Payback of Image Encryption Techniques: A Quantitative Investigation

Recently, it is one of the concerns to protect multimedia applications with storage of images being an important security issue. The process used to encrypt data and protect these multimedia applications is encryption. Present cryptography provides crucial techniques in order to secure information and these encryption techniques are utilized for protection of private data from the unauthorized user. In this paper, literature reviews based mostly upon numerous secret writing techniques are explained and also the poll taker are going to be ready to get a plan for competent technique to be used.

[1]  Amarjeet Poonia,et al.  Performance analysis of Gabor 2D PCA feature extraction for gender identification using face , 2017, 2017 2nd International Conference on Telecommunication and Networks (TEL-NET).

[2]  Bibhudendra Acharya,et al.  Image Encryption Using Self-Invertible Key Matrix of Hill Cipher Algorithm , 2008 .

[3]  S Rakesh,et al.  Image Encryption using Block Based Uniform Scrambling and Chaotic Logistic Mapping , 2012 .

[4]  Qu Wang,et al.  Double image encryption based on phase-amplitude hybrid encoding and iterative phase encoding in fractional Fourier transform domains , 2013 .

[5]  A. K. Gulve,et al.  A Comparative Performance Analysis of an Image Encryption Technique using Extended Hill Cipher , 2014 .

[6]  Nikolaos G. Bourbakis,et al.  Picture data encryption using scan patterns , 1992, Pattern Recognit..

[7]  Neha Singla,et al.  Image Encryption Using Block-Based Transformation Algorithm , 2014 .

[8]  N. Sethi,et al.  Comparative Image Encryption Method Analysis Using New Transformed - Mapped Technique , 2013 .

[9]  Nikolaos G. Bourbakis,et al.  Image encryption method using a class of fractals , 1995, J. Electronic Imaging.

[10]  Nanrun Zhou,et al.  Color Image Encryption Algorithm Combining Compressive Sensing with Arnold Transform , 2013, J. Comput..

[11]  Manish Mishra,et al.  Image encryption technique based on chaotic system and hash function , 2014, Proceedings of IEEE International Conference on Computer Communication and Systems ICCCS14.

[12]  Savina Bansal,et al.  Steganography and classification of image steganography techniques , 2014, 2014 International Conference on Computing for Sustainable Global Development (INDIACom).

[13]  Mohamed M. Fouad,et al.  Securing Image Transmission Using In- Compression Encryption Technique , 2010 .

[14]  Xingyuan Wang,et al.  A color image encryption with heterogeneous bit-permutation and correlated chaos , 2015 .

[15]  Andreas Uhl,et al.  SELECTIVE BITPLANE ENCRYPTION FOR SECURE TRANSMISSION OF IMAGE DATA IN MOBILE ENVIRONMENTS , 2002 .

[16]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[17]  C. K. Huang,et al.  Hybrid image encryption using multi-chaos-system , 2009, 2009 7th International Conference on Information, Communications and Signal Processing (ICICS).

[18]  Xiaoyan Wang,et al.  Image Encryption Algorithm Based on a Novel Improper Fractional-Order Attractor and a Wavelet Function Map , 2017, J. Electr. Comput. Eng..

[19]  S. Agaian,et al.  NPCR and UACI Randomness Tests for Image Encryption , 2011 .

[20]  Behrouz A. Forouzan,et al.  Cryptography and network security , 1998 .

[21]  Komal Patel,et al.  Image Encryption Using Different Techniques: A Review , 2011 .

[22]  Lin Teng,et al.  A novel colour image encryption algorithm based on chaos , 2012, Signal Process..

[23]  Marc Van Droogenbroeck,et al.  Techniques for a selective encryption of uncompressed and compressed images , 2002 .

[24]  M. A. Mokhtar,et al.  Design of image encryption algorithm based on different chaotic mapping , 2017, 2017 34th National Radio Science Conference (NRSC).

[25]  Aman Jantan,et al.  Image Encryption Using Block-Based Transformation Algorithm , 2008 .

[26]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[27]  Josef Scharinger Fast encryption of image data using chaotic Kolmogorov flows , 1998, J. Electronic Imaging.

[28]  Jian Zhang,et al.  Image Encryption Algorithm Based on DNA Encoding and Chaotic Maps , 2014 .

[29]  P. S. Avadhani,et al.  Permutation based Image Encryption Technique , 2011 .

[30]  Charles Schwartz A New Graphical Method for Encryption of Computer Data , 1991, Cryptologia.

[31]  Quist-Aphetsi Kester,et al.  A cryptographic Image Encryption technique based on the RGB PIXEL shuffling , 2013 .