enayatifar, R., F.G. Guimarães, and P. Siarry, Index-based permutation-diffusion in multiple-image encryption using DNA sequence. Optics and Lasers in Engineering, 2019. 115: p. 131-140.
Chai, X., et al., A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Processing, 2019. 155: p. 44-62.
Wu, J., X. Liao, and B. Yang, Image encryption using 2D Hénon-Sine map and DNA approach. Signal Processing, 2018. 153: p. 11-23.
Wu, G.-C., et al., New variable-order fractional chaotic systems for fast image encryption. Chaos: An Interdisciplinary Journal of Nonlinear Science, 2019. 29(8): p. 083103.
Afifi, A., A chaotic confusion-diffusion image encryption based on Henon map. International Journal of Network Security & Applications (IJNSA) Vol, 2019. 11.
Mani, P., et al., Adaptive control for fractional order induced chaotic fuzzy cellular neural networks and its application to image encryption. Information Sciences, 2019. 491: p. 74-89.
Chen, L., et al., Chaos in fractional-order discrete neural networks with application to image encryption. Neural Networks, 2020. 125: p. 174-184.
Chen, L., et al., Double color image encryption based on fractional order discrete improved Henon map and Rubik’s cube transform. Signal Processing: Image Communication, 2021. 97: p. 116363.
Deng, S., et al., Analysis and improvement of a hash-based image encryption algorithm. Communications in Nonlinear Science and Numerical Simulation, 2011. 16(8): p. 3269-3278.
Zhu, Z.-l., et al., A chaos-based symmetric image encryption scheme using a bit-level permutation. Information Sciences, 2011. 181(6): p. 1171-1186.
Seyedzadeh, S.M. and S. Mirzakuchaki, A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal processing, 2012. 92(5): p. 1202-1215.
Khan, M. and T. Shah, A literature review on image encryption techniques. 3D Research, 2014. 5(4): p. 1-25.
Wang, X., L. Feng, and H. Zhao, Fast image encryption algorithm based on parallel computing system. Information Sciences, 2019. 486: p. 340-358.
Hua, Z. and Y. Zhou, Exponential chaotic model for generating robust chaos. IEEE transactions on systems, man, and cybernetics: systems, 2019. 51(6): p. 3713-3724.
Xiong, Z., et al., Color image chaos encryption algorithm combining CRC and nine palace map. Multimedia Tools and Applications, 2019. 78(22): p. 31035-31055.
Strogatz, S.H., Nonlinear dynamics and chaos with student solutions manual: With applications to physics, biology, chemistry, and engineering. 2018: CRC press.
Niyat, A.Y., M.H. Moattar, and M.N. Torshiz, Color image encryption based on hybrid hyper-chaotic system and cellular automata. Optics and Lasers in Engineering, 2017. 90: p. 225-237.
Yamada, Y., M. Iwamura, and K. Kise, Deep pyramidal residual networks with separated stochastic depth. arXiv preprint arXiv:1612.01230, 2016.
Chai, X., Y. Chen, and L. Broyde, A novel chaos-based image encryption algorithm using DNA sequence operations. Optics and Lasers in engineering, 2017. 88: p. 197-213.
Lu, Q., C. Zhu, and X. Deng, An efficient image encryption scheme based on the LSS chaotic map and single S-box. IEEE Access, 2020. 8: p. 25664-25678.
Akkasaligar, P.T. and S. Biradar, Selective medical image encryption using DNA cryptography. Information Security Journal: A Global Perspective, 2020. 29(2): p. 91-101.
Liu, Y., et al., Optical image encryption algorithm based on hyper-chaos and public-key cryptography. Optics & Laser Technology, 2020. 127: p. 106171.
Liu, L., Z. Zhang, and R. Chen, Cryptanalysis and improvement in a plaintext-related image encryption scheme based on hyper chaos. IEEE Access, 2019. 7: p. 126450-126463.
Pawar, H.R. and D.G. Harkut. Classical and quantum cryptography for image encryption & decryption. in 2018 International Conference on Research in Intelligent and Computing in Engineering (RICE). 2018. IEEE.
