Secure encrypted image parsing over server

https://doi.org/10.53730/ijhs.v6nS3.9449

Authors

  • Shefali Madan Associate Professor
  • Mahima Magon Associate Professor
  • Suman Chandila Assistant Professor

Keywords:

encryption, decryption, cryptography, hyper-chaotic

Abstract

Security of data is the major concern in today’s scenario. Transferring of data from one source point to a destination point is referred as data transfer. Encryption is one of the methods which is widely used for transfer of information over secured communication channel. Through security of various encryption techniques, we can make our data safe from hackers. Confidential data can be secured by various proposed methodologies and algorithms. Survey has been performed taking into consideration various image encryption techniques and algorithms as well as procedures in this paper and reference ideas about various cryptography techniques and discussed about the challenges faced in the image encryption.

Downloads

Download data is not yet available.

References

Wang Ying, Zheng DeLing, Ju Lei, et al., ―The Spatial-Domain Encryption of Digital Images Based on High-Dimension Chaotic System‖, Proceeding of 2004 IEEE Conference on Cybernetics and Intelligent Systems, Singapore, pp. 1172-1176, December. 2004

M.-R. Zhang, G.-C. Shao and K.-C. Yi, ― T-matrix and its applications in image processing‖, IEEE Electronics Letters 9th December 2004 Vol. 40 No. 25

Shaojiang Deng, Linhua Zhang, and Di Xiao, ―Image Encryption Scheme Based on Chaotic Neural System‖, J. Wang, X. Liao, and Z. Yi (Eds.): ISNN 2005, LNCS 3497, pp. 868-872, 2005.

Huang-Pei Xiao Guo-Ji Zhang ―An Image Encryption Scheme Based on Chaotic Systems‖, IEEE Proceedings of the Fifth International Conference on Machine Learning and Cybernetics, Dalian, 13-16 August 2006.

GuoshengGu, Guoqiang Han ―An Enhanced Chaos Based Image Encryption Algorithm‖, IEEE Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC'06) in 2006.

M. Zeghid, M. Machhout, L. Khriji, A. Baganne,R. Tourki, A Modified AES Based Algorithm for Image Encryption World Academy of Science, Engineering and Technology 27 2007.

Mohammad Ali BaniYounes and AmanJantanImageEncryption Using Block-Based Transformation Algorithm IAENG International Journal of Computer Science, 35, 2008.

Saroj Kumar Panigrahy, Bibhudendra Acharya and Debasish Jen, Image Encryption Using Self-Invertible Key Matrix of Hill Cipher Algorithm 1st t International Conference on Advances in Computing, Chikhli, India, 21-22 February 2008

Mohammad Ali BaniYounes and AmanJantan, An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption, IJCSNS International Journal of Computer Science and Network Security, VOL.8, April 2008.

Vibhudendra Acharya, Saroj Kumar Panigrahy, Sarat Kumar Patra, and Ganapati Panda, Image Encryption Using Advanced Hill Cipher Algorithm, International Journal of Recent Trends in Engineering, Vol. 1, No. 1, May 2009

Zhang Yun-peng, Liu Wei, Cao Shui-ping, Zhai Zheng-jun, Nie Xuan, Dai Wei-di, Digital image encryption algorithm based on chaos and improved DES, IEEE International Conference on Systems, Man and Cybernetics, 2009.

Seyed Mohammad Seyedzade, Reza EbrahimiAtani and SattarMirzakuchaki, A Novel Image Encryption Algorithm Based on Hash Function 6th Iranian Conference on Machine Vision and Image Processing, 2010.

Ismail Amr Ismail, Mohammed Amin, HossamDiab A Digital Image Encryption Algorithm Based a Composition of Two Chaotic Logistic Maps, International Journal of Network Security, Vol.11, No.1, PP.1 -10, July 2010.

Kamali, S.H., Shakerian, R., Hedayati, M., Rahmani, M., A new modified version of Advance Encryption Standard based algorithm for image encryption,Electronics and Information Engineering (ICEIE), 2010 International Conference.

Amitava Nag, Jyoti Prakash Singh, Srabani Khan, Saswati Ghosh, Sushanta Biswas, D. Sarkar ParthaPratim Sarkar, Image Encryption Using Affine Transform and XOR Operation, International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN 2011).

SeshaPallaviIndrakanti, P.S.Avadhani, Permutation based Image Encryption Technique, International Journal of Computer Applications (0975 – 8887) Volume 28– No.8, 2011.

Qais H. Alsafasfeh, Aouda A. Arfoa, Image Encryption Based on the General Approach for Multiple Chaotic Systems Journal of Signal and Information Processing, 2011.

Ibrahim S I Abuhaiba, Maaly A S Hassan, Image Encryption Using Differential Evolution Approach Inn Frequency Domain

Seyed Hossein Kamali, Reza Shakerian “A New Modified Version of Advanced Encryption Standard Based Algorithm for Image Encryption”, IEEE Electronics and Information Engineering International Conference (ICEIE 2010). 1-3 Aug. 2010, V1-141 - V1-145.

[20] Shannon CE., "Communication theory of secrecy system," Bell SystTech J 1949; 28: 656-715.

.

Manish Kumar, R.N. Mohapatra, Sajal Agarwal, G. Satish, S.N. Raw, “A New RGB Image Encryption using generalized Vigneretype table over symmetric group associated with virtual planet domain”, Multimedia Tools and Applications, Volume 78, Pages: 10227 – 10263, 2019 (Springer)

Wang Q, Wei M, Chen X, Miao Z (2018) Joint encryption and compression of 3D images based on tensor compressive sensing with non-autonomous 3D chaotic system.

Muhammad K, Hamza R, Ahmad J, Lloret J, Wang HHG, Baik SW (2018) Secure surveillance framework for IoT systems using probabilistic image encryption. IEEE Trans Ind Inform 14(8):3679–3689.

Wang Y, Quan C, Tay C (2015) Optical color image encryption without information disclosure using phase-truncated Fresnel transform and a random amplitude mask. Opt Commun 344:147–155.

Gururaj Hanchinamani, Linganagouda Kulkarni, an efficient image Encryption Scheme Based on a Peter De Jong Chaotic Map and a RC4 Stream.

Published

22-06-2022

How to Cite

Madan, S., Magon, M., & Chandila, S. (2022). Secure encrypted image parsing over server. International Journal of Health Sciences, 6(S3), 10452–10461. https://doi.org/10.53730/ijhs.v6nS3.9449

Issue

Section

Peer Review Articles

Most read articles by the same author(s)