Review
BibTex RIS Cite

A Comprehensive Review About Image Encryption Methods

Year 2022, Volume: 7 Issue: 1, 27 - 49, 29.04.2022
https://doi.org/10.46578/humder.1066545

Abstract

In today’s technology world, data security has a great importance. Because each data type has its own characteristics, there are various methods of providing this security. The main subject of this study is the security of image data which are more complex structures than text data. Using traditional encryption methods alone to ensure security in image data types can create security weaknesses. For this reason, nowadays, some traditional methods are combined with each other or different methods to encrypt image data. In this study, 131 articles were examined and image encryption methods were classified according to the traditional methods they contain. Studies on both colored and gray level images have been handled together. Finally, the images used in the articles were compared with each other in many ways and the results were presented graphically.

References

  • [1] C. K. Volos, I. M. Kyprianidis and I. N. Stouboulos, “Image encryption process based on chaotic synchronization phenomena,” Signal Processing, vol. 93, no. 5, pp. 1328–1340, 2013.
  • [2] A. Kanso and M. Ghebleh, “An algorithm for encryption of secret images into meaningful images,” Opt. Lasers Eng., vol. 90, no. 2016, pp. 196–208, 2017.
  • [3] G. Srividya and P. Nandakumar, “A Triple-Key chaotic image encryption method,” ICCSP 2011–Int. Conf. Commun. Signal Process., pp. 266–270, 2011.
  • [4] A. V. Diaconu and K. Loukhaoukha, “An improved secure image encryption algorithm based on rubik’s cube principle and digital chaotic cipher,” Math. Probl. Eng., vol. 2013, no. 1, 2013.
  • [5] X. Wu, Y. Li and J. Kurths, “A new color image encryption scheme using CML and a fractional-order chaotic system,” PLoS One, vol. 10, no. 3, pp. 1–28, 2015.
  • [6] K. Muhammad, M. Sajjad, I. Mehmood, S. Rho and S. W. Baik, “Image steganography using uncorrelated color space and its application for security of visual contents in online social networks,” Futur. Gener. Comput. Syst., vol. 86, pp. 951–960, 2018.
  • [7] K. Muhammad, J. Ahmad, H. Farman and M. Zubair, “A Novel Image Steganographic Approach for Hiding Text in Color Images using HSI Color Model,” pp. 11, 2015.
  • [8] A. M. Shaheen, T. R. Sheltami, T. M. Al-Kharoubi and E. Shakshuki, “Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT,” J. Ambient Intell. Humaniz. Comput., vol. 10, no. 12, pp. 4733–4750, 2019.
  • [9] H. R. Kanan and B. Nazeri, “A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm,” Expert Syst. Appl., vol. 41, no. 14, pp. 6123–6130, 2014, doi: 10.1016/j.eswa.2014.04.022.
  • [10] K. Shankar, M. Elhoseny, R. S. Kumar, S. K. Lakshmanaprabu and X. Yuan, “Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique,” J. Ambient Intell. Humaniz. Comput., vol. 11, no. 5, pp. 1821–1833, 2020.
  • [11] S. Bukhari, M. S. Arif, M. R. Anjum and S. Dilbar, “Enhancing security of images by Steganography and Cryptography techniques,” INTECH 2016–6th Int. Conf. Innov. Comput. Technol., pp. 531–534, 2017.
  • [12] G. Ye, C. Pan, X. Huang and Q. Mei, “An efficient pixel-level chaotic image encryption algorithm,” Nonlinear Dyn., vol. 94, no. 1, pp. 745–756, 2018.
  • [13] H. Kaur and A. Kakkar, “Comparison of different image formats using LSB Steganography,” ISPCC 2017 - 4th IEEE Int. Conf. Signal Process. Comput. Control. pp. 97–101, 2017.
  • [14] F. Han, X. Liao, B. Yang and Y. Zhang, “A hybrid scheme for self-adaptive double color-image encryption,” Multimed. Tools Appl., vol. 77, no. 11, pp. 14285–14304, 2018.
  • [15] Y. Zhang, Y. Li and J. Su, “Iterative learning control for image feature extraction with multiple-image blends,” Eurasip J. Image Video Process., vol. 2018, no. 1, pp. 1–11, 2018.
  • [16] D. R. I. M. Setiadi, E. H. Rachmawanto and C. A. Sari, “Secure Image Steganography Algorithm Based on DCT with OTP Encryption,” J. Appl. Intell. Syst., vol. 2, no. 1, pp. 1–11, 2017.
  • [17] V. Thakur and M. Saikia, “Hiding secret image in video,” ISSP 2013 - Int. Conf. Intell. Syst. Signal Process., pp. 150–153, 2013.
  • [18] R. Jhingran, V. Thada and S. Dhaka, “A Study on Cryptography using Genetic Algorithm,” Int. J. Comput. Appl., vol. 118, no. 20, pp. 10–14, 2015.
  • [19] H. M. Mousa, “DNA-Genetic Encryption Technique,” Int. J. Comput. Netw. Inf. Secur., vol. 8, no. 7, pp. 1–9, 2016.
  • [20] M. A. F. Al-Husainy, “A novel encryption method for image security,” Int. J. Secur. its Appl., vol. 6, no. 1, pp. 1–8, 2012.
  • [21] P. Li, C. N. Yang and Q. Kong, “A novel two-in-one image secret sharing scheme based on perfect black visual cryptography,” J. Real-Time Image Process., vol. 14, no. 1, pp. 41–50, 2018.
  • [22] J. Chao et al., “CaRENets: Compact and Resource-Efficient CNN for Homomorphic Inference on Encrypted Medical Images,” 2019.
  • [23] R. McPherson, R. Shokri and V. Shmatikov, “Defeating Image Obfuscation with Deep Learning,” 2016.
  • [24] K. K. S. Pareek, K. Narendra K and V. Patidar, “A Symmetric Encryption Scheme for Colour BMP Images,” IJCA Spec. Issue “Network Secur. Cryptogr., no. March 2014, pp. 42–46, 2011.
  • [25] X. J. Tong, M. Zhang, Z. Wang, Y. Liu, H. Xu and J. Ma, “A fast encryption algorithm of color image based on four-dimensional chaotic system,” J. Vis. Commun. Image Represent., vol. 33, pp. 219–234, 2015.
  • [26] H. I. Hsiao and J. Lee, “Color image encryption using chaotic nonlinear adaptive filter,” Signal Processing, vol. 117, pp. 281–309, 2015.
  • [27] Y. Zhou, L. Bao and C. L. P. Chen, “A new 1D chaotic system for image encryption,” Signal Processing, vol. 97, pp. 172–182, 2014.
  • [28] S. S. Askar, A. A. Karawia, A. Al-Khedhairi and F. S. Al-Ammar, “An algorithm of image encryption using logistic and two-dimensional chaotic economic maps,” Entropy, vol. 21, no. 1, pp. 1–17, 2019.
  • [29] C. Zhu, “A novel image encryption scheme based on improved hyperchaotic sequences,” Opt. Commun., vol. 285, no. 1, pp. 29–37, 2012.
