Académique Documents
Professionnel Documents
Culture Documents
Abstract --A tremendous growth has been viewed in the past few B. Symmetric Encryption
decades in the technological fields, the rise of growth on hand
also lead its path to the level of security endurance on those These can also be referred to as public key
data. As the information must be safeguarded in order to its protection mode, since the key's are the same that are used
path to prevent it from being leaked to the unauthorized for both encrypting and decrypting the data by both the
persons, the method used for hiding and un hiding the data are sender and the receiver, it is like a public key which leads to
referred as encrypting and decrypting the data. This encryption
less protection and easy to obtain the message from sender.
techniques has been applied in different types of data like text,
image, audio clips, videos etc., this paper presents an overview
C. Shared Secret Encryption
of the available image encryption techniques.
It is like a security password or key known only to
Keywords: Image Encryption, Decryption, Permutation,
Symmetric Key the required authorities, both the sender and the receiver have
own set of passwords to encrypt the data, this method also be
I. INTRODUCTION referred as PRE SHARED KEY. Under similar categories of
encryption models the image encryption algorithms are
The enormous development in technology requires categorized into three main models they are,
secured communication in open networks. Open networks are
highly vulnerable due to attackers present in between the Position Permutation Based Algorithm
communication channel. In order to secure the data and Value Transformation Based Algorithm
image, lot of image encryption methods are proposed by Position-substitution Based Algorithm
researchers. This paper describes the view of image
encryption and the different reviews on the types of image II. LITERATURE REVIEW
encryption.
M. Zeghid et al. [3] proposed a technique of image
A. Image Encryption encryption used for the digital data which uses Advanced
Encryption Standard (AES), along with an added key stream
Encryption is the process of converting a processed generator (A5/1, W7) to the AES to ensure improving the
set of data which has some secret message into an hidden encryption performance.
format known as encrypt which helps from hiding the data
from the masked people. There are different types of
encryption techniques algorithm which are used for packeting
the new data’s they are
Symmetric Encryption
Shared Secret Encryption
1
National Conference on Innovations And Emerging Technologies For Future Smart Cities-(NCIETFSC’17)
2
National Conference on Innovations And Emerging Technologies For Future Smart Cities-(NCIETFSC’17)
These p represent the 5 pixels each holding 8 bits. Bhaskar monadl, tarni mandal, [14] have presented a new
scheme of light weight encryption method where an plain
Level 3: each part of the image is repeated with the level 2 image is Re-arranged using a sequence .Techniques like
tasks. On the last session, the equation and the initial value of pseudo random number (PRN) and encrypted by Deoxyribo
the picture are used in terms of, Nucleic Acid (DNA) are used to generate the encrypted
image with lighter weight. Tow PRN are used in this
NewValue = round(Uik*255) *oldvalue.
process, the First PRN to re-arrange the images and the
Thus the method results in a high stability in areas of second one to generate random DNA sequence .In terms, the
common attacks. convey that, The number of rounds of re-arrangement and
encryption enriches their level of security.
A new optical interference-based multiple-image encryption
using spherical wave illumination and gyrator transform is Tariq Shah et al. [15] proposed a criterion to analyze the
proposed by Muhammad Rafiq Abuturab [12]. In this prevailing S-boxes and study their strengths and weaknesses
proposal, each secret color image is divided into normalized in order to determine their suitability in image encryption
red, green, and blue component images and independently applications. The proposed criterion uses the results from
encoded into corresponding phase-only component images. correlation analysis, entropy analysis, contrast analysis,
Then each phase-only component image of all the images are homogeneity analysis, energy analysis, and mean of absolute
combined together to produce a single-phase-only component deviation analysis. These analyses are applied to advanced
image as an input component image, which is bounded with a encryption standard (AES), affine-power-affine (APA), gray,
random phase mask to form a complex image. The two Lui J, residue prime, S8 AES, SKIPJACK, and Xyi Sboxes.
phase-only masks are analytically obtained from the inverse
Jun Li et al [16] presented an compressive encryption
Fourier transformation of the complex image. The host image
technique .By using an Double Random Phase Encoding
is chosen as the first phase-only mask, and the complex
(DRPE) method the image is led to a white sense stationary
image hidden in the host image is regarded as the second
noise patter, and the image is compressed and encrypted, the
phase-only mask. The spherical wave is generated to
decryption of the image can be done using a Three
simultaneously illuminate phase-only masks. Then two
constructed holograms and correct keys, they assume that this
modulated masks are gyrator transformed. The corresponding
method is effective and suitable for optical image security
transformed images are phase truncated to obtain encrypted
transmission in future encryption works.
images and amplitude truncated to construct decryption keys.
Amrane houas et al [17] proposed a new algorithm to
Ravi Prakash Dewangan and Chandrashekhar Kamargaonkar
encrypt binary images. Proposed method use some basic
[13] have proofed their thoughts that the pixels that are
steps to be followed, they are to reduce the amount of data,
obtained from an encrypted image can be represented into
that is need to present the image, image is split into blocks
combined performance of 1D,2D key that are used for
and represent them in new basis with obtaining a key image
encryption ,which leads to an faster encryption and redundant
and encrypted image. The decryption is done in terms of
brutal force attack. An image encryption can be done using
subtraction between each encrypted image and the key-
three methods they are pixels, blocks and permutation. All
image, then they are summed up at last to obtain the original
these three methods are been implemented in this approach,
one
the image is been separated into blocks, they undergo row
and column pixel permutation, the pixel permutation and III. CONCLUSION
block permutation are mostly similar in terms of working.
