A Review of Color Image Encryption Techniques

Himani Agrawal*, Monisha Sharma**
* Reader in E&TC Department, SSCET, Bhilai, India.
** Professor in E&TC Department, SSCET, Bhilai, India.
Periodicity:January - March'2011
DOI : https://doi.org/10.26634/jse.5.3.1379

Abstract

With the fast progression of data exchange in electronic way, information security is becoming more important in data storage and transmission. Encryption is one way to ensure good security. Image encryption has applications in Internet communication, multimedia systems, medical imaging, telemedicine, and military communication. This paper surveys various encryption techniques for color images and then tries to suggest some points to improve the color image encryption techniques.

Keywords

Color Image, Encryption, Decryption, Cryptography, Cryptosystem.

How to Cite this Article?

Himani Agrawal and Monisha Sharma (2011). A Review of Color Image Encryption Techniques. i-manager’s Journal on Software Engineering, 5(3),. 1-15. https://doi.org/10.26634/jse.5.3.1379

References

[1]. Kuo, C.J., & Chen, M.S. (1991). A New Signal Encryption Technique And Its Attack Study. IEEE proceedings, 149-153.
[2]. AI-Jabri, A.K., & Al-Asmari, A.K. (1996). Secure Progressive Transmission of Compressed Images. IEEE Transactions on Consumer Electronics, 42(3), 504 – 512.
[3]. Gluckstad, J., Mogensen, P. C., Toyoda, H., & Hara, T. (1999). Binary phase image encryption method. IEEE proceedings, 1314-1315.
[4]. Li, S., & Zheng, X. (2002). On the Security of an Image Encryption Method. IEEE International Conference on Image Processing, 2, 925-928.
[5]. Shin, C.M., Seo, D.H., Cho, K., Lee, H., & Kim, S.(2003). Multilevel Image Encryption By Binary Phase Xor Operations. IEEE proceedings, 426-426.
[6]. Chang, Y. C., Chang, H.T., & Kuo, C.J. (2003). Optical Image Encryption Based on Dyadic Phase Permutation in Fourier Domain. IEEE proceedings, 93-93.
[7]. Ziedan, I.E., Fouad, M.M., & Salem, D.H. (2003). Application of Data Encryption Standard to Bitmap and JPEG Images. 20th National Radio Science Conference, C16 1- C16 8. 
[8]. Zhang, B., & Kahn, M. (2004). Simulation of optical XOR encryption using MATLAB. IEEE AFRICON, 995 – 1000.
[9]. Huang, C.K., Hsu, Y.H., Chen, W.Y., Changchien, S.K., Hung, C.M., Liu, C.H., & Tian, Y.R. (2009). Image encryption algorithm of double scrambling based on ASCII code of Matrix element. ICICS.
[10]. Lukac, R., & Plataniotis, K.N. (2004). A Color Image Secret Sharing Scheme Satisfying the Perfect Reconstruction Property. IEEE 6th workshop on Multimedia Digital Processing. 351-354.
[11]. Lukac R., & Plataniotis K.N. (2004). Colour image secret sharing. Electronics Letters , 40(9).
[12]. Öztürk, S., & Sogukpinar, I. (2005). Analysis and Comparison of Image Encryption Algorithms. World Academy of Science, Engineering and Technology,3, 26- 30.
[13]. Martin, K., Lukac, R., & Plataniotis, K.N. (2005). Efficient Encryption of Compressed Color Image, IEEE ISIE, 1245-1250.
[14]. El- Khamy, S.E., Lotfy, M., & Ali, A.H. (2005). A new fuzzy pn codes based color image encryption technique. IEEE proceedings.
[15]. Said, A. (2005). Measuring The Strength of Partial Encryption Schemes. IEEE proceedings.
[16]. Gopinathan, U., Monaghan, D.S., Naughton, T.J., Sheridan, J.T., & Javidi, B. (2005). Strengths & weaknesses of optical encryption Algorithms. IEEE proceedings, 951- 952.
[17]. Amador, J.J., & Green R.W. (2005). Symmetric-key block cipher for image and text cr yptography. International Journal of Imaging systems and Technology, 15(3), 178-188.
[18]. Sudharsanan, S. (2005). Shared Key Encryption of JPEG Color Images. IEEE Transactions on Consumer Electronics, 51(4), 1204 -1211.
[19]. Alvarez, G., Hernandez, A., Hernandez, L., Mari'n, A., & Rodriguez, G. (2005). A New Graphic Cryptosystem Based On One-Dimensional Memory Cellular Automata. IEEE proceedings.
[20]. Chen, R.J., Lu, W.K., & Lai, J.L. (2005). Image Encr yption Using Progressive Cellular Automata Substitution and SCAN. IEEE proceedings. 1690-1693.