  • [30] N. Bigdeli, Y. Farid and K. Afshar, “A robust hybrid method for image encryption based on Hopfield neural network,” Comput. Electr. Eng., vol. 38, no. 2, pp. 356–369, 2012.
  • [31] L. Wang, H. Song and P. Liu, “A novel hybrid color image encryption algorithm using two complex chaotic systems,” Opt. Lasers Eng., vol. 77, pp. 118–125, 2016.
  • [32] S. S. Askar, A. A. Karawia, and A. Alshamrani, “Image encryption algorithm based on chaotic economic model,” Math. Probl. Eng., vol. 2015, 2015.
  • [33] T. Kumar and S. Chauhan, “Image Cryptography with Matrix Array Symmetric Key using Chaos based Approach,” Int. J. Comput. Netw. Inf. Secur., vol. 10, no. 3, pp. 60–66, 2018.
  • [34] Y. Abanda and A. Tiedeu, “Image encryption by chaos mixing,” IET Image Process., vol. 10, no. 10, pp. 742–750, 2016.
  • [35] R. Roy, A. Sarkar and S. Changder, “Chaos based Edge Adaptive Image Steganography,” Procedia Technol., vol. 10, pp. 138–146, 2013.
  • [36] X. Wang, L. Teng, and X. Qin, “A novel colour image encryption algorithm based on chaos,” Signal Processing, vol. 92, no. 4, pp. 1101–1108, 2012.
  • [37] Z. Wang, F. Min, and E. Wang, “A new hyperchaotic circuit with two memristors and its application in image encryption,” AIP Adv., vol. 6, no. 9, 2016.
  • [38] M. A. Hussain and P. Bora, “A Highly Secure Digital Image Steganography Technique Using Chaotic Logistic Map and Support Image,” ICICSP 2018–IEEE Int. Conf. Inf. Commun. Signal Process. no. Icsp, pp. 69–73, 2018.
  • [39] R. Rhouma, S. Meherzi and S. Belghith, “OCML-based colour image encryption,” Chaos, Solitons and Fractals, vol. 40, no. 1, pp. 309–318, 2009.
  • [40] X. Wang and D. Zhao, “Fully phase multiple-image encryption based on superposition principle and the digital holographic technique,” Opt. Commun., vol. 285, no. 21–22, pp. 4280–4284, 2012.
  • [41] S. Dogan, “A New Approach for Data Hiding based on Pixel Pairs and Chaotic Map,” Int. J. Comput. Netw. Inf. Secur., vol. 10, no. 1, pp.1–9, 2018.
  • [42] Y. Luo, M. Du and J. Liu, “A symmetrical image encryption scheme in wavelet and time domain,” Commun. Nonlinear Sci. Numer. Simul., vol. 20, no. 2, pp. 447–460, 2015.
  • [43] M. A. Murillo-Escobar, C. Cruz-Hernández, F. Abundiz-Pérez, R. M. López-Gutiérrez and O. R. Acosta Del Campo, “A RGB image encryption algorithm based on total plain image characteristics and chaos,” Signal Processing, vol. 109, pp. 119–131, 2015.
  • [44] B. Isac and V. Santhi, “A Study on Digital Image and Video Watermarking Schemes using Neural Networks,” Int. J. Comput. Appl., vol. 12, no. 9, pp. 1–6, 2011.
  • [45] E. Hesamifard, H. Takabi and M. Ghasemi, “CryptoDL: Deep Neural Networks over Encrypted Data,” pp. 1–21, 2017.
  • [46] P. Xie, M. Bilenko, T. Finley, R. Gilad-Bachrach, K. Lauter and M. Naehrig, “Crypto-Nets: Neural Networks over Encrypted Data,” pp. 1–9, 2014.
  • [47] A. A. Zaidan, B. B. Zaidan, Y. A. Taqa, M. K. Sami, G. M. Alam and A. H. Jalab, “Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem,” Int. J. Phys. Sci., vol. 5, no. 11, pp. 1776–1786, 2010.
  • [48] X. Li, Y. Jiang, M. Chen and F. Li, “Research on iris image encryption based on deep learning,” Eurasip J. Image Video Process., vol. 2018, no. 1, 2018.
  • [49] J. Ye, J. Ni and Y. Yi, “Deep Learning Hierarchical Representations for Image Steganalysis,” IEEE Trans. Inf. Forensics Secur., vol. 12, no. 11, pp. 2545–2557, 2017.
  • [50] Y. Qin, C. Zhang, R. Liang and M. Chen, “Research on Face Image Encryption Based on Deep Learning,” IOP Conf. Ser. Earth Environ. Sci., vol. 252, no. 5, 2019.
  • [51] K. R. Saraf, V. P. Jagtap and A. K. Mishra, “Text and Image Encryption Decryption Using Advanced Encryption Standard,” Int. J. Emerg. Trends Technol. Comput. Sci., vol. 3, no. 3, p. 118, 2014.
  • [52] W. Zhang, K. Ma and N. Yu, “Reversibility improved data hiding in encrypted images,” Signal Processing, vol. 94, no. 1, pp. 118–127, 2014.
  • [53] M. Joseph, “Mosaic Image Steganography Based Colour Transformation for Enhanced Security,” pp. 149–156, 2015.
  • [54] V. Nagaraj, V. Vijayalakshmi and G. Zayaraz, “Color Image Steganography based on Pixel Value Modification Method Using Modulus Function,” IERI Procedia, vol. 4, pp. 17–24, 2013.
  • [55] M. Tanaka, “Learnable Image Encryption,” ICCE-TW 2018-IEEE Int. Conf. Consum. Electron., pp. 1–2, 2018.
  • [56] Q. A. Kester and K. M. Koumadi, “Cryptographie technique for image encryption based on the RGB pixel displacement,” ICAST 2012–IEEE 4th Int. Conf. Adapt. Sci. Technol., pp. 74–77, 2012.
  • [57] X. Li, J. Li, B. Li and B. Yang, “High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion,” Signal Processing, vol. 93, no. 1, pp. 198–205, 2013.
  • [58] A. Pradhan, K. R. Sekhar and G. Swain, “Adaptive PVD steganography using horizontal, vertical, and diagonal edges in six-pixel blocks,” Secur. Commun. Networks, vol. 2017.
  • [59] D. Rawat and V. Bhandari, “A Steganography Technique for Hiding Image in an Image using LSB Method for 24 Bit Color Image,” Int. J. Comput. Appl., vol. 64, no. 20, pp. 15–19, 2013.
  • [60] N. Jiang, N. Zhao and L. Wang, “LSB Based Quantum Image Steganography Algorithm,” Int. J. Theor. Phys., vol. 55, no. 1, pp. 107–123, 2016.
  • [61] N. Akhtar, P. Johri and S. Khan, “Enhancing the security and quality of lsb based image steganography,” CICN 2013–5th Int. Conf. Comput. Intell. Commun. Networks, pp. 385–390, 2013.
  • [62] R. E. Castillo, P. J. M. Castro, G. T. Cayabyab and M. Rachel Aton, “Blocksight: A mobile image encryption using advanced encryption standard and least significant bit algorithm,” ACM International Conference no. November, pp. 117–121, 2018.
  • [63] Rojali, A. G. Salman and G. George, “Website-based PNG image steganography using the modified Vigenere Cipher, least significant bit, and dictionary based compression methods,” AIP Conference, vol. 1867, 2017.
