Various Digital Image Encryption Techniques

1819 Words4 Pages

[1]. Image Encryption Using Affine Transform and XOR Operation (2011)
In this paper, Amitava Nag, Jyoti Prakash Singh, Srabani Khan, Sushanta Biswas, D. Sarkar and Partha Pratim Sarkar have imparted an approach, which employs 64 bits key in the encryption. First, the recommended technique operates the affine transformation to dispel the pixels by applying four sub keys of 8 bits. Thereafter, the algorithm cleaves the image into 2*2 pixel block size, and afterward, applies an XOR operation on each block with four sub key of 8 bits to modify the pixel values. The consequences disclose that the presented algorithm is effective to reduce the correlation between pixels, in addition, provides the feasible security level to images.

[2]. A New Chaotic System for Image Encryption (2012)
In this paper, Long Bao and Yicong Zhou have imparted a new chaotic system that constitutes the three distinct one dimensional chaotic maps [2]. The proposed technique employs the Logistic map as a controller to choose the Tent map or a Sine map to generate random sequences [2]. Thereafter, the proposed system applies the substitution-permutation network (SPN) structure to obtain the confusion and diffusion property [2] [15]. This technique uses 240 bits size key to large key space. Mainly, this key holds all parameter settings and initial values of the new chaotic system along with high sensitivity in key changes for encryption and decryption. Consequently, the proposed system provides the excellent security against the brute force attack as well as high key sensitivity and chaotic behavior.

[3]. A Novel Digital Image Encryption Method Based on One-dimensional Random Scrambling (2012)
In this paper, Qiudong Sun, Ping Guan, Yongping and Yunfeng Xue have ...

... middle of paper ...

...9] http://en.wikipedia.org/wiki/Histogram,
[20] Karl Pearson(1895), "Contributions to the Mathematical Theory of Evolution II, Skew Variation in Homogeneous Material". Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 186: 343–414.
[21] Xu Shujiang Wang Yinglong, Guo Yucui Wang Cong, “A Novel Chaos-based Image Encryption Scheme”, International Conference on Information Engineering and Computer Science (ICIECS) 2009, 19-20 Dec. 2009, pages: 1- 4.
[22] http://www.waset.org/journals/waset/v3/v3-7.pdf Analysis and Comparison of Image Encryption Algorithms by Ismet Öztürk and Ibrahim Soukpinar.
[23] Abhinav Srivastava, “A survey report on Different Techniques of Image Encryption”, International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 6, June 2012, pages: 163-167.

Open Document