blog




  • Essay / Various digital image encryption techniques - 1819

    [1]. Image Encryption Using Affine Transform and XOR Operation (2011) In this paper, Amitava Nag, Jyoti Prakash Singh, Srabani Khan, Sushanta Biswas, D. Sarkar and Partha Pratim Sarkar presented an approach that uses a 64-bit key in encryption. First, the recommended technique performs the affine transformation to dissipate pixels by applying four 8-bit subkeys. Subsequently, the algorithm divides the image into blocks of 2*2 pixels, then applies an XOR operation on each block with four 8-bit subkeys to modify the pixel values. The results reveal that the presented algorithm is effective in reducing the correlation between pixels and further provides the possible level of security to the images[2]. A New Chaotic System for Image Encryption (2012) In this paper, Long Bao and Yicong Zhou presented a new chaotic system which constitutes the three distinct one-dimensional chaotic maps [2]. The proposed technique uses the logistics map as a controller to choose the Tent map or a Sine map to generate random sequences [2]. Subsequently, the proposed system applies the substitution-permutation network (SPN) structure to obtain the confusion and diffusion property [2] [15]. This technique uses a 240-bit key for a large key space. Mainly, this key contains all the parameters and initial values ​​of the new chaotic system, as well as high sensitivity in key changes for encryption and decryption. Therefore, the proposed system provides excellent security against brute force attacks along with high key sensitivity and chaotic behavior.[3] A new digital image encryption method based on one-dimensional random scrambling (2012)In this article, Qiudong Sun, Ping Guan, Yongping and Yunfeng Xue...... middle of article...... 9] http: //en.wikipedia.org/wiki/Histogram,[20] Karl Pearson (1895), "Contributions to the mathematical theory of evolution II, asymmetric variation in a homogeneous material". Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 186:343-414.[21] Xu Shujiang Wang Yinglong, Guo Yucui Wang Cong, “A Novel Chaos-based Image Encryption Scheme”, International Conference on Information Engineering and Computer Science (ICIECS) 2009, December 19-20, 2009, pages: 1- 4.[22] http://www.waset.org/journals/waset/v3/v3-7.pdf Analysis and comparison of image encryption algorithms by Ismet Öztürk and Ibrahim Soukpinar.[23] Abhinav Srivastava, “A survey report on different image encryption techniques”, International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 6, June 2012, pages: 163-167.