  • [64] M. O. Al-Dwairi, A. Y. Hendi and Z. A. Alqadi, “An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images,” Technol. Appl. Sci. Res., vol. 9, no. 3, pp. 4165–4168, 2019.
  • [65] M. Saritha, V. M. Khadabadi and M. Sushravya, “Image and text steganography with cryptography using MATLAB,” Int. Conf. Signal Process. Commun. Power Embed. Syst. SCOPES 2016, pp. 584–587, 2017.
  • [66] R. Rasras, Z. AlQadi and M. Sara, “A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages,” Eng. Technol. Appl. Sci. Res., vol. 9, no. 1, pp. 3681–3684, 2019.
  • [67] Z. Wang, Z. Yin and X. Zhang, “Distortion Function for JPEG Steganography Based on Image Texture and Correlation in DCT Domain,” IETE Tech. Rev. (Institution Electron. Telecommun. Eng. India), vol. 35, no. 4, pp. 351–358, 2018.
  • [68] C. N. Yang, C. Kim and Y. H. Lo, “Adaptive real-time reversible data hiding for JPEG images,” J. Real-Time Image Process., vol. 14, no. 1, pp. 147–157, 2018.
  • [69] F. Huang, J. Huang and Y. Q. Shi, “New channel selection rule for JPEG steganography,” IEEE Trans. Inf. Forensics Secur., vol. 7, no. 4, pp. 1181–1191, 2012.
  • [70] M. Kumar, D. C. Mishra and R. K. Sharma, “A first approach on an RGB image encryption,” Opt. Lasers Eng., vol. 52, no. 1, pp. 27–34, 2014.
  • [71] Y. C. Chen, T. H. Hung, S. H. Hsieh and C. W. Shiu, “A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret Sharing and Lightweight Cryptographic Algorithms,” IEEE Trans. Inf. Forensics Secur., vol. 14, no. 12, pp. 3332–3343, 2019.
  • [72] C. Qin and X. Zhang, “Effective reversible data hiding in encrypted image with privacy protection for image content,” J. Vis. Commun. Image Represent., vol. 31, pp. 154–164, 2015.
  • [73] Z. Zhang, G. Fu, F. Di, C. Li and J. Liu, “Generative Reversible Data Hiding by Image-to-Image Translation via GANs,” Secur. Commun. Networks, vol. 2019, 2019.
  • [74] Y. Su, Y. Wo and G. Han, “Reversible cellular automata image encryption for similarity search,” Signal Process. Image Commun., vol. 72, no. December 2018, pp. 134–147, 2019.
  • [75] X. Zhang, “Reversible data hiding in encrypted image,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, 2011.
  • [76] H. Nematzadeh, R. Enayatifar, H. Motameni, F. G. Guimarães and V. N. Coelho, “Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices,” Opt. Lasers Eng., vol. 110, no. May, pp. 24–32, 2018.
  • [77] A. Devi, A. Sharma and A. Rangra, “A Review on DES, AES and Blowfish for Image Encryption & Decryption,” Int. J. Eng. Comput. Sci., vol. 4, no. 6, pp. 12646–12651, 2015.
  • [78] K. Muhammad, J. Ahmad, H. Farman, Z. Jan, M. Sajjad and S. W. Baik, “A secure method for color image steganography using gray-level modification and multi-level encryption,” KSII Trans. Internet Inf. Syst., vol. 9, no. 5, pp. 1938–1962, 2015.
  • [79] S. B. Suryawanshi and D. D. Nawgaje, “a Triple-Key Chaotic Neural Network for Cryptography in Image Processing,” Int. J. Eng. Sci. Emerg. Technol., vol. 2, no. 1, pp. 2231–6604, 2012.
  • [80] K. Ratnavelu, M. Kalpana, P. Balasubramaniam, K. Wong and P. Raveendran, “Image encryption method based on chaotic fuzzy cellular neural networks,” Signal Processing, vol. 140, pp. 87–96, 2017.
  • [81] R. Guesmi, M. A. Ben Farah, A. Kachouri and M. Samet, “Hash key-based image encryption using crossover operator and chaos,” Multimed. Tools Appl., vol. 75, no. 8, pp. 4753–4769, 2016.
  • [82] Q. Zhang, L. Liu and X. Wei, “Improved algorithm for image encryption based on DNA encoding and multi-chaotic maps,” AEU– Int. J. Electron. Commun., vol. 68, no. 3, pp. 186–192, 2014.
  • [83] P. Gholve and H. A. Hingoliwala, “Lossless and Reversible Data Hiding in Asymmetric Cryptography,” Int. J. Sci. Res., vol. 4, no. 12, pp. 1984–1987, 2015.
  • [84] N. R. Zhou, T. X. Hua, L. H. Gong, D. J. Pei and Q. H. Liao, “Quantum image encryption based on generalized Arnold transform and double random-phase encoding,” Quantum Inf. Process., vol. 14, no. 4, pp. 1193–1213, 2015.
  • [85] K. Muhammad, J. Ahmad, M. Sajjad and M. Zubair, “Secure Image Steganography Using Cryptography and Image,” no. February 2015, pp. 1–22.
  • [86] X. Li, Z. Xie, J. Wu and T. Li, “Image Encryption Based on Dynamic Filtering and Bit Cuboid Operations,” Complexity, vol. 2019, 2019.
  • [87] X. Chai, X. Fu, Z. Gan, Y. Lu and Y. Chen, “A color image cryptosystem based on dynamic DNA encryption and chaos,” Signal Processing, vol. 155, pp. 44–62, 2019.
  • [88] D. Nofriansyah et al., “A New Image Encryption Technique Combining Hill Cipher Method, Morse Code and Least Significant Bit Algorithm,” J. Phys. Conf. Ser., vol. 954, no. 1, 2018.
  • [89] K. Joshi and R. Yadav, “A new LSB-S image steganography method blend with Cryptography for secret communication,”. ICIIP 2015 - 3rd Int. Conf. Image Inf. Process. pp. 86–90, 2016.
  • [90] C. A. Sari, E. H. Rachmawanto and E. J. Kusuma, “Good Performance Images Encryption Using Selective Bit T-Des on Inverted Lsb Steganography,” J. Ilmu Komput. dan Inf., vol. 12, no. 1, p. 41, 2019.
  • [91] S. Usha, G. A. S. Kumar and K. Boopathybagan, “A secure triple level encryption method using cryptography and steganography,” ICCSNT 2011-Int. Conf. Comput. Sci. Netw. Technol., vol. 2, pp. 1017–1020, 2011.
  • [92] M. Stanek, “Insu cient properties of image encryption algorithms,” pp. 1–6.
  • [93] J. S. Khan and J. Ahmad, “Chaos based efficient selective image encryption,” Multidimens. Syst. Signal Process., vol. 30, no. 2, pp. 943–961, 2019.
  • [94] M. Prakash, P. Balasubramaniam and S. Lakshmanan, “Synchronization of Markovian jumping inertial neural networks and its applications in image encryption,” Neural Networks, vol. 83, pp. 86–93, 2016.
  • [95] L. Gong, X. Liu, F. Zheng and N. Zhou, “Flexible multiple-image encryption algorithm based on log-polar transform and double random phase encoding technique,” J. Mod. Opt., vol. 60, no. 13, pp. 1074–1082, 2013.
  • [96] M. Sharifzadeh, C. Agarwal, M. Salarian and D. Schonfeld, “A New Parallel Message-distribution Technique for Cost-based Steganography,” pp. 3–7, 2017.