[21]. Grangetto, M., Magli, E., & Olmo, G. (2006). Multimedia Selective Encr yption by Means of Randomised Arithmetic Coding. IEEE Transactions On Multimedia, 8(5), 905-917.
[22]. Ravishankar, K.C., & Venkateshmurthy, M.G. (2006). Region Based Selective Image Encr yption. IEEE Proceedings, 1-6.
[23]. Huang, Q., & Liu, J. (2006). Secure Image Encryption Technique Based on Multiple Fresnel Diffraction Transforms. ICWMMN Proceedings.
[24]. Chen, C.S., & Chen R.J. (2006). Image Encryption and Decryption Using Scan Methodology. Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, 61-66.
[25]. Chen, R.J., Chen Y.H., Chen C.S., & Lai, J.L. (2006). Image Encryption/Decryption System Using 2-D Cellular Automata. IEEE proceedings, 2006.
[26]. Vilardy, J.M., Calderon, J.E., Torres, C.O., & Mattos, L. (2006). Digital Images Phase Encryption using Fractional Fourier Transform. Proceedings of the Electronics, Robotics and Automotive Mechanics Conference.
[27]. Wong, A., & Bishop, W. (2006). Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in Scanned Documents for Digital Image Encryption. Proceedings of the 3rd Canadian Conference on Computer and Robot Vision.
[28]. Chen, B., & Chandran, V. (2007). Biometric Based Cryptographic Key Generation from Faces. Digital Image Computing Techniques and Applications. 394-401, 2007.
[29]. Kingston, A., Colosimo, S., Campisi, P., & Autrusseau, F. (2007). Lossless Image Compression And Selective Encryption Using A Discrete Radon Transform. ICIP, IV 465- IV 468.
[30]. Benabdellah, M., Himmi, M. M., Zahid, N., Regragui, F., & Bouyakhf, E.H. (2007). Encryption-Compression of Images Based on FMT and AES Algorithm. Applied Mathematical Sciences, Vol. 1(45), 2203 – 2219.
[31]. Jagannathan, V., Mahadevan A., Hariharan R., & Srinivasan E. (2007). Number Theory Based Image Compression Encryption and Application to Image Multiplexing. IEEE - ICSCN, 59 – 64.
[32]. Sawda, R.E., & Hamam, H. (2007). RGB Colored Image Encryption Processes Using Several Colored Keys Images. IEEE proceedings.
[33]. Zeghid, M., Machhout, M., Khriji, L., Baganne, A., & Tourki, R. (2007). A Modified AES Based Algorithm for Image Encr yption. World Academy of Science, Engineering and Technology, 27, 206-211.
[34]. Yu, F., Luo, H., Pan, J.S., & Lu, Z.M. (2008). Lossless and Lossy Image Secret Sharing for Data Transmission. Eighth International Conference on Intelligent Systems Design and Applications, 209-214.
[35]. Longe, O.B., Robert, A.B.C., Chiemeke, S. C., Onifade, O.F.W., Okpalugo, C., & Olaseni, T. (2008). Cascaded Encryption Scheme (CES) for Robust Content Security Over Internet Networks. World Congress on Engineering, 3.
[36]. Yadav, A.K., & Purwar, R.K. (2008). Complexity Analysis of Image Encr yption Technique. IEEE proceedings.
[37]. Zhang, Z., Liu, G., Gao, Y., Hu, X., & Wang, S. (2008). A 3-D Encryption Technique Using Computer-Generated Hologram. International Conference on Embedded Software and Systems Symposia, 3-6.
[38]. Li, X., Wu, X., Qi, N., & Wang, K. (2008). A Novel Cr yptographic Algorithm based on Iris Feature. International Conference on Computational Intelligence and Security, 463-466.
[39]. Wu, X., Qi, N., Wang, K., & Zhang, D. (2008). A Novel Cryptosystem based on Iris Key Generation. Fourth International Conference on Natural Computation, 53- 56.
[40]. El-Iskandarani, M. A., Darwish, S., & Abuguba, S.M. (2008). A Robust and Secure Scheme for Image Transmission Over Wireless Channels. IEEE proceedings, 51-55.
[41]. Kulkarni, N.S., Gupta, I., & Kulkarni, S.N. (2008). A Robust Image Encryption Technique based on Random Vector. First International Conference on Emerging Trends in Engineering and Technology, 15-19.
[42]. Ihao, S. (2008). A secure and efficient fingerprint images encryption scheme. IEEE proceedings.
[43]. Al-khassaweneh, M., & Aviyente, S. (2008). Image Encryption Scheme Based on Using Least Square Approximation Techniques. IEEE proceedings, 108-111.
