REVIEW OF IMAGE ENCRYPTION AND DECRYPTION TECHNIQUES FOR 2D IMAGES

  • Jalpa Shah Department of Computer Engineering, Government Engineering College, Gandhinagar, Gujarat, India
  • J S Dhobi Department of Computer Engineering, Government Engineering College, Gandhinagar, Gujarat, India
Keywords: Internet, Security, Image Encryption, Cryptography, 2D Image, Access

Abstract

In the emerging era of Internet, multimedia software and application security of images is of major concern. To offer security to these images encryption is the way for robust security. With Image Encryption it becomes difficult to analyze the image that is communicated over untrusted network. Also it provides security for any unauthorized access. The paper provides an introduction to cryptography and various image encryption techniques are reviewed for 2D images.

Downloads

Download data is not yet available.

References

Shannon, C. E. (1948). The mathematical theory of communication. The Bell System Technical Journal, 27,379–423. DOI: https://doi.org/10.1002/j.1538-7305.1948.tb01338.x

Shannon, C. E. (1949). Communication theory of secrecy systems. The Bell System Technical Journal, 28, 656–715. DOI: https://doi.org/10.1002/j.1538-7305.1949.tb00928.x

Nidhai K. El Abbadi, Enas Yahiya, Ahmeda Aladilee. Digital RGB Image Encryption Based on 2D Cat Map and Shadow Numbers, IEEE, 2017. DOI: https://doi.org/10.1109/NTICT.2017.7976115

Chong Fu, Zhou-feng Chen, Wei Zhao, Hui-yan Jiang. A New Fast Color Image Encryption Scheme using Chen Chaotic System, IEEE, 2017.

Ali Soleymani, Md Jan Nordin, and Elankovan Sundararajan. A Chaotic Cryptosystem for Images based on Henon and Arnold Cat Map, The Scientific World Journal, Hindawi, 2014. DOI: https://doi.org/10.1155/2014/536930

Nidaa Abdul Mohsin Abbas. Image encryption based on Independent Component Analysis & Arnold's Cat Map, Egyptioan Informatics Journal, ScienceDirect, 2016, Vol 17, Issue 1, pp. 139- 146. DOI: https://doi.org/10.1016/j.eij.2015.10.001

Hikmat N. Abdullah, Hamsa A. Abdullah. Image Encryption using Hybrid Chaotic map, IEEE, 2017, pp. 121-125. DOI: https://doi.org/10.1109/CRCSIT.2017.7965545

Marwa S. Elpeltagy, Moataz M. Abdelwahab, Mohammed S. Sayed. Image encryption using Camellia and Chaotic maps, IEEE, 2015, pp. 209-214. DOI: https://doi.org/10.1109/ISSPIT.2015.7394329

Minal Govind Avasare, Vishakha Vivek Kelkar. Image Encryption using chaos theory, IEEE, 2015. DOI: https://doi.org/10.1109/ICCICT.2015.7045687

Eko Hariyanto, Robbi Rahim. Arnold's Cat Map Algorithm in digital Image Encryption, IJSR, 2013, pp. 1363-1365.

Yogita Verma, Neerja Dharmale. A Survey paper based on image encryption and decryption using modified advanced encryption standard, IJSR, 2013, pp. 352-355

Published
2018-01-31
How to Cite
Shah, J., & Dhobi, J. (2018). REVIEW OF IMAGE ENCRYPTION AND DECRYPTION TECHNIQUES FOR 2D IMAGES. International Journal of Engineering Technologies and Management Research, 5(1), 81-84. https://doi.org/10.29121/ijetmr.v5.i1.2018.49