  • [97] B. Oktavianto, T. W. Purboyo and R. E. Saputra, “A proposed method for secure steganography on png image using spread spectrum method and modified encryption,” Int. J. Appl. Eng. Res., vol. 12, no. 21, pp. 10570–10576, 2017.
  • [98] Y. Chen, S. Chien and H. Lin, “True Color Image Steganography Using Palette and Minimum Spanning Tree,” pp. 273–278.
  • [99] J. Wu, X. Liao and B. Yang, “Color image encryption based on chaotic systems and elliptic curve ElGamal scheme,” Signal Processing, vol. 141, pp. 109–124, 2017.
  • [100] R. Bost, R. A. Popa, S. Tu and S. Goldwasser, “Machine Learning Classification over Encrypted Data,” no. February, pp. 8–11, 2015.
  • [101] R. Das and T. Tuithung, “A novel steganography method for image based on Huffman Encoding,” Proc. - 2012 3rd Natl. Conf. Emerg. Trends Appl. Comput. Sci. NCETACS-2012, pp. 14–18, 2012.
  • [102] P. Singh and P. K. Singh, “Image Encryption and Decryption,” vol. 4, no. 7, pp. 150–154, 2013.
  • [103] Z. Gan, X. Chai, M. Zhang and Y. Lu, “A double color image encryption scheme based on three-dimensional brownian motion,” Multimed. Tools Appl., vol. 77, no. 21, pp. 27919–27953, 2018.
  • [104] A. Abusukhon, M. N. Anwar, Z. Mohammad and B. Alghannam,“A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm,” J. Discret. Math. Sci. Cryptogr., vol. 22, no. 1, pp. 65–81, 2019.
  • [105] X. Wang, L. Feng and H. Zhao, “Fast image encryption algorithm based on parallel computing system,” Inf. Sci. (Ny)., vol. 486, pp. 340–358, 2019.
  • [106] J. B. Lima, E. A. O. Lima and F. Madeiro, “Image encryption based on the finite field cosine transform,” Signal Process. Image Commun., vol. 28, no. 10, pp. 1537–1547, 2013.
  • [107] Y. Zhou, W. Cao and C. L. Philip Chen, “Image encryption using binary bitplane,” Signal Processing, vol. 100, pp. 197–207, 2014.
  • [108] L. D. Singh and K. M. Singh, “Image Encryption using Elliptic Curve Cryptography,” Procedia Comput. Sci., vol. 54, pp. 472–481, 2015.
  • [109] S. J. Shyu, “Image encryption by multiple random grids,” Pattern Recognit., vol. 42, no. 7, pp. 1582–1596, 2009.
  • [110] M. K. Meena, S. Kumar, and N. Gupta, “Image Steganography tool using Adaptive Encoding Approach to maximize Image hiding capacity,” Soft Comput., no. 2, pp. 7–11, 2011.
  • [111] Andysah Putera Utama Siahaan, "RC4 Technique in Visual Cryptography RGB Image Encryption" SSRG International Journal of Computer Science and Engineering 3.7 (2016): 1-6.
  • [112] K. Ma, W. Zhang, X. Zhao, N. Yu and F. Li, “Reversible data hiding in encrypted images by reserving room before encryption,” IEEE Trans. Inf. Forensics Secur., vol. 8, no. 3, pp. 553–562, 2013.
  • [113] S. Dey, “SD-AEI: An advanced encryption technique for images:An advanced combined encryption technique for encrypting images using randomized byte manipulation,” ICDIPC 2012–2nd Int. Conf. Digit. Inf. Process. Commun. pp. 68–73, 2012.
  • [114] B. D. Parameshachari, K. M. S. Soyjaudah and D. K. A. Sumitrha, “Secure Transmission of an Image using Partial Encryption based Algorithm,” Int. J. Comput. Appl., vol. 63, no. 16, pp. 33–36, 2013.
  • [115] M. L. Piao, Z. X. Liu, Y. L. Piao, H. Y. Wu, Z. Yu and N. Kim, “Multi-depth three-dimensional image encryption based on the phase retrieval algorithm in the Fresnel and fractional Fourier transform domains,” Appl. Opt., vol. 57, no. 26, pp. 7609, 2018.
  • [116] N. Rahim, J. Ahmad, K. Muhammad, A. K. Sangaiah and S. W. Baik, “Privacy-preserving image retrieval for mobile devices with deep features on the cloud,” Comput. Commun., vol. 127, no. May, pp. 75–85, 2018.
  • [117] S. K, “An Optimal RSA Encryption Algorithm for Secret Images,” Int. J. Pure Appl. Math., vol. 118, no. 20, pp. 2491–2500, 2018.
  • [118] K. Madhusudhan Reddy, A. Itagi, S. Dabas and B. K. Prakash, “Image encryption using orthogonal Hill Cipher algorithm,” Int. J. Eng. Technol., vol. 7, no. 4, pp. 59–63, 2018.
  • [119] S. Hemalatha, U. D. Acharya, A. Renuka and P. R. Kamath, “A Secure and High Capacity Image Steganography Technique,” Signal Image Process. An Int. J., vol. 4, no. 1, pp. 83–89, 2013.
  • [120] S. Tedmori and N. Al-Najdawi, “Image cryptographic algorithm based on the Haar wavelet transform,” Inf. Sci. (Ny)., vol. 269, pp. 21–34, 2014.
  • [121] Y. Bassil, “Image Steganography based on a Parameterized Canny Edge Detection Algorithm,” Int. J. Comput. Appl., vol. 60, no. 4, pp. 35–40, 2012.
  • [122] R. G. Zhou, Q. Wu, M. Q. Zhang and C. Y. Shen, “Quantum Image Encryption and Decryption Algorithms Based on Quantum Image Geometric Transformations,” Int. J. Theor. Phys., vol. 52, no. 6, pp. 1802–1817, 2013.
  • [123] M. A. Albahar, O. Olawumi, K. Haataja and P. Toivanen, “a Novel Method for Bluetooth Pairing Using Steganography,” vol. 9, no. November 2003, pp. 53–66, 2017.
  • [124] M. Moradi and M.-R. Sadeghi, “Combining and Steganography of 3D Face Textures,” no. 3, pp. 3–8, 2017.
  • [125] A. Mehndiratta, “Data Hiding System Using Cryptography &; Steganography: A Comprehensive Modern Investigation,” Int. Res. J. Eng. Technol., vol. 2, no. 1, pp. 2395–56, 2015.
  • [126] K. Kaur and N. Garg, “Data Storage Security Using Steganography Techniques,” Int. J. Tech. Res. Appl., vol. 4, no. 6, pp. 93–98, 2016.
  • [127] B. S. H. Kumar and D. R. V. U. S. H. A. S. Hree, “Encrypting Images by Patch-Level Sparse Representation for High Capacity Reversible Data Hiding,” vol. 09, no. 01, pp. 1–8, 2017.
  • [128] P. Bas, “Natural Steganography: cover-source switching for better steganography,” pp. 1–13, 2016.
  • [129] M. J. Pelosi, G. Kessler, M. S. S. Brown and G. Kessler, “One-Time Pad Encryption Steganography System,” no. 2016.
  • [130] V. Holub, J. Fridrich and T. Denemark, “Universal distortion function for steganography in an arbitrary domain,” Eurasip J. Inf. Secur., vol. 2014, pp. 1–13, 2014.
  • [131] A. A. Abu Aziz, H. N.Qunoo, and A. A. Abu Samra, “Using Homomorphic Cryptographic Solutions on E-voting Systems,” Int. J. Comput. Netw. Inf. Secur., vol. 10, no. 1, pp. 44–59, 2018.