[44]. Rhee, K.M. (2008). Image Encryption Using Self Regressive Function. Fourth International Conference on Networked Computing and Advanced Information Management, 442 – 445.
[45]. Wharton, E., Panetta, K., & Agaian, S. (2008). Simultaneous Encryption/Compression of Images Using Alpha Rooting. Data Compression Conference, IEEE proceedings.
[46]. Ali, S., Gilani, N., & Bangash, M.A. (2008). Enhanced Block Based Color Image Encryption Technique with Confusion. IEEE proceedings, 200-206.
[47]. Liu, F., Wu, C.K., & Lin, X.J. (2008). Colour visual cryptography schemes. IET Information Security, 2(4), 151–165.
[48]. Kumar, A., & Makur, A. (2008). Distributed Source Coding based Encryption and Lossless Compression of Gray Scale and Color Images. MMSP, 760-764.
[49]. Yahya, A.A., & Abdalla, A.M. (2008). A Shuffle Image-Encryption Algorithm. IEEE proceedings.
[50]. Acharya, B., Patra, S.K., & Panda, G. (2008). Image Encr yption by Novel Cr yptosystem Using Matrix Transformation. First International Conference on Emerging Trends in Engineering and Technology, 77 – 81.
[51]. Alsultanny, Y. A. (2008). Testing Image Encryption by Output Feedback (OFB). Journal of Computer Science 4 (2).
[52]. Usama, M., & Khan, M.K. (2008). Classical and Chaotic Encryption Techniques for the Security of Satellite Images. IEEE proceedings.
[53]. Gong-bin, Q., Qing-feng, J., & Shui-sheng, Q. (2009). A New Image Encryption Scheme Based on DES Algorithm and Chua's Circuit. International Workshop on Imaging Systems and Techniques.
[54]. Ahmed, F., Siyal, M.Y., & Abbas, V.U. (2009). A Robust Image Encryption Scheme using State-Feedback Control. IEEE proceedings.
[55]. Ghaffar, A., Allam, E.A., Mansour, M.E., Kumar, H.A. & Abo-Alsoud, M.A. (2009). A Secure Face Verification System Based on Robust Hashing and Cryptography. IEEE Approximation Techniques. IEEE proceedings, 108-111.
[56]. Zhao, H., Ran, Q., Ge, G., Ma, J., & Tan, L. (2009). Image Encryption Based on Random Fractional Discrete Cosine and Sine Transforms. First International Workshop on Education Technology and Computer Science, IEEE proceedings, 804-808.
[57]. Ihou, Y., Panetta, K., & Agaian, S. (2009). Image Encryption Using Binary Key-images. IEEE International Conference on Systems, Man, and Cybernetics, 4569- 4574.
[58]. Vreugdenhil, J., Iverson, K., & Katti, R.S. (2009). Image Encyption Using Dynamic Shuffling and XORing Processes. IEEE proceedings, 734-737.
[59]. Li, X., Ta, R., Dae, L., & Wang, V. (2009). Reality- Preserving Image Encryption Associated with the Generalised Hilbert Transform. IEEE International Symposium on Industrial Electronics, 1909-1913.
[60]. Flayh, N.A., Parveen, R., & Ahson, S.I. (2009). Wavelet Based Partial Image Encr yption. IEEE proceedings, 32-35.
[61 ]. Fan, J., & Zhang, Y. (2009). Color image encryption and decryption based on double random phase encoding technique. IEEE proceedings.
[62]. Yin-fung (2009). Fourier Transform in Image Encryption. ELEC 8501: The Fourier Transform and its Applications.
[63]. Acharya, B., Shukla, S. K., Panigrahy, S. K., Patra, S. K., & Panda, G. (2009). H-S-X Cryptosystem and Its Application to Image Encr yption. International Conference on Advances in Computing, Control, and Telecommunication Technologies. 720-724.
[64]. Nakagata, Shohei, Kuraki, Kensuke, Anan & Taizo (2009). Device, Method, And Program For Image Encryption/Decryption”, IEEE proceedings.
[65]. Cheddad, A., Condell, J., Curran, K., & McKevitt, P. (2010). A hash Based Image Encryption Algorithm. Optics communication, 283(6), 879-893.
[66]. Liu, Z., Chen, H., Liu, T., Li, P., Dai, J., Sun, X., & Liu, S. (2010). Double-image encryption based on the affine transform and the gyrator transform., Journal of optics.
[67]. Sathyanarayana, S. V., Kumar, M. A., & Bhat, K.N.H. (2011). Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points. International Journal of Network Security, 12(3), 137-150.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.