A Survey of Image Encryption Algorithms
Security of data/images is one of the crucial aspects in the gigantic and still expanding domain of digital transfer. Encryption of images is one of the well known mechanisms to preserve confidentiality of images over a reliable unrestricted public media. This medium is vulnerable to attacks and hen...
Uloženo v:
| Vydáno v: | 3D research Ročník 8; číslo 4; s. 1 - 35 |
|---|---|
| Hlavní autoři: | , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Seoul
3D Display Research Center
01.12.2017
Springer Nature B.V |
| Témata: | |
| ISSN: | 2092-6731, 2092-6731 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Security of data/images is one of the crucial aspects in the gigantic and still expanding domain of digital transfer. Encryption of images is one of the well known mechanisms to preserve confidentiality of images over a reliable unrestricted public media. This medium is vulnerable to attacks and hence efficient encryption algorithms are necessity for secure data transfer. Various techniques have been proposed in literature till date, each have an edge over the other, to catch-up to the ever growing need of security. This paper is an effort to compare the most popular techniques available on the basis of various performance metrics like differential, statistical and quantitative attacks analysis. To measure the efficacy, all the modern and grown-up techniques are implemented in MATLAB-2015. The results show that the chaotic schemes used in the study provide highly scrambled encrypted images having uniform histogram distribution. In addition, the encrypted images provided very less degree of correlation coefficient values in horizontal, vertical and diagonal directions, proving their resistance against statistical attacks. In addition, these schemes are able to resist differential attacks as these showed a high sensitivity for the initial conditions, i.e. pixel and key values. Finally, the schemes provide a large key spacing, hence can resist the brute force attacks, and provided a very less computational time for image encryption/decryption in comparison to other schemes available in literature. |
|---|---|
| AbstractList | Security of data/images is one of the crucial aspects in the gigantic and still expanding domain of digital transfer. Encryption of images is one of the well known mechanisms to preserve confidentiality of images over a reliable unrestricted public media. This medium is vulnerable to attacks and hence efficient encryption algorithms are necessity for secure data transfer. Various techniques have been proposed in literature till date, each have an edge over the other, to catch-up to the ever growing need of security. This paper is an effort to compare the most popular techniques available on the basis of various performance metrics like differential, statistical and quantitative attacks analysis. To measure the efficacy, all the modern and grown-up techniques are implemented in MATLAB-2015. The results show that the chaotic schemes used in the study provide highly scrambled encrypted images having uniform histogram distribution. In addition, the encrypted images provided very less degree of correlation coefficient values in horizontal, vertical and diagonal directions, proving their resistance against statistical attacks. In addition, these schemes are able to resist differential attacks as these showed a high sensitivity for the initial conditions, i.e. pixel and key values. Finally, the schemes provide a large key spacing, hence can resist the brute force attacks, and provided a very less computational time for image encryption/decryption in comparison to other schemes available in literature. |
| ArticleNumber | 37 |
| Author | Kumari, Manju Gupta, Shailender Sardana, Pranshul |
| Author_xml | – sequence: 1 givenname: Manju surname: Kumari fullname: Kumari, Manju organization: YMCA University of Science and Technology – sequence: 2 givenname: Shailender surname: Gupta fullname: Gupta, Shailender email: shailender81@gmail.com organization: YMCA University of Science and Technology – sequence: 3 givenname: Pranshul surname: Sardana fullname: Sardana, Pranshul organization: YMCA University of Science and Technology |
| BookMark | eNp9kEFLw0AQhRepYK39Ad4CHjxFZ3aT3eRYSq2Fggf1vGySTUxJs3U3EfLv3RAPRdDDMHN437zHuyaz1rSakFuEBwQQjw4ZwzQEFH6iJIwvyJxCSkMuGM7O7iuydO4AAJhQjFI6J_er4LW3X3oITBnsjqrSwabN7XDqatMGq6Yytu4-ju6GXJaqcXr5sxfk_Wnztn4O9y_b3Xq1D3OGvAsLVAwgE5QWNKEACsoij7y9jgoalVxxVZSgeMYSLiBLdYJUZVBEIChmKmcLcjf9PVnz2WvXyYPpbestJaacxcgEoFeJSZVb45zVpczrTo2RO6vqRiLIsRg5FSN9MXIsRsaexF_kydZHZYd_GToxzmvbStuzTH9C3xfQdJY |