Görüntü Şifreleme Yöntemlerinin Kapsamlı Bir İncelemesi

Year 2022, Volume: 7 Issue: 1, 27 - 49, 29.04.2022
https://doi.org/10.46578/humder.1066545

Abstract

Günümüz teknoloji dünyasında veri güvenliği büyük önem taşımaktadır. Her veri türünün kendine has özellikleri olduğu için bu güvenliği sağlamanın çeşitli yöntemleri vardır. Bu çalışmanın ana konusu, metin verilerinden daha karmaşık yapılar olan görüntü verilerinin güvenliğidir. Görüntü veri türlerinde güvenliği sağlamak için tek başına geleneksel şifreleme yöntemlerini kullanmak güvenlik zafiyetleri yaratabilir. Bu nedenle günümüzde görüntü verilerini şifrelemek için bazı geleneksel yöntemler birbiriyle veya farklı yöntemler ile birleştirilmektedir. Bu çalışmada 131 makale incelenmiş ve görüntü şifreleme yöntemleri içerdikleri geleneksel yöntemlere göre sınıflandırılmıştır. Hem renkli hem de gri seviyeli görüntüler üzerinde yapılan çalışmalar birlikte ele alınmıştır. Son olarak makalelerde kullanılan görseller birçok yönden birbirleriyle karşılaştırılmış ve sonuçlar grafiksel olarak sunulmuştur.

