A Review on Various Digital Image Encryption Techniques and Security Criteria

mages excessively contribute to communication in this era of multimedia. When a user transfers images over an unsecured communication network, then the absolute protection is a challenging issue to conserve the confidentiality of images. Encryption is a method of retaining the secrecy of images. This paper provides the succinct introduction to the cryptography, moreover, includes a concise description of various elemental securities' criteria of the image encryption algorithms. This work presents the survey of diverse image encryption techniques and comparison of discrete image encoding approaches, at last discloses a conclusion and suggests future works. General Terms Image security, image encryption, image processing. Keywordsncrypted image; histogram; image, image encryption; image security parameters; permutation and substitution; scrambling, XOR operation.

[1]  K. Pearson Contributions to the Mathematical Theory of Evolution. II. Skew Variation in Homogeneous Material , 1895 .

[2]  Yucui Guo,et al.  A Novel Chaos-Based Image Encryption Scheme , 2009, 2009 International Conference on Information Engineering and Computer Science.

[3]  Mohammed Abbas,et al.  A Novel Encryption Method for Image Security , 2012 .

[4]  Karamjeet Singh,et al.  IMAGE ENCRYPTION AND DECRYPTION USING BLOWFISH ALGORITHM IN MATLAB , 2013 .

[5]  V. R. Udupi,et al.  A novel neural network approach for digital image data encryption/decryption , 2012, 2012 International Conference on Power, Signals, Controls and Computation.

[6]  Manoj Kumar Singh,et al.  Unified Approach with Neural Network for Authentication, Security and Compression of Image: UNICAP , 2012 .

[7]  Yosua Alberth Sir,et al.  Digital Color Image Encryption using RC4 Stream Cipher and Chaotic Logistic Map , 2013 .

[8]  Hazem Mohammad Al-Najjar Digital Image Encryption Algorithm Based on Multi-Dimensional Chaotic System and Pixels Location , 2012 .

[9]  Aamna Patel,et al.  Image encryption and decryption using blowfish algorithm , 2012 .

[10]  Amandeep Kaur,et al.  GS-IES : An Advanced Image Encryption Scheme , 2013 .

[11]  Shujiang Xu,et al.  A fast image encryption scheme based on a nonlinear chaotic map , 2010, 2010 2nd International Conference on Signal Processing Systems.

[12]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[13]  A. Nag,et al.  Image encryption using affine transform and XOR operation , 2011, 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies.

[14]  N. Rajpal,et al.  A two layer chaotic network based image encryption technique , 2012, 2012 NATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION SYSTEMS.

[15]  A. Goel,et al.  A Technique for Image Encryption Based on Explosive n*n Block Displacement Followed by Inter-pixel Displacement of RGB Attribute of a Pixel , 2012, 2012 International Conference on Communication Systems and Network Technologies.

[16]  S. Dey SD-AEI: An advanced encryption technique for images , 2012, 2012 Second International Conference on Digital Information Processing and Communications (ICDIPC).

[17]  Abhinav Srivastava A survey report on Different Techniques of Image Encryption , 2012 .

[18]  Jean-Yves Chouinard,et al.  A Secure Image Encryption Algorithm Based on Rubik's Cube Principle , 2012, J. Electr. Comput. Eng..

[19]  X. Liao,et al.  An image encryption approach based on chaotic maps , 2005 .

[20]  Ping Guan,et al.  A novel digital image encryption method based on one-dimensional random scrambling , 2012, 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery.

[21]  Yicong Zhou,et al.  A new chaotic system for image encryption , 2012, 2012 International Conference on System Science and Engineering (ICSSE).