Image Encryption Method for Secure Image Transmission

Neelima Thakur*, Siddhartha Choubey **, Abha Choubey***
*-*** Department of Computer Science and Engineering, Shri Shankaracharya Institute of Engineering and Technology, Chhattisgarh, India.
Periodicity:October - December'2021
DOI : https://doi.org/10.26634/jip.8.4.18489

Abstract

This paper is mainly related to the secret writing of various images and secret writing methods. The cryptography of the image is extremely necessary for information security purposes. Security is the most difficult aspect of the network and network applications. Online and networked applications are growing rapidly, increasing the importance and therefore the value of information transmitted over the Internet or other media. The secret letter may be related to improving the security of the image by encrypting the pixels. The encryption itself protects privacy. This application is used in many areas, including network communications, medical imaging, and military communications. Due to some properties of images, such as high information redundancy and volume of information, secret writing of images is different from secret writing of texts. Secret writing is to convert information into a type of encryption code that cannot be easily understood by the user unauthorized persons.

Keywords

Encryption algorithm, Decryption, Cryptography

How to Cite this Article?

Thakur, N., Choubey, S., and Choubey, A. (2021). Image Encryption Method for Secure Image Transmission. i-manager’s Journal on Image Processing, 8(4), 21-25. https://doi.org/10.26634/jip.8.4.18489

References

[1]. Chang, C. C., Hwang, M. S., & Chen, T. S. (2001). A new encryption algorithm for image cryptosystems. Journal of Systems and Software, 58(2), 83-91. https://doi.org/10.101 6/S0164-1212(01)00029-2
[2]. Yen, J. C., & Guo, J. I. (2000). A new chaotic mirror-like image encryption algorithm and its VLSI architecture. Pattern Recognition and Image Analysis (Advances in Mathematical Theory and Applications), 10(2), 236-247.
[3]. Indrakanti, S. P., & Avadhani, P. S. (2011). Permutationbased image encryption technique. International Journal of Computer Applications, 28(8), 45-47.
[4]. Kester, Q. A. (2013). A cryptographic Image Encryption technique based on the RGB Pixel shuffling. International Journal of Advanced Research in Computer Engineering & Technology, 2(2), 848-854.
[5]. Megashree, B. S., & Sujatha, B. R. (2018). AES based image encryption and decryption using Matlab, International Journal of Engineering Research & Technology (IJERT), 6(13), 1-3.
[6]. Nag, A., Singh, J. P., Khan, S., Ghosh, S., Biswas, S., & Sarkar, D. S. P. (2011). Image encryption using affine transform and XOR operation. In 2011, International Conference on Signal Processing, Communication, Computing and Networking Technologies (pp. 309-312). IEEE.
[7]. Shin, C., Seo, D., Chol, K., Lee, H., & Kim, S. (2003). Multilevel Image encoding by Binary part XOR Operations. IEEE.
[8]. Sinha, A., & Singh, K. (2003). A technique for image encryption using digital signature. Optics Communications, 218(4-6), 229-234. https://doi.org/10.1016/S0030-4018 (03)01261-6
[9]. Sun, Q., Yan, W., Huang, J., & Ma, W. (2012, April). Image encryption based on bit-plane decomposition and random scrambling. In 2012, 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet) (pp. 2630-2633). IEEE. https://doi.org/ 10.1109/CECNet.2012.6201673
[10]. Sun, Y., & Wang, G. (2011, October). An image encryption scheme based on the modified logistic map. In 2011, Fourth International Workshop on Chaos-Fractals Theories and Applications (pp. 179-182). IEEE. https://doi.org/10.1109/IWCFTA.2011.56
[11]. Younes, M. A. B., & Jantan, A. (2008). An image encryption approach using a combination of permutation techniques followed by encryption. IJCSNS International Journal of Computer Science and Network Security, 8(4), 191-197.
[12]. Bani, M. A., & Jantan, A. (2008). Image encryption using block-based transformation algorithm. IJCSNS International Journal of Computer Science and Network Security, 8(4), 191-197.
[13]. Zhou, Y., & Agaian, S. (2011, June). Image encryption using the image steganography concept and PLIP model. In Proceedings 2011 International Conference on System Science and Engineering (pp. 699-703). IEEE. https://doi.org/10.1109/ICSSE.2011.5961993
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.