Mohammad Ali Bani Younes


Abstract: Nowadays, the internet plays a key role in almost every aspect of life. This article presents a new set of data storage and protection challenges. It shows a general introduction to cryptography and discusses most of the available articles of image encryption techniques that increase the levels of data security. However, different encryption techniques can be used to protect the digital data confidentiality from unauthorized access. Furthermore, the cryptographic techniques discussed in this article can be used to support researchers to develop new techniques to provide high levels of security and thus reduce the risk of security. With the advancement of science and knowledge, the protection techniques lead to increase versatility and security of data transfer in the future.


Asymmetric; Cryptanalysis; Cryptography; Image encryption

Full Text:



AbuTaha, M., Farajallah, M., Tahboub, R., & Odeh, M. (2011). Survey Paper: Cryptography Is The Science Of Information Security, International Journal of Computer Science and Security (IJCSS), 5(3), 298-303.

Agarwal, S. (2017). Image Encryption Techniques Using Fractal Function: A Review. International Journal of Computer Science & Information Technology (IJCSIT), 9(2), 53-68.

Agrahari, A. K., Sheth, M., & Praveen, N. (2018). Comprehensive Survey on Image Steganography Using LSB With AES. International Journal of Applied Engineering Research, 13(8), 5841-5844.

Ali, T. I., & Jawad. S. (2017). A Comprehensive Study of Image Steganography Techniques. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Web Site: www.ijettcs.org, 6(5), 101-104.

Askar, S. S., Karawia, A. A., & Alshamrani, A. ( 2015). Image Encryption Algorithm Based on Chaotic Economic Model. Mathematical Problems in Engineering, vol. 2015, Article ID 341729, 10 pages.

Bani Younes, M. A., & Jantan, A. (2011). Image Encryption Using Block-Based Transformation Algorithm: Image Encryption and Decryption Process Using Block-Based Transformation Algorithm. New York: LAP Lambert Academic Publishing, Germany.

Bani Younes, M. A., & Jantan, A. (2008). An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption. IJCSNS International Journal of Computer Science and Network Security, 8(4), 191-197.

Barakat, M., Eder, C., & Hanke, T. (2018). An Introduction to Cryptography. Timo Hanke at RWTH Aachen University, 1-145.

Brindha, K., Sharma, R., & Saini, S. (2014). Use of Symmetric Algorithm for Image Encryption. International Journal of Innovative Research in Computer and Communication Engineering, 2(5), 4401- 4407.

Geetha, S., Punithavathi. P., Infanteena, A.M., & Sindhu, S.S. S. (2018). A Literature Review on Image Encryption Techniques. International Journal of Information Security and Privacy, 12(3), 42-83.

Gupta, K., Gupta, R., Agrawal, R., & Khan, S. (2015). An Ethical Approach of Block-Based Image Encryption Using Chaotic Map. International Journal of Security and Its Applications, 9(9), 105-122.

Jain M., & Lenka, S. K. (2016). A review of digital image steganography using LSB and LSB array. International Journal of Applied Engineering Research, 11(3), 1820–1824.

Joshi, M. R., & Karkade, R.A .(2015). Network Security with Cryptography. International Journal of Computer Science and Mobile Computing, 4(1), 201-204

Kasapbas¸ M.C., & Elmasry, W. (2018). New LSB-based color image steganography method to enhance the efficiency in payload capacity, security and integrity check. Sadhana, Indian Academy of Sciences,

Kumari, S. (2017). A Research Paper on Cryptography Encryption and Compression Techniques. International Journal Of Engineering And Computer Science, 6(4), 20915-20919

Lagmiri, S. N., Elalami, N., Elalami, J. (2018). Color and gray images encryption algorithm using chaotic systems of different dimensions. IJCSNS International Journal of Computer Science and Network Security, 18(1), 79-86.

Li, C., Luo, G., Qin. K., & Li, C. (2017). An image encryption scheme based on chaotic tent map. Nonlinear Dynamics, 87(1), 127-133

Li, Y., Wang, C., & Chen, H. (2017). A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Optics and Lasers in Engineering, 90, 238-246.

Mitra, A., Subba Rao, Y. V., & Prasanna, S. R. M. (2006). A New Image Encryption Approach Using Combinational Permutation Techniques. Journal of Computer Science, 1(2), 127-131, http://www.enformatika.org/ijcs/v1/v1-2-16.pdf

Mushtaq, M. F., Jamel, S., Disina, A. H., Pindar, Z.A., Shakir, N.S.A., & Deris, M.M. (2017). A Survey on the Cryptographic Encryption Algorithms. (IJACSA) International Journal of Advanced Computer Science and Applications, 8(11), 333-344.

Natiq H., Al-Saidi, NMG., Said, MRM., & Kilicman, A. (2018). A new hyperchaotic map and its application for image encryption. Eur Phys J Plus, 133(1), 6–20. https://doi.org/10.1140/epjp/i2018-11834-2CrossRefGoogle Scholar

Oravec, J., Turan, J., Ovsenik, L., Ivaniga, T., Solus, D., & Marton, M. (2018). Asymmetric Image Encryption Approach with Plaintext-Related Diffusion, RADIOENGINEERING, 27(1), 281-288.

Pandey, A., & Chopra, J. (2017). Steganography Using AES and LSB Techniques. International Journal of Scientific Research Engineering & Technology (IJSRET), 6( 6), 620-623.

Sarita, K. (2017). A Research Paper on Cryptography Encryption and Compression Techniques. International Journal Of Engineering And Computer Science, 6(4), 20915-20919.

Sharma, A. (2015). Comparative Study of Symmetric Cryptography Algorithm. Faculty of Engineering, Department of Computer Science & Engineering Pacific University (PAHER), Udaipur(Rajasthan). https://www.researchgate.net/publication/286863418

Singh, S., & Singh, A. (2013). A Review on the Various Recent Steganography Techniques. IJCSN International Journal of Computer Science and Network, 2(6), 2277-5420.

Stallings W, (2005). Cryptography and Network Security. Englewood Cliffs, NJ: Prentice Hall, United States.

Tong, X.J., Zhang, M., Wang, Z., Liu, Y., Xu, H., & Ma, J. (2015). A fast encryption algorithm of color image based on a four-dimensional chaotic system. Journal of Visual Communication and Image Representation, 2015, 33, 219–234.

Zhang, Y. (2017). A Fast Image Encryption Algorithm Based on Convolution Operation, IETE Journal of Research, DOI: 10.1080/03772063.2017.1400406.

Mohammad Ali Bani Younes received BSc in computer science from Yarmouk University/ Jordan in1986, MSc from Sudan University of Science and Technology in 2003, and PhD from University Sains Malaysia in 2009 respectively. Currently, he is an Assistant Professor at Ajloun National University at the Department of Computer Science.

DOI: https://doi.org/10.26483/ijarcs.v10i1.6350


  • There are currently no refbacks.

Copyright (c) 2019 International Journal of Advanced Research in Computer Science