References

  • [1] C. K. Volos, I. M. Kyprianidis and I. N. Stouboulos, “Image encryption process based on chaotic synchronization phenomena,” Signal Processing, vol. 93, no. 5, pp. 1328–1340, 2013.
  • [2] A. Kanso and M. Ghebleh, “An algorithm for encryption of secret images into meaningful images,” Opt. Lasers Eng., vol. 90, no. 2016, pp. 196–208, 2017.
  • [3] G. Srividya and P. Nandakumar, “A Triple-Key chaotic image encryption method,” ICCSP 2011–Int. Conf. Commun. Signal Process., pp. 266–270, 2011.
  • [4] A. V. Diaconu and K. Loukhaoukha, “An improved secure image encryption algorithm based on rubik’s cube principle and digital chaotic cipher,” Math. Probl. Eng., vol. 2013, no. 1, 2013.
  • [5] X. Wu, Y. Li and J. Kurths, “A new color image encryption scheme using CML and a fractional-order chaotic system,” PLoS One, vol. 10, no. 3, pp. 1–28, 2015.
  • [6] K. Muhammad, M. Sajjad, I. Mehmood, S. Rho and S. W. Baik, “Image steganography using uncorrelated color space and its application for security of visual contents in online social networks,” Futur. Gener. Comput. Syst., vol. 86, pp. 951–960, 2018.
  • [7] K. Muhammad, J. Ahmad, H. Farman and M. Zubair, “A Novel Image Steganographic Approach for Hiding Text in Color Images using HSI Color Model,” pp. 11, 2015.
  • [8] A. M. Shaheen, T. R. Sheltami, T. M. Al-Kharoubi and E. Shakshuki, “Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT,” J. Ambient Intell. Humaniz. Comput., vol. 10, no. 12, pp. 4733–4750, 2019.
  • [9] H. R. Kanan and B. Nazeri, “A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm,” Expert Syst. Appl., vol. 41, no. 14, pp. 6123–6130, 2014, doi: 10.1016/j.eswa.2014.04.022.
  • [10] K. Shankar, M. Elhoseny, R. S. Kumar, S. K. Lakshmanaprabu and X. Yuan, “Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique,” J. Ambient Intell. Humaniz. Comput., vol. 11, no. 5, pp. 1821–1833, 2020.
  • [11] S. Bukhari, M. S. Arif, M. R. Anjum and S. Dilbar, “Enhancing security of images by Steganography and Cryptography techniques,” INTECH 2016–6th Int. Conf. Innov. Comput. Technol., pp. 531–534, 2017.
  • [12] G. Ye, C. Pan, X. Huang and Q. Mei, “An efficient pixel-level chaotic image encryption algorithm,” Nonlinear Dyn., vol. 94, no. 1, pp. 745–756, 2018.
  • [13] H. Kaur and A. Kakkar, “Comparison of different image formats using LSB Steganography,” ISPCC 2017 - 4th IEEE Int. Conf. Signal Process. Comput. Control. pp. 97–101, 2017.
  • [14] F. Han, X. Liao, B. Yang and Y. Zhang, “A hybrid scheme for self-adaptive double color-image encryption,” Multimed. Tools Appl., vol. 77, no. 11, pp. 14285–14304, 2018.
  • [15] Y. Zhang, Y. Li and J. Su, “Iterative learning control for image feature extraction with multiple-image blends,” Eurasip J. Image Video Process., vol. 2018, no. 1, pp. 1–11, 2018.
  • [16] D. R. I. M. Setiadi, E. H. Rachmawanto and C. A. Sari, “Secure Image Steganography Algorithm Based on DCT with OTP Encryption,” J. Appl. Intell. Syst., vol. 2, no. 1, pp. 1–11, 2017.
  • [17] V. Thakur and M. Saikia, “Hiding secret image in video,” ISSP 2013 - Int. Conf. Intell. Syst. Signal Process., pp. 150–153, 2013.
  • [18] R. Jhingran, V. Thada and S. Dhaka, “A Study on Cryptography using Genetic Algorithm,” Int. J. Comput. Appl., vol. 118, no. 20, pp. 10–14, 2015.
  • [19] H. M. Mousa, “DNA-Genetic Encryption Technique,” Int. J. Comput. Netw. Inf. Secur., vol. 8, no. 7, pp. 1–9, 2016.
  • [20] M. A. F. Al-Husainy, “A novel encryption method for image security,” Int. J. Secur. its Appl., vol. 6, no. 1, pp. 1–8, 2012.
  • [21] P. Li, C. N. Yang and Q. Kong, “A novel two-in-one image secret sharing scheme based on perfect black visual cryptography,” J. Real-Time Image Process., vol. 14, no. 1, pp. 41–50, 2018.
  • [22] J. Chao et al., “CaRENets: Compact and Resource-Efficient CNN for Homomorphic Inference on Encrypted Medical Images,” 2019.
  • [23] R. McPherson, R. Shokri and V. Shmatikov, “Defeating Image Obfuscation with Deep Learning,” 2016.
  • [24] K. K. S. Pareek, K. Narendra K and V. Patidar, “A Symmetric Encryption Scheme for Colour BMP Images,” IJCA Spec. Issue “Network Secur. Cryptogr., no. March 2014, pp. 42–46, 2011.
  • [25] X. J. Tong, M. Zhang, Z. Wang, Y. Liu, H. Xu and J. Ma, “A fast encryption algorithm of color image based on four-dimensional chaotic system,” J. Vis. Commun. Image Represent., vol. 33, pp. 219–234, 2015.
  • [26] H. I. Hsiao and J. Lee, “Color image encryption using chaotic nonlinear adaptive filter,” Signal Processing, vol. 117, pp. 281–309, 2015.
  • [27] Y. Zhou, L. Bao and C. L. P. Chen, “A new 1D chaotic system for image encryption,” Signal Processing, vol. 97, pp. 172–182, 2014.
  • [28] S. S. Askar, A. A. Karawia, A. Al-Khedhairi and F. S. Al-Ammar, “An algorithm of image encryption using logistic and two-dimensional chaotic economic maps,” Entropy, vol. 21, no. 1, pp. 1–17, 2019.
  • [29] C. Zhu, “A novel image encryption scheme based on improved hyperchaotic sequences,” Opt. Commun., vol. 285, no. 1, pp. 29–37, 2012.
  • [30] N. Bigdeli, Y. Farid and K. Afshar, “A robust hybrid method for image encryption based on Hopfield neural network,” Comput. Electr. Eng., vol. 38, no. 2, pp. 356–369, 2012.
  • [31] L. Wang, H. Song and P. Liu, “A novel hybrid color image encryption algorithm using two complex chaotic systems,” Opt. Lasers Eng., vol. 77, pp. 118–125, 2016.
  • [32] S. S. Askar, A. A. Karawia, and A. Alshamrani, “Image encryption algorithm based on chaotic economic model,” Math. Probl. Eng., vol. 2015, 2015.
  • [33] T. Kumar and S. Chauhan, “Image Cryptography with Matrix Array Symmetric Key using Chaos based Approach,” Int. J. Comput. Netw. Inf. Secur., vol. 10, no. 3, pp. 60–66, 2018.
  • [34] Y. Abanda and A. Tiedeu, “Image encryption by chaos mixing,” IET Image Process., vol. 10, no. 10, pp. 742–750, 2016.
  • [35] R. Roy, A. Sarkar and S. Changder, “Chaos based Edge Adaptive Image Steganography,” Procedia Technol., vol. 10, pp. 138–146, 2013.
  • [36] X. Wang, L. Teng, and X. Qin, “A novel colour image encryption algorithm based on chaos,” Signal Processing, vol. 92, no. 4, pp. 1101–1108, 2012.
  • [37] Z. Wang, F. Min, and E. Wang, “A new hyperchaotic circuit with two memristors and its application in image encryption,” AIP Adv., vol. 6, no. 9, 2016.
  • [38] M. A. Hussain and P. Bora, “A Highly Secure Digital Image Steganography Technique Using Chaotic Logistic Map and Support Image,” ICICSP 2018–IEEE Int. Conf. Inf. Commun. Signal Process. no. Icsp, pp. 69–73, 2018.
  • [39] R. Rhouma, S. Meherzi and S. Belghith, “OCML-based colour image encryption,” Chaos, Solitons and Fractals, vol. 40, no. 1, pp. 309–318, 2009.
  • [40] X. Wang and D. Zhao, “Fully phase multiple-image encryption based on superposition principle and the digital holographic technique,” Opt. Commun., vol. 285, no. 21–22, pp. 4280–4284, 2012.
  • [41] S. Dogan, “A New Approach for Data Hiding based on Pixel Pairs and Chaotic Map,” Int. J. Comput. Netw. Inf. Secur., vol. 10, no. 1, pp.1–9, 2018.
  • [42] Y. Luo, M. Du and J. Liu, “A symmetrical image encryption scheme in wavelet and time domain,” Commun. Nonlinear Sci. Numer. Simul., vol. 20, no. 2, pp. 447–460, 2015.
  • [43] M. A. Murillo-Escobar, C. Cruz-Hernández, F. Abundiz-Pérez, R. M. López-Gutiérrez and O. R. Acosta Del Campo, “A RGB image encryption algorithm based on total plain image characteristics and chaos,” Signal Processing, vol. 109, pp. 119–131, 2015.
  • [44] B. Isac and V. Santhi, “A Study on Digital Image and Video Watermarking Schemes using Neural Networks,” Int. J. Comput. Appl., vol. 12, no. 9, pp. 1–6, 2011.
  • [45] E. Hesamifard, H. Takabi and M. Ghasemi, “CryptoDL: Deep Neural Networks over Encrypted Data,” pp. 1–21, 2017.
  • [46] P. Xie, M. Bilenko, T. Finley, R. Gilad-Bachrach, K. Lauter and M. Naehrig, “Crypto-Nets: Neural Networks over Encrypted Data,” pp. 1–9, 2014.
