Secure encrypted image parsing over server
Keywords:
encryption, decryption, cryptography, hyper-chaoticAbstract
Security of data is the major concern in today’s scenario. Transferring of data from one source point to a destination point is referred as data transfer. Encryption is one of the methods which is widely used for transfer of information over secured communication channel. Through security of various encryption techniques, we can make our data safe from hackers. Confidential data can be secured by various proposed methodologies and algorithms. Survey has been performed taking into consideration various image encryption techniques and algorithms as well as procedures in this paper and reference ideas about various cryptography techniques and discussed about the challenges faced in the image encryption.
Downloads
References
Wang Ying, Zheng DeLing, Ju Lei, et al., ―The Spatial-Domain Encryption of Digital Images Based on High-Dimension Chaotic System‖, Proceeding of 2004 IEEE Conference on Cybernetics and Intelligent Systems, Singapore, pp. 1172-1176, December. 2004
M.-R. Zhang, G.-C. Shao and K.-C. Yi, ― T-matrix and its applications in image processing‖, IEEE Electronics Letters 9th December 2004 Vol. 40 No. 25
Shaojiang Deng, Linhua Zhang, and Di Xiao, ―Image Encryption Scheme Based on Chaotic Neural System‖, J. Wang, X. Liao, and Z. Yi (Eds.): ISNN 2005, LNCS 3497, pp. 868-872, 2005.
Huang-Pei Xiao Guo-Ji Zhang ―An Image Encryption Scheme Based on Chaotic Systems‖, IEEE Proceedings of the Fifth International Conference on Machine Learning and Cybernetics, Dalian, 13-16 August 2006.
GuoshengGu, Guoqiang Han ―An Enhanced Chaos Based Image Encryption Algorithm‖, IEEE Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC'06) in 2006.
M. Zeghid, M. Machhout, L. Khriji, A. Baganne,R. Tourki, A Modified AES Based Algorithm for Image Encryption World Academy of Science, Engineering and Technology 27 2007.
Mohammad Ali BaniYounes and AmanJantanImageEncryption Using Block-Based Transformation Algorithm IAENG International Journal of Computer Science, 35, 2008.
Saroj Kumar Panigrahy, Bibhudendra Acharya and Debasish Jen, Image Encryption Using Self-Invertible Key Matrix of Hill Cipher Algorithm 1st t International Conference on Advances in Computing, Chikhli, India, 21-22 February 2008
Mohammad Ali BaniYounes and AmanJantan, An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption, IJCSNS International Journal of Computer Science and Network Security, VOL.8, April 2008.
Vibhudendra Acharya, Saroj Kumar Panigrahy, Sarat Kumar Patra, and Ganapati Panda, Image Encryption Using Advanced Hill Cipher Algorithm, International Journal of Recent Trends in Engineering, Vol. 1, No. 1, May 2009
Zhang Yun-peng, Liu Wei, Cao Shui-ping, Zhai Zheng-jun, Nie Xuan, Dai Wei-di, Digital image encryption algorithm based on chaos and improved DES, IEEE International Conference on Systems, Man and Cybernetics, 2009.
Seyed Mohammad Seyedzade, Reza EbrahimiAtani and SattarMirzakuchaki, A Novel Image Encryption Algorithm Based on Hash Function 6th Iranian Conference on Machine Vision and Image Processing, 2010.
Ismail Amr Ismail, Mohammed Amin, HossamDiab A Digital Image Encryption Algorithm Based a Composition of Two Chaotic Logistic Maps, International Journal of Network Security, Vol.11, No.1, PP.1 -10, July 2010.
Kamali, S.H., Shakerian, R., Hedayati, M., Rahmani, M., A new modified version of Advance Encryption Standard based algorithm for image encryption,Electronics and Information Engineering (ICEIE), 2010 International Conference.
Amitava Nag, Jyoti Prakash Singh, Srabani Khan, Saswati Ghosh, Sushanta Biswas, D. Sarkar ParthaPratim Sarkar, Image Encryption Using Affine Transform and XOR Operation, International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN 2011).
SeshaPallaviIndrakanti, P.S.Avadhani, Permutation based Image Encryption Technique, International Journal of Computer Applications (0975 – 8887) Volume 28– No.8, 2011.
Qais H. Alsafasfeh, Aouda A. Arfoa, Image Encryption Based on the General Approach for Multiple Chaotic Systems Journal of Signal and Information Processing, 2011.
Ibrahim S I Abuhaiba, Maaly A S Hassan, Image Encryption Using Differential Evolution Approach Inn Frequency Domain
Seyed Hossein Kamali, Reza Shakerian “A New Modified Version of Advanced Encryption Standard Based Algorithm for Image Encryption”, IEEE Electronics and Information Engineering International Conference (ICEIE 2010). 1-3 Aug. 2010, V1-141 - V1-145.
[20] Shannon CE., "Communication theory of secrecy system," Bell SystTech J 1949; 28: 656-715.
.
Manish Kumar, R.N. Mohapatra, Sajal Agarwal, G. Satish, S.N. Raw, “A New RGB Image Encryption using generalized Vigneretype table over symmetric group associated with virtual planet domain”, Multimedia Tools and Applications, Volume 78, Pages: 10227 – 10263, 2019 (Springer)
Wang Q, Wei M, Chen X, Miao Z (2018) Joint encryption and compression of 3D images based on tensor compressive sensing with non-autonomous 3D chaotic system.
Muhammad K, Hamza R, Ahmad J, Lloret J, Wang HHG, Baik SW (2018) Secure surveillance framework for IoT systems using probabilistic image encryption. IEEE Trans Ind Inform 14(8):3679–3689.
Wang Y, Quan C, Tay C (2015) Optical color image encryption without information disclosure using phase-truncated Fresnel transform and a random amplitude mask. Opt Commun 344:147–155.
Gururaj Hanchinamani, Linganagouda Kulkarni, an efficient image Encryption Scheme Based on a Peter De Jong Chaotic Map and a RC4 Stream.
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of health sciences
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.