Image Encryption Using Different Techniques: A Review

In present times, the protection of multimedia data is becoming very important. The protection of this multimedia data can be done with encryption. There are so many different techniques should be used to protect confidential image data from unauthorized access. In this paper, we survey on existing work which is used different techniques for image encryption and we also give general introduction about cryptography. Keywords— Asymmetric key cryptography, Decryption, Encryption, Image encryption, Symmetric key

[1]  N. Bourbakis,et al.  Lossless image compression and encryption using SCAN , 2001, Pattern Recognit..

[2]  Aloka Sinha,et al.  A technique for image encryption using digital signature , 2003 .

[3]  Rached Tourki,et al.  A Modified AES Based Algorithm for Image Encryption , 2007 .

[4]  Aman Jantan,et al.  Image Encryption Using Block-Based Transformation Algorithm , 2008 .

[5]  A. Jantan,et al.  An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption , 2008 .

[6]  Wei Liu,et al.  Digital image encryption algorithm based on chaos and improved DES , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.

[7]  Ganapati Panda,et al.  Image Encryption Using Advanced Hill Cipher Algorithm , 2009 .

[8]  Mohsen Rahmani,et al.  A new modified version of Advanced Encryption Standard based algorithm for image encryption , 2010, 2010 International Conference on Electronics and Information Engineering.

[9]  Ismail Amr Ismail,et al.  A Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps , 2010, Int. J. Netw. Secur..

[10]  Tariq Shah,et al.  Statistical analysis of S-box in image encryption applications based on majority logic criterion , 2011 .

[11]  Qais H. Alsafasfeh,et al.  Image Encryption Based on the General Approach for Multiple Chaotic Systems , 2011, J. Signal Inf. Process..

[12]  Qais Alsafasfeh Image Encryption Based on the General Approach for Multiple Chaotic Systems , 2011 .

[13]  Kuldeep Singh,et al.  Image Encryption using Chaotic Maps and DNA Addition Operation and Noise Effects on it , 2011 .

[14]  P. S. Avadhani,et al.  Permutation based Image Encryption Technique , 2011 .

[15]  Abdul Hanan Abdullah,et al.  Image Security via Genetic Algorithm , 2011 .