International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 2- Issue 4, April 2013 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Secure Image Encryption Algorithms: A Review

[Full Text]



Lini Abraham, Neenu Daniel



Index Terms: - Cryptography, Image encryption, Decryption, NPCR, UACI, Entropy, NCML



Abstract: - Image encryption plays an important role in the field of information security. Most of the image encryption techniques have some security and performance issues. So there is a need to compare them to determine which method is suitable for the application. Chaos based encryption algorithms are employed nowadays because of their better security and performance aspects. Chaotic behavior of a system is the sophisticated nature of a nonlinear system that looks random. This work is a review of two novel chaos based image encryption algorithms, namely a secure image encryption algorithm based on Rubik's cube principle and a new chaos-based fast image encryption algorithm in terms of the parameters like NPCR, UACI, Entropy and Correlation coefficient.



[1] Zhi-Hong Guan, Fangjun Huang, Wenjie Guan, “Chaos-based image encryption algorithm”, Physics Letters A 346, Elsevier, 2005.

[2] Mitra, Y. V. Subba Rao and S. R. M. Prasanna, “A New Image Encryption Approach using Combinational Permutation Techniques”, International Journal of Electrical and Computer Engineering 1:2, communications on ACM, 2006.

[3] M.Zeghid, M.Machhout, L.khriji, A. Baganne, and R.Tourki,” A modified AES based algorithm for image Encryption”, World Academy of Science, Engineering and Technology 3, 2007.

[4] Zhi-liang Zhu, Wei Zhang, Kwok-wo Wong, Hai Yu, “A chaos-based symmetric image encryption scheme using a bit-level permutation”, Information Sciences 181 1171–1186 Elsevier, 2010.

[5] G. Zhang and Q. Liu, “A novel image encryption method based on total shuffling scheme,” Optics Communications, vol. 284, no. 12, pp. 2775–2780, 2011.

[6] Ismail1, Mohammed Amin, Hossam Diab, “ A Digital Image Encryption Algorithm Based A Composition Of Two Chaotic Logistic Maps”, Proc. 27th IEEE Int’l Conf. Signal Processing., pp. 733-739,2011.

[7] H.Alsafasfeh, and, A.A.Arfoa, Image encryption based on the general approach for multiple chaotic system, Journal of Signal and Information Processing 2, 238-244, 2011.

[8] Khaled Loukhaoukha, Jean-Yves Chouinard, and Abdellah Berdai, “A Secure Image Encryption Algorithm Based on Rubik’s Cube Principle”, Department of Electrical and Computer Engineering, Laval University, QC, Canada G1K 7P4, 2011.

[9] Yong Wanga, Kwok-Wo Wong, Xiaofeng Liaoc, Guanrong Chen, “A new chaos-based fast image encryption algorithm”, Applied Soft Computing, Elsevier,2011.

[10] K. Kaneko, Pattern dynamics in spatiotemporal chaos: pattern selection, diffusion of defect and pattern competition intermittency, Physica D (34) (1989)