A SURVEY OF THE MOST CURRENT IMAGE ENCRYPTION AND DECRYPTION TECHNIQUES
Main Article Content
Abstract
Abstract: Nowadays, the internet plays a key role in almost every aspect of life. This article presents a new set of data storage and protection challenges. It shows a general introduction to cryptography and discusses most of the available articles of image encryption techniques that increase the levels of data security. However, different encryption techniques can be used to protect the digital data confidentiality from unauthorized access. Furthermore, the cryptographic techniques discussed in this article can be used to support researchers to develop new techniques to provide high levels of security and thus reduce the risk of security. With the advancement of science and knowledge, the protection techniques lead to increase versatility and security of data transfer in the future.
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
AbuTaha, M., Farajallah, M., Tahboub, R., & Odeh, M. (2011). Survey Paper: Cryptography Is The Science Of Information Security, International Journal of Computer Science and Security (IJCSS), 5(3), 298-303.
Agarwal, S. (2017). Image Encryption Techniques Using Fractal Function: A Review. International Journal of Computer Science & Information Technology (IJCSIT), 9(2), 53-68.
Agrahari, A. K., Sheth, M., & Praveen, N. (2018). Comprehensive Survey on Image Steganography Using LSB With AES. International Journal of Applied Engineering Research, 13(8), 5841-5844.
Ali, T. I., & Jawad. S. (2017). A Comprehensive Study of Image Steganography Techniques. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Web Site: www.ijettcs.org, 6(5), 101-104.
Askar, S. S., Karawia, A. A., & Alshamrani, A. ( 2015). Image Encryption Algorithm Based on Chaotic Economic Model. Mathematical Problems in Engineering, vol. 2015, Article ID 341729, 10 pages.
Bani Younes, M. A., & Jantan, A. (2011). Image Encryption Using Block-Based Transformation Algorithm: Image Encryption and Decryption Process Using Block-Based Transformation Algorithm. New York: LAP Lambert Academic Publishing, Germany.
Bani Younes, M. A., & Jantan, A. (2008). An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption. IJCSNS International Journal of Computer Science and Network Security, 8(4), 191-197.
Barakat, M., Eder, C., & Hanke, T. (2018). An Introduction to Cryptography. Timo Hanke at RWTH Aachen University, 1-145.
Brindha, K., Sharma, R., & Saini, S. (2014). Use of Symmetric Algorithm for Image Encryption. International Journal of Innovative Research in Computer and Communication Engineering, 2(5), 4401- 4407.
Geetha, S., Punithavathi. P., Infanteena, A.M., & Sindhu, S.S. S. (2018). A Literature Review on Image Encryption Techniques. International Journal of Information Security and Privacy, 12(3), 42-83.
Gupta, K., Gupta, R., Agrawal, R., & Khan, S. (2015). An Ethical Approach of Block-Based Image Encryption Using Chaotic Map. International Journal of Security and Its Applications, 9(9), 105-122.
Jain M., & Lenka, S. K. (2016). A review of digital image steganography using LSB and LSB array. International Journal of Applied Engineering Research, 11(3), 1820–1824.
Joshi, M. R., & Karkade, R.A .(2015). Network Security with Cryptography. International Journal of Computer Science and Mobile Computing, 4(1), 201-204
Kasapbas¸ M.C., & Elmasry, W. (2018). New LSB-based color image steganography method to enhance the efficiency in payload capacity, security and integrity check. Sadhana, Indian Academy of Sciences,
Kumari, S. (2017). A Research Paper on Cryptography Encryption and Compression Techniques. International Journal Of Engineering And Computer Science, 6(4), 20915-20919
Lagmiri, S. N., Elalami, N., Elalami, J. (2018). Color and gray images encryption algorithm using chaotic systems of different dimensions. IJCSNS International Journal of Computer Science and Network Security, 18(1), 79-86.
Li, C., Luo, G., Qin. K., & Li, C. (2017). An image encryption scheme based on chaotic tent map. Nonlinear Dynamics, 87(1), 127-133
Li, Y., Wang, C., & Chen, H. (2017). A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Optics and Lasers in Engineering, 90, 238-246.
Mitra, A., Subba Rao, Y. V., & Prasanna, S. R. M. (2006). A New Image Encryption Approach Using Combinational Permutation Techniques. Journal of Computer Science, 1(2), 127-131, http://www.enformatika.org/ijcs/v1/v1-2-16.pdf
Mushtaq, M. F., Jamel, S., Disina, A. H., Pindar, Z.A., Shakir, N.S.A., & Deris, M.M. (2017). A Survey on the Cryptographic Encryption Algorithms. (IJACSA) International Journal of Advanced Computer Science and Applications, 8(11), 333-344.
Natiq H., Al-Saidi, NMG., Said, MRM., & Kilicman, A. (2018). A new hyperchaotic map and its application for image encryption. Eur Phys J Plus, 133(1), 6–20. https://doi.org/10.1140/epjp/i2018-11834-2CrossRefGoogle Scholar
Oravec, J., Turan, J., Ovsenik, L., Ivaniga, T., Solus, D., & Marton, M. (2018). Asymmetric Image Encryption Approach with Plaintext-Related Diffusion, RADIOENGINEERING, 27(1), 281-288.
Pandey, A., & Chopra, J. (2017). Steganography Using AES and LSB Techniques. International Journal of Scientific Research Engineering & Technology (IJSRET), 6( 6), 620-623.
Sarita, K. (2017). A Research Paper on Cryptography Encryption and Compression Techniques. International Journal Of Engineering And Computer Science, 6(4), 20915-20919.
Sharma, A. (2015). Comparative Study of Symmetric Cryptography Algorithm. Faculty of Engineering, Department of Computer Science & Engineering Pacific University (PAHER), Udaipur(Rajasthan). https://www.researchgate.net/publication/286863418
Singh, S., & Singh, A. (2013). A Review on the Various Recent Steganography Techniques. IJCSN International Journal of Computer Science and Network, 2(6), 2277-5420.
Stallings W, (2005). Cryptography and Network Security. Englewood Cliffs, NJ: Prentice Hall, United States.
Tong, X.J., Zhang, M., Wang, Z., Liu, Y., Xu, H., & Ma, J. (2015). A fast encryption algorithm of color image based on a four-dimensional chaotic system. Journal of Visual Communication and Image Representation, 2015, 33, 219–234.
Zhang, Y. (2017). A Fast Image Encryption Algorithm Based on Convolution Operation, IETE Journal of Research, DOI: 10.1080/03772063.2017.1400406.
Mohammad Ali Bani Younes received BSc in computer science from Yarmouk University/ Jordan in1986, MSc from Sudan University of Science and Technology in 2003, and PhD from University Sains Malaysia in 2009 respectively. Currently, he is an Assistant Professor at Ajloun National University at the Department of Computer Science.