Ilayaraja, M., K. Shankar, and G. Devika, A modified symmetric key cryptography method for secure data transmission. International Journal of Pure and Applied Mathematics, 2017. 116(10): p. 301-308.
Shepherd-Barron, N.I., Some effectivity questions for plane Cremona transformations in the context of symmetric key cryptography. Proceedings of the Edinburgh Mathematical Society, 2021. 64(1): p. 1-28.
Sakurai, K., T. Nishide, and A. Syalim. Improved proxy re-encryption scheme for symmetric key cryptography. in 2017 International Workshop on Big Data and Information Security (IWBIS). 2017. IEEE.
Sen, A., A. Ghosh, and A. Nath. Bit level symmetric key cryptography using genetic algorithm. in 2017 7th International Conference on Communication Systems and Network Technologies (CSNT). 2017. IEEE.
Khan, S.A., H. Fakhruddin, and H.H. Rizvi, Security Enhancing by using ASCII Values and Substitution Technique for Symmetric Key Cryptography. Indian Journal of Science and Technology, 2017. 10(36).
Dijesh, P., S. Babu, and Y. Vijayalakshmi, Enhancement of e-commerce security through asymmetric key algorithm. Computer Communications, 2020. 153: p. 125-134.
Kaur, A., A Review on Symmetric Key Cryptography Algorithms. International Journal of Advanced Research in Computer Science, 2017. 8(4).
Zhang, J., et al. Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes. in IACR International Conference on Public-Key Cryptography. 2020. Springer.
Nirala, R.K. and M.D. Ansari. Performance evaluation of loss packet percentage for asymmetric key cryptography in VANET. in 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC). 2018. IEEE.
Geetha, S., et al., A literature review on image encryption techniques. International Journal of Information Security and Privacy (IJISP), 2018. 12(3): p. 42-83.
Yousif, S.F. Grayscale image confusion and diffusion based on multiple chaotic maps. in 2018 1st International scientific conference of engineering sciences-3rd scientific conference of engineering science (ISCES). 2018. IEEE.
Kaur, M. and V. Kumar, A comprehensive review on image encryption techniques. Archives of Computational Methods in Engineering, 2020. 27(1): p. 15-43.
Li, X.-Z., W.-W. Chen, and Y.-Q. Wang, Quantum image compression-encryption scheme based on quantum discrete cosine transform. International Journal of Theoretical Physics, 2018. 57(9): p. 2904-2919.
Kamal, S.T., M.M. Darwish, and K.M. Hosny, Chaotic Maps for Image Encryption: An Assessment Study. Multimedia Security Using Chaotic Maps: Principles and Methodologies, 2020. 884: p. 27.
Chai, X., et al., An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Processing: Image Communication, 2017. 52: p. 6-19.
Sun, S., Chaotic image encryption scheme using two-by-two deoxyribonucleic acid complementary rules. Optical Engineering, 2017. 56(11): p. 116117.
Zhang, Y., The unified image encryption algorithm based on chaos and cubic S-Box. Information Sciences, 2018. 450: p. 361-377.
Younas, I. and M. Khan, A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy, 2018. 20(12): p. 913.
Wang, X., X. Zhu, and Y. Zhang, An image encryption algorithm based on Josephus traversing and mixed chaotic map. IEEE Access, 2018. 6: p. 23733-23746.
Shahna, K. and A. Mohamed. An image encryption method using Henon map and Josephus traversal. in International Conference on Innovations in Bio-Inspired Computing and Applications. 2018. Springer.
Dhall, S., S.K. Pal, and K. Sharma, A chaos-based probabilistic block cipher for image encryption. Journal of King Saud University-Computer and Information Sciences, 2018.
Sun, S., A novel hyperchaotic image encryption scheme based on DNA enencryption, pixel-level scrambling and bit-level scrambling. IEEE Imagenics Journal, 2018. 10(2): p. 1-14.