  • [47] A. A. Zaidan, B. B. Zaidan, Y. A. Taqa, M. K. Sami, G. M. Alam and A. H. Jalab, “Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem,” Int. J. Phys. Sci., vol. 5, no. 11, pp. 1776–1786, 2010.
  • [48] X. Li, Y. Jiang, M. Chen and F. Li, “Research on iris image encryption based on deep learning,” Eurasip J. Image Video Process., vol. 2018, no. 1, 2018.
  • [49] J. Ye, J. Ni and Y. Yi, “Deep Learning Hierarchical Representations for Image Steganalysis,” IEEE Trans. Inf. Forensics Secur., vol. 12, no. 11, pp. 2545–2557, 2017.
  • [50] Y. Qin, C. Zhang, R. Liang and M. Chen, “Research on Face Image Encryption Based on Deep Learning,” IOP Conf. Ser. Earth Environ. Sci., vol. 252, no. 5, 2019.
  • [51] K. R. Saraf, V. P. Jagtap and A. K. Mishra, “Text and Image Encryption Decryption Using Advanced Encryption Standard,” Int. J. Emerg. Trends Technol. Comput. Sci., vol. 3, no. 3, p. 118, 2014.
  • [52] W. Zhang, K. Ma and N. Yu, “Reversibility improved data hiding in encrypted images,” Signal Processing, vol. 94, no. 1, pp. 118–127, 2014.
  • [53] M. Joseph, “Mosaic Image Steganography Based Colour Transformation for Enhanced Security,” pp. 149–156, 2015.
  • [54] V. Nagaraj, V. Vijayalakshmi and G. Zayaraz, “Color Image Steganography based on Pixel Value Modification Method Using Modulus Function,” IERI Procedia, vol. 4, pp. 17–24, 2013.
  • [55] M. Tanaka, “Learnable Image Encryption,” ICCE-TW 2018-IEEE Int. Conf. Consum. Electron., pp. 1–2, 2018.
  • [56] Q. A. Kester and K. M. Koumadi, “Cryptographie technique for image encryption based on the RGB pixel displacement,” ICAST 2012–IEEE 4th Int. Conf. Adapt. Sci. Technol., pp. 74–77, 2012.
  • [57] X. Li, J. Li, B. Li and B. Yang, “High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion,” Signal Processing, vol. 93, no. 1, pp. 198–205, 2013.
  • [58] A. Pradhan, K. R. Sekhar and G. Swain, “Adaptive PVD steganography using horizontal, vertical, and diagonal edges in six-pixel blocks,” Secur. Commun. Networks, vol. 2017.
  • [59] D. Rawat and V. Bhandari, “A Steganography Technique for Hiding Image in an Image using LSB Method for 24 Bit Color Image,” Int. J. Comput. Appl., vol. 64, no. 20, pp. 15–19, 2013.
  • [60] N. Jiang, N. Zhao and L. Wang, “LSB Based Quantum Image Steganography Algorithm,” Int. J. Theor. Phys., vol. 55, no. 1, pp. 107–123, 2016.
  • [61] N. Akhtar, P. Johri and S. Khan, “Enhancing the security and quality of lsb based image steganography,” CICN 2013–5th Int. Conf. Comput. Intell. Commun. Networks, pp. 385–390, 2013.
  • [62] R. E. Castillo, P. J. M. Castro, G. T. Cayabyab and M. Rachel Aton, “Blocksight: A mobile image encryption using advanced encryption standard and least significant bit algorithm,” ACM International Conference no. November, pp. 117–121, 2018.
  • [63] Rojali, A. G. Salman and G. George, “Website-based PNG image steganography using the modified Vigenere Cipher, least significant bit, and dictionary based compression methods,” AIP Conference, vol. 1867, 2017.
  • [64] M. O. Al-Dwairi, A. Y. Hendi and Z. A. Alqadi, “An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images,” Technol. Appl. Sci. Res., vol. 9, no. 3, pp. 4165–4168, 2019.
  • [65] M. Saritha, V. M. Khadabadi and M. Sushravya, “Image and text steganography with cryptography using MATLAB,” Int. Conf. Signal Process. Commun. Power Embed. Syst. SCOPES 2016, pp. 584–587, 2017.
  • [66] R. Rasras, Z. AlQadi and M. Sara, “A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages,” Eng. Technol. Appl. Sci. Res., vol. 9, no. 1, pp. 3681–3684, 2019.
  • [67] Z. Wang, Z. Yin and X. Zhang, “Distortion Function for JPEG Steganography Based on Image Texture and Correlation in DCT Domain,” IETE Tech. Rev. (Institution Electron. Telecommun. Eng. India), vol. 35, no. 4, pp. 351–358, 2018.
  • [68] C. N. Yang, C. Kim and Y. H. Lo, “Adaptive real-time reversible data hiding for JPEG images,” J. Real-Time Image Process., vol. 14, no. 1, pp. 147–157, 2018.
  • [69] F. Huang, J. Huang and Y. Q. Shi, “New channel selection rule for JPEG steganography,” IEEE Trans. Inf. Forensics Secur., vol. 7, no. 4, pp. 1181–1191, 2012.
  • [70] M. Kumar, D. C. Mishra and R. K. Sharma, “A first approach on an RGB image encryption,” Opt. Lasers Eng., vol. 52, no. 1, pp. 27–34, 2014.
  • [71] Y. C. Chen, T. H. Hung, S. H. Hsieh and C. W. Shiu, “A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret Sharing and Lightweight Cryptographic Algorithms,” IEEE Trans. Inf. Forensics Secur., vol. 14, no. 12, pp. 3332–3343, 2019.
  • [72] C. Qin and X. Zhang, “Effective reversible data hiding in encrypted image with privacy protection for image content,” J. Vis. Commun. Image Represent., vol. 31, pp. 154–164, 2015.
  • [73] Z. Zhang, G. Fu, F. Di, C. Li and J. Liu, “Generative Reversible Data Hiding by Image-to-Image Translation via GANs,” Secur. Commun. Networks, vol. 2019, 2019.
  • [74] Y. Su, Y. Wo and G. Han, “Reversible cellular automata image encryption for similarity search,” Signal Process. Image Commun., vol. 72, no. December 2018, pp. 134–147, 2019.
  • [75] X. Zhang, “Reversible data hiding in encrypted image,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, 2011.
  • [76] H. Nematzadeh, R. Enayatifar, H. Motameni, F. G. Guimarães and V. N. Coelho, “Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices,” Opt. Lasers Eng., vol. 110, no. May, pp. 24–32, 2018.
  • [77] A. Devi, A. Sharma and A. Rangra, “A Review on DES, AES and Blowfish for Image Encryption & Decryption,” Int. J. Eng. Comput. Sci., vol. 4, no. 6, pp. 12646–12651, 2015.
  • [78] K. Muhammad, J. Ahmad, H. Farman, Z. Jan, M. Sajjad and S. W. Baik, “A secure method for color image steganography using gray-level modification and multi-level encryption,” KSII Trans. Internet Inf. Syst., vol. 9, no. 5, pp. 1938–1962, 2015.
  • [79] S. B. Suryawanshi and D. D. Nawgaje, “a Triple-Key Chaotic Neural Network for Cryptography in Image Processing,” Int. J. Eng. Sci. Emerg. Technol., vol. 2, no. 1, pp. 2231–6604, 2012.
  • [80] K. Ratnavelu, M. Kalpana, P. Balasubramaniam, K. Wong and P. Raveendran, “Image encryption method based on chaotic fuzzy cellular neural networks,” Signal Processing, vol. 140, pp. 87–96, 2017.
  • [81] R. Guesmi, M. A. Ben Farah, A. Kachouri and M. Samet, “Hash key-based image encryption using crossover operator and chaos,” Multimed. Tools Appl., vol. 75, no. 8, pp. 4753–4769, 2016.
  • [82] Q. Zhang, L. Liu and X. Wei, “Improved algorithm for image encryption based on DNA encoding and multi-chaotic maps,” AEU– Int. J. Electron. Commun., vol. 68, no. 3, pp. 186–192, 2014.
  • [83] P. Gholve and H. A. Hingoliwala, “Lossless and Reversible Data Hiding in Asymmetric Cryptography,” Int. J. Sci. Res., vol. 4, no. 12, pp. 1984–1987, 2015.
  • [84] N. R. Zhou, T. X. Hua, L. H. Gong, D. J. Pei and Q. H. Liao, “Quantum image encryption based on generalized Arnold transform and double random-phase encoding,” Quantum Inf. Process., vol. 14, no. 4, pp. 1193–1213, 2015.
  • [85] K. Muhammad, J. Ahmad, M. Sajjad and M. Zubair, “Secure Image Steganography Using Cryptography and Image,” no. February 2015, pp. 1–22.
  • [86] X. Li, Z. Xie, J. Wu and T. Li, “Image Encryption Based on Dynamic Filtering and Bit Cuboid Operations,” Complexity, vol. 2019, 2019.
  • [87] X. Chai, X. Fu, Z. Gan, Y. Lu and Y. Chen, “A color image cryptosystem based on dynamic DNA encryption and chaos,” Signal Processing, vol. 155, pp. 44–62, 2019.
  • [88] D. Nofriansyah et al., “A New Image Encryption Technique Combining Hill Cipher Method, Morse Code and Least Significant Bit Algorithm,” J. Phys. Conf. Ser., vol. 954, no. 1, 2018.
  • [89] K. Joshi and R. Yadav, “A new LSB-S image steganography method blend with Cryptography for secret communication,”. ICIIP 2015 - 3rd Int. Conf. Image Inf. Process. pp. 86–90, 2016.