The Encrypted key for the image is been developed at the Nowadays, the security of digital images become more and
time interval of splitting up of blocks and the pixel more important since the communications of digital products
permutation, the decryption is done between the pixel over open network occur more and more frequently. In this
permutation and the block representation. paper, we have surveyed existing work on image encryption.
We also give general guide line about cryptography and the
3
National Conference on Innovations And Emerging Technologies For Future Smart Cities-(NCIETFSC’17)
different type of encryption algorithm and their charts and [9] S. M. Seyedzade, S. Mirzakuchaki and R. E. Atani, "A novel image
encryption algorithm based on hash function," 2010 6th Iranian Conference
also reviewed on the symmetric and secret key encryption
on Machine Vision and Image Processing, Isfahan, 2010, pp. 1-6.
methods. We conclude that all techniques are useful for real-
time image encryption. Techniques describes in this paper [10] Ibrahim S I Abuhaiba, Maaly A S Hassan, "Image Encryption
that can provide security functions and an overall visual Using Differential Evolution Approach In Frequency Domain", Signal &
Image Processing : An International Journal(SIPIJ) Vol.2, No.1, March
check, which might be suitable in some applications. So no
2011, pp.51-69
one can access image which transferring on open network.
[11] Rasul Enayatifar, Abdul Hanan Abdullah, "Image Security via
In general, a well-studied, fast and secure common image Genetic Algorithm", 2011 International Conference on Computer and
encryption should be developed. Surely our method would Software Modeling, pp.198-203
provide high level security for image transfer. [12] Muhammad Rafiq Abuturab, "Optical interference-based
multiple-image encryption using spherical wave illumination and gyrator
REFERENCES transform," Appl. Opt. 53, 6719-6728 (2014)
[1] D. I. G. Amalarethinam and J. S. Geetha, "Image encryption and [13] Ravi Prakash Dewangan, Chandrashekhar Kamargaonkar "Image
decryption in public key cryptography based on MR," International Encryption using Random Permutation by Different Key Size", International
Conference on Computing and Communications Technologies (ICCCT), Journal of Science, Engineering and Technology Research (IJSETR),
Chennai, 2015, pp. 133-138. Volume 4, Issue 10, October 2015, pp.3531-3535
[2] Gustavus J. Simmons, “Symmetric and Asymmetric Encryption”, [14]Mondal, B., Mandal, T., “A light weight secure image encryption
Computing Surveys, Vol. 11, No. 4, December 1979, pp.305-330 scheme based on chaos & DNA computing” , Journal of King Saud
University – Computer and Information Sciences (2016),
[3] M. Zeghid, M. Machhout, L. Khriji, A. Baganne, and R. Tourki, "A http://dx.doi.org/10.1016/j.jksuci.2016.02.003
Modified AES Based Algorithm for Image Encryption", International
Journal of Computer, Electrical, Automation, Control and Information [15] Tariq Shah, Iqtadar Hussain, Muhammad Asif Gondal and Hasan
Engineering Vol:1, No:3, 2007, pp.745 - 750 Mahmood, "Statistical analysis of S-box in image encryption applications
based on majority logic criterion", International Journal of the Physical
[4] Mohammad Ali Bani Younes, Aman Jantan, "An Image Encryption Sciences Vol. 6(16), pp. 4110-4127, 18 August, 2011, pp.4110-4127
Approach Using a Combination of Permutation Technique Followed by
Encryption", IJCSNS International Journal of Computer Science and
Network Security, VOL.8 No.4, April 2008, pp.191 - 197 [16] Jun Li, Jiao Sheng Li, Yang Yang Pan, Rong Li, "Compressive Optical
Image Encryption", www.nature.com/scientificreports, pp.1-10
[5] Bibhudendra Acharya, Saroj Kumar Panigrahy, Sarat Kumar
Patra,Ganapati Panda, "Image Encryption Using Advanced Hill Cipher [17] Amrane Houas, Zouhir Mokhtari, Kamal Eddine Melkemi,
Algorithm", International Journal of Recent Trends in Engineering, Vol. 1, Abdelmalik Boussaad, "A novel binary image encryption algorithm based on
No. 1, May 2009, pp.663-667 diffuse representation", Engineering Science and Technology, an
International Journal 19 (2016), pp.1887–1894.
[6] Sesha Pallavi Indrakanti, P.S.Avadhani, "Permutation based Image
Encryption Technique", International Journal of Computer Applications
(0975 – 8887), Volume 28– No.8, August 2011, pp.45-47
[7] ZHANG Yun-peng, ZHAI Zheng-jun,LIU Wei, NIE Xuan, CAO Shui-
ping, DAI Wei-di, "Digital Image Encryption Algorithm Based on Chaos
and Improved DES", Proceedings of the 2009 IEEE International Conference
on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009,
pp.480-485