Zhang, X. and X. Wang, Multiple-image encryption algorithm based on DNA enencryption and chaotic system. Multimedia Tools and Applications, 2019. 78(6): p. 7841-7869.
Luo, Y., et al., An image encryption method based on elliptic curve elgamal encryption and chaotic systems. IEEE Access, 2019. 7: p. 38507-38522.
Tang, Z., et al., Image encryption with double spiral scans and chaotic maps. Security and Communication Networks, 2019. 2019.
Benlashram, A., et al. A novel approach of image encryption using pixel shuffling and 3D chaotic map. in Journal of Physics: Conference Series. 2020. IOP Publishing.
Ali, T.S. and R. Ali, A new chaos based color image encryption algorithm using permutation substitution and Boolean operation. Multimedia Tools and Applications, 2020. 79(27): p. 19853-19873.
Shahna, K. and A. Mohamed, A novel image encryption scheme using both pixel level and bit level permutation with chaotic map. Applied Soft Computing, 2020. 90: p. 106162.
Maryoosh, A.A., Z.S. Dhaif, and R.A. Mustafa, Image confusion and diffusion based on multi-chaotic system and mix-column. Bulletin of Electrical Engineering and Informatics, 2021. 10(4): p. 2100-2109.
Wang, X., S. Chen, and Y. Zhang, A chaotic image encryption algorithm based on random dynamic mixing. Optics & Laser Technology, 2021. 138: p. 106837.
Zhao, Y. and L. Liu, A Bit Shift Image Encryption Algorithm Based on Double Chaotic Systems. Entropy, 2021. 23(9): p. 1127.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Academic Journal of Nawroz University

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors retain copyright
The use of a Creative Commons License enables authors/editors to retain copyright to their work. Publications can be reused and redistributed as long as the original author is correctly attributed.
- Copyright
- The researcher(s), whether a single or joint research paper, must sell and transfer to the publisher (the Academic Journal of Nawroz University) through all the duration of the publication which starts from the date of entering this Agreement into force, the exclusive rights of the research paper/article. These rights include the translation, reuse of papers/articles, transmit or distribute, or use the material or parts(s) contained therein to be published in scientific, academic, technical, professional journals or any other periodicals including any other works derived from them, all over the world, in English and Arabic, whether in print or in electronic edition of such journals and periodicals in all types of media or formats now or that may exist in the future. Rights also include giving license (or granting permission) to a third party to use the materials and any other works derived from them and publish them in such journals and periodicals all over the world. Transfer right under this Agreement includes the right to modify such materials to be used with computer systems and software, or to reproduce or publish it in e-formats and also to incorporate them into retrieval systems.
- Reproduction, reference, transmission, distribution or any other use of the content, or any parts of the subjects included in that content in any manner permitted by this Agreement, must be accompanied by mentioning the source which is (the Academic Journal of Nawroz University) and the publisher in addition to the title of the article, the name of the author (or co-authors), journal’s name, volume or issue, publisher's copyright, and publication year.
- The Academic Journal of Nawroz University reserves all rights to publish research papers/articles issued under a “Creative Commons License (CC BY-NC-ND 4.0) which permits unrestricted use, distribution, and reproduction of the paper/article by any means, provided that the original work is correctly cited.
- Reservation of Rights
The researcher(s) preserves all intellectual property rights (except for the one transferred to the publisher under this Agreement).
- Researcher’s guarantee
The researcher(s) hereby guarantees that the content of the paper/article is original. It has been submitted only to the Academic Journal of Nawroz University and has not been previously published by any other party.
In the event that the paper/article is written jointly with other researchers, the researcher guarantees that he/she has informed the other co-authors about the terms of this agreement, as well as obtaining their signature or written permission to sign on their behalf.
The author further guarantees:
- The research paper/article does not contain any defamatory statements or illegal comments.
- The research paper/article does not violate other's rights (including but not limited to copyright, patent, and trademark rights).
This research paper/article does not contain any facts or instructions that could cause damages or harm to others, and publishing it does not lead to disclosure of any confidential information.