  • [90] C. A. Sari, E. H. Rachmawanto and E. J. Kusuma, “Good Performance Images Encryption Using Selective Bit T-Des on Inverted Lsb Steganography,” J. Ilmu Komput. dan Inf., vol. 12, no. 1, p. 41, 2019.
  • [91] S. Usha, G. A. S. Kumar and K. Boopathybagan, “A secure triple level encryption method using cryptography and steganography,” ICCSNT 2011-Int. Conf. Comput. Sci. Netw. Technol., vol. 2, pp. 1017–1020, 2011.
  • [92] M. Stanek, “Insu cient properties of image encryption algorithms,” pp. 1–6.
  • [93] J. S. Khan and J. Ahmad, “Chaos based efficient selective image encryption,” Multidimens. Syst. Signal Process., vol. 30, no. 2, pp. 943–961, 2019.
  • [94] M. Prakash, P. Balasubramaniam and S. Lakshmanan, “Synchronization of Markovian jumping inertial neural networks and its applications in image encryption,” Neural Networks, vol. 83, pp. 86–93, 2016.
  • [95] L. Gong, X. Liu, F. Zheng and N. Zhou, “Flexible multiple-image encryption algorithm based on log-polar transform and double random phase encoding technique,” J. Mod. Opt., vol. 60, no. 13, pp. 1074–1082, 2013.
  • [96] M. Sharifzadeh, C. Agarwal, M. Salarian and D. Schonfeld, “A New Parallel Message-distribution Technique for Cost-based Steganography,” pp. 3–7, 2017.
  • [97] B. Oktavianto, T. W. Purboyo and R. E. Saputra, “A proposed method for secure steganography on png image using spread spectrum method and modified encryption,” Int. J. Appl. Eng. Res., vol. 12, no. 21, pp. 10570–10576, 2017.
  • [98] Y. Chen, S. Chien and H. Lin, “True Color Image Steganography Using Palette and Minimum Spanning Tree,” pp. 273–278.
  • [99] J. Wu, X. Liao and B. Yang, “Color image encryption based on chaotic systems and elliptic curve ElGamal scheme,” Signal Processing, vol. 141, pp. 109–124, 2017.
  • [100] R. Bost, R. A. Popa, S. Tu and S. Goldwasser, “Machine Learning Classification over Encrypted Data,” no. February, pp. 8–11, 2015.
  • [101] R. Das and T. Tuithung, “A novel steganography method for image based on Huffman Encoding,” Proc. - 2012 3rd Natl. Conf. Emerg. Trends Appl. Comput. Sci. NCETACS-2012, pp. 14–18, 2012.
  • [102] P. Singh and P. K. Singh, “Image Encryption and Decryption,” vol. 4, no. 7, pp. 150–154, 2013.
  • [103] Z. Gan, X. Chai, M. Zhang and Y. Lu, “A double color image encryption scheme based on three-dimensional brownian motion,” Multimed. Tools Appl., vol. 77, no. 21, pp. 27919–27953, 2018.
  • [104] A. Abusukhon, M. N. Anwar, Z. Mohammad and B. Alghannam,“A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm,” J. Discret. Math. Sci. Cryptogr., vol. 22, no. 1, pp. 65–81, 2019.
  • [105] X. Wang, L. Feng and H. Zhao, “Fast image encryption algorithm based on parallel computing system,” Inf. Sci. (Ny)., vol. 486, pp. 340–358, 2019.
  • [106] J. B. Lima, E. A. O. Lima and F. Madeiro, “Image encryption based on the finite field cosine transform,” Signal Process. Image Commun., vol. 28, no. 10, pp. 1537–1547, 2013.
  • [107] Y. Zhou, W. Cao and C. L. Philip Chen, “Image encryption using binary bitplane,” Signal Processing, vol. 100, pp. 197–207, 2014.
  • [108] L. D. Singh and K. M. Singh, “Image Encryption using Elliptic Curve Cryptography,” Procedia Comput. Sci., vol. 54, pp. 472–481, 2015.
  • [109] S. J. Shyu, “Image encryption by multiple random grids,” Pattern Recognit., vol. 42, no. 7, pp. 1582–1596, 2009.
  • [110] M. K. Meena, S. Kumar, and N. Gupta, “Image Steganography tool using Adaptive Encoding Approach to maximize Image hiding capacity,” Soft Comput., no. 2, pp. 7–11, 2011.
  • [111] Andysah Putera Utama Siahaan, "RC4 Technique in Visual Cryptography RGB Image Encryption" SSRG International Journal of Computer Science and Engineering 3.7 (2016): 1-6.
  • [112] K. Ma, W. Zhang, X. Zhao, N. Yu and F. Li, “Reversible data hiding in encrypted images by reserving room before encryption,” IEEE Trans. Inf. Forensics Secur., vol. 8, no. 3, pp. 553–562, 2013.
  • [113] S. Dey, “SD-AEI: An advanced encryption technique for images:An advanced combined encryption technique for encrypting images using randomized byte manipulation,” ICDIPC 2012–2nd Int. Conf. Digit. Inf. Process. Commun. pp. 68–73, 2012.
  • [114] B. D. Parameshachari, K. M. S. Soyjaudah and D. K. A. Sumitrha, “Secure Transmission of an Image using Partial Encryption based Algorithm,” Int. J. Comput. Appl., vol. 63, no. 16, pp. 33–36, 2013.
  • [115] M. L. Piao, Z. X. Liu, Y. L. Piao, H. Y. Wu, Z. Yu and N. Kim, “Multi-depth three-dimensional image encryption based on the phase retrieval algorithm in the Fresnel and fractional Fourier transform domains,” Appl. Opt., vol. 57, no. 26, pp. 7609, 2018.
  • [116] N. Rahim, J. Ahmad, K. Muhammad, A. K. Sangaiah and S. W. Baik, “Privacy-preserving image retrieval for mobile devices with deep features on the cloud,” Comput. Commun., vol. 127, no. May, pp. 75–85, 2018.
  • [117] S. K, “An Optimal RSA Encryption Algorithm for Secret Images,” Int. J. Pure Appl. Math., vol. 118, no. 20, pp. 2491–2500, 2018.
  • [118] K. Madhusudhan Reddy, A. Itagi, S. Dabas and B. K. Prakash, “Image encryption using orthogonal Hill Cipher algorithm,” Int. J. Eng. Technol., vol. 7, no. 4, pp. 59–63, 2018.
  • [119] S. Hemalatha, U. D. Acharya, A. Renuka and P. R. Kamath, “A Secure and High Capacity Image Steganography Technique,” Signal Image Process. An Int. J., vol. 4, no. 1, pp. 83–89, 2013.
  • [120] S. Tedmori and N. Al-Najdawi, “Image cryptographic algorithm based on the Haar wavelet transform,” Inf. Sci. (Ny)., vol. 269, pp. 21–34, 2014.
  • [121] Y. Bassil, “Image Steganography based on a Parameterized Canny Edge Detection Algorithm,” Int. J. Comput. Appl., vol. 60, no. 4, pp. 35–40, 2012.
  • [122] R. G. Zhou, Q. Wu, M. Q. Zhang and C. Y. Shen, “Quantum Image Encryption and Decryption Algorithms Based on Quantum Image Geometric Transformations,” Int. J. Theor. Phys., vol. 52, no. 6, pp. 1802–1817, 2013.
  • [123] M. A. Albahar, O. Olawumi, K. Haataja and P. Toivanen, “a Novel Method for Bluetooth Pairing Using Steganography,” vol. 9, no. November 2003, pp. 53–66, 2017.
  • [124] M. Moradi and M.-R. Sadeghi, “Combining and Steganography of 3D Face Textures,” no. 3, pp. 3–8, 2017.
  • [125] A. Mehndiratta, “Data Hiding System Using Cryptography &; Steganography: A Comprehensive Modern Investigation,” Int. Res. J. Eng. Technol., vol. 2, no. 1, pp. 2395–56, 2015.
  • [126] K. Kaur and N. Garg, “Data Storage Security Using Steganography Techniques,” Int. J. Tech. Res. Appl., vol. 4, no. 6, pp. 93–98, 2016.
  • [127] B. S. H. Kumar and D. R. V. U. S. H. A. S. Hree, “Encrypting Images by Patch-Level Sparse Representation for High Capacity Reversible Data Hiding,” vol. 09, no. 01, pp. 1–8, 2017.
  • [128] P. Bas, “Natural Steganography: cover-source switching for better steganography,” pp. 1–13, 2016.
  • [129] M. J. Pelosi, G. Kessler, M. S. S. Brown and G. Kessler, “One-Time Pad Encryption Steganography System,” no. 2016.
  • [130] V. Holub, J. Fridrich and T. Denemark, “Universal distortion function for steganography in an arbitrary domain,” Eurasip J. Inf. Secur., vol. 2014, pp. 1–13, 2014.
  • [131] A. A. Abu Aziz, H. N.Qunoo, and A. A. Abu Samra, “Using Homomorphic Cryptographic Solutions on E-voting Systems,” Int. J. Comput. Netw. Inf. Secur., vol. 10, no. 1, pp. 44–59, 2018.
There are 131 citations in total.

Details

Primary Language English
Subjects Computer Software
Journal Section Review Articles
Authors

Cihan Tiken 0000-0001-7844-2579

Ruya Samlı 0000-0002-8723-1228

Early Pub Date April 29, 2022
Publication Date April 29, 2022
Submission Date February 1, 2022
Acceptance Date April 5, 2022
Published in Issue Year 2022 Volume: 7 Issue: 1

Cite

APA Tiken, C., & Samlı, R. (2022). A Comprehensive Review About Image Encryption Methods. Harran Üniversitesi Mühendislik Dergisi, 7(1), 27-49. https://doi.org/10.46578/humder.1066545