A survey on Symmetric and Asymmetric Key based Image Encryption

Image Encryption is a technique where an algorithm along with a set of characters called key encrypts the data into cipher text. The cipher text can be converted back into plaintext by decryption. This technique is employed for the security of data such that confidentiality, integrity and authenticity of data is maintained. In today's era security of information has become a crucial task, unauthorized access and use of data has become a noticeable issue. To provide the security required, there are several algorithms to suit the purposes. While the use and transferring of images has become easy and faster due to technological advancements especially wireless sensor network, image destruction and illegitimate use has become a potential threat. Different transfer mediums and various uses of images require different and appropriately suiting encryption approaches. Hence, in this paper we discuss the types of image encryption techniques. We have also discussed several encryption algorithms, their advantages and suitability.

[1]  Xianjin Fang,et al.  Investigation into the elliptic curve cryptography , 2017, 2017 3rd International Conference on Information Management (ICIM).

[2]  Dolendro Singh Laiphrakpam,et al.  Medical image encryption based on improved ElGamal encryption technique , 2017 .

[3]  Hui Liu,et al.  Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map , 2013, IET Inf. Secur..

[4]  Rozmie R. Othman,et al.  A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher , 2017, J. King Saud Univ. Comput. Inf. Sci..

[5]  Ahmad Abusukhon,et al.  A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm , 2019, Journal of Discrete Mathematical Sciences and Cryptography.

[6]  Jongan Park,et al.  The improved data encryption standard (DES) algorithm , 1996, Proceedings of ISSSTA'95 International Symposium on Spread Spectrum Techniques and Applications.

[7]  Teng Zhang,et al.  A study of DES and Blowfish encryption algorithm , 2009, TENCON 2009 - 2009 IEEE Region 10 Conference.

[8]  Shraphalya B. Nalawade,et al.  Design and implementation of blowfish algorithm using reconfigurable platform , 2017, 2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE).

[9]  VS Prajwal,et al.  User Defined Encryption Procedure For IDEA Algorithm , 2018, 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[10]  Amandeep Singh,et al.  Image Encryption and Analysis using Dynamic AES , 2019, 2019 5th International Conference on Optimization and Applications (ICOA).

[11]  A. K. Gupta,et al.  Implementation of speech encryption and decryption using advanced encryption standard , 2016, 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).

[12]  Xuesong Wang,et al.  Digital Image Encryption Algorithm Based on Elliptic Curve Public Cryptosystem , 2018, IEEE Access.

[13]  Rached Tourki,et al.  A Modified AES Based Algorithm for Image Encryption , 2007 .

[14]  M Ganavi,et al.  A Secure Data Transmission using Modified RSA and Random Pixel Replacement Steganography , 2018, 2018 International Conference on Current Trends towards Converging Technologies (ICCTCT).

[15]  Karamjeet Singh,et al.  IMAGE ENCRYPTION AND DECRYPTION USING BLOWFISH ALGORITHM IN MATLAB , 2013 .

[16]  Wei Liu,et al.  Digital image encryption algorithm based on chaos and improved DES , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.

[17]  Jianping Li,et al.  Chaos-Based color image encryption and compression scheme using DNA complementary rule and Chinese remainder theorem , 2016, 2016 13th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP).

[18]  Shailender Gupta,et al.  A Survey of Image Encryption Algorithms , 2017 .

[19]  Qiu Shui-sheng,et al.  A new image encryption scheme based on DES algorithm and Chua's circuit , 2009, 2009 IEEE International Workshop on Imaging Systems and Techniques.

[20]  Zhibiao Jiang,et al.  A closed-form robust Chinese remainder theorem Based multibaseline phase unwrapping , 2017, 2017 International Conference on Circuits, Devices and Systems (ICCDS).

[21]  Vimal Bhatia,et al.  Optical Image Encryption using Fringe Projection Profilometry, Fourier Fringe Analysis, and RSA Algorithm , 2017, 2017 14th IEEE India Council International Conference (INDICON).

[22]  Ankit Garg,et al.  A Review on Various Digital Image Encryption Techniques and Security Criteria , 2014 .

[23]  Bhaskar Mondal,et al.  A Secure Image Encryption Algorithm Using LFSR and RC4 Key Stream Generator , 2016 .