| CitedBy_id | crossref_primary_10_1007_s11071_019_05157_5 crossref_primary_10_3390_a13040101 crossref_primary_10_1007_s11042_022_13244_w crossref_primary_10_1007_s12065_021_00683_x crossref_primary_10_1007_s11042_023_14338_9 crossref_primary_10_1007_s42979_025_04216_6 crossref_primary_10_1016_j_ins_2020_11_045 crossref_primary_10_1007_s11042_023_15673_7 crossref_primary_10_1186_s13677_024_00702_z crossref_primary_10_3390_e22050589 crossref_primary_10_1007_s11042_024_18722_x crossref_primary_10_3390_rs14010125 crossref_primary_10_1007_s11042_019_08337_y crossref_primary_10_1038_s41598_025_89397_z crossref_primary_10_1007_s10207_022_00588_5 crossref_primary_10_1007_s11042_023_14841_z crossref_primary_10_1002_adts_202401032 crossref_primary_10_1007_s11227_019_02878_7 crossref_primary_10_35193_bseufbd_1491435 crossref_primary_10_1007_s12145_021_00684_5 crossref_primary_10_1117_1_JEI_33_4_043026 crossref_primary_10_1007_s11227_024_05906_3 crossref_primary_10_1016_j_future_2019_04_005 crossref_primary_10_3390_s21030701 crossref_primary_10_1007_s11042_019_08166_z crossref_primary_10_1016_j_jnca_2021_103167 crossref_primary_10_2478_ias_2024_0006 crossref_primary_10_1016_j_jisa_2020_102553 crossref_primary_10_1007_s11416_025_00559_z crossref_primary_10_1016_j_jisa_2020_102472 crossref_primary_10_1038_s41598_024_64741_x crossref_primary_10_1007_s11042_023_15587_4 crossref_primary_10_1016_j_optlastec_2020_106339 crossref_primary_10_1038_s41598_025_86569_9 crossref_primary_10_1007_s11042_021_10531_w crossref_primary_10_1016_j_measurement_2022_111175 crossref_primary_10_3390_math11081769 crossref_primary_10_1007_s11220_020_0275_6 crossref_primary_10_1016_j_adhoc_2019_102005 crossref_primary_10_1007_s11042_022_12653_1 crossref_primary_10_1049_iet_ipr_2018_5654 crossref_primary_10_3390_s20051326 crossref_primary_10_3390_computers12080160 crossref_primary_10_1007_s11042_019_08223_7 crossref_primary_10_1016_j_jisa_2019_05_004 crossref_primary_10_1109_ACCESS_2021_3096224 crossref_primary_10_1080_1206212X_2023_2260617 crossref_primary_10_1007_s11042_022_14184_1 crossref_primary_10_1007_s11042_024_19472_6 crossref_primary_10_1109_ACCESS_2024_3353294 crossref_primary_10_1007_s11063_020_10412_7 crossref_primary_10_3390_e24030384 crossref_primary_10_1016_j_dsp_2024_104908 crossref_primary_10_1007_s13198_023_02174_x crossref_primary_10_1109_ACCESS_2022_3226319 crossref_primary_10_1007_s11042_021_10670_0 crossref_primary_10_1007_s11760_023_02811_9 crossref_primary_10_1140_epjs_s11734_021_00319_2 crossref_primary_10_3390_sym17020166 crossref_primary_10_1016_j_cosrev_2022_100530 crossref_primary_10_1016_j_dsp_2022_103523 crossref_primary_10_1109_ACCESS_2024_3367232 crossref_primary_10_1080_09540091_2022_2162000 crossref_primary_10_1007_s11042_021_11178_3 crossref_primary_10_1016_j_displa_2025_103175 crossref_primary_10_3233_JIFS_213337 crossref_primary_10_1007_s11042_023_16629_7 crossref_primary_10_1080_02564602_2020_1799875 crossref_primary_10_3390_electronics12030774 crossref_primary_10_29026_oea_2024_230202 crossref_primary_10_1088_1674_1056_ad8a4b crossref_primary_10_1061_JCEMD4_COENG_14718 crossref_primary_10_1007_s00521_023_09151_2 crossref_primary_10_1016_j_heliyon_2024_e30353 crossref_primary_10_1142_S0218127425500336 crossref_primary_10_3390_app122412856 |
| Cites_doi | 10.5120/7909-1038 10.1016/j.cnsns.2012.05.033 10.1007/3-540-60590-8_7 10.1007/978-1-4613-9314-6 10.1080/0161-118991863745 10.1007/s11071-012-0402-6 10.1109/ICSMC.2009.5346839 10.1142/S0218127412502434 10.1016/j.imavis.2008.12.008 10.1007/3-540-48658-5_1 10.1016/S0164-1212(01)00029-2 10.1007/s11042-010-0652-6 10.1109/30.883383 10.1016/j.optcom.2011.02.039 10.1016/0031-3203(92)90074-S 10.1007/s13319-015-0062-7 10.1364/OE.18.012033 10.1016/j.chaos.2003.12.022 10.1016/j.imavis.2006.02.021 10.14257/ijsia.2016.10.8.07 10.1364/AO.52.003311 10.1109/ICEE.2007.4287293 10.1007/s11042-012-1281-z 10.1109/CIS.2008.146 10.1016/j.image.2011.11.003 10.1007/s11042-016-3926-9 10.6028/NIST.SP.800-67r1 |
| ContentType | Journal Article |
| Copyright | 3D Research Center, Kwangwoon University and Springer-Verlag GmbH Germany, part of Springer Nature 2017 Copyright Springer Science & Business Media 2017 |
| Copyright_xml | – notice: 3D Research Center, Kwangwoon University and Springer-Verlag GmbH Germany, part of Springer Nature 2017 – notice: Copyright Springer Science & Business Media 2017 |
| DBID | AAYXX CITATION |
| DOI | 10.1007/s13319-017-0148-5 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2092-6731 |
| EndPage | 35 |
| ExternalDocumentID | 10_1007_s13319_017_0148_5 |
| GroupedDBID | -EM 06D 0R~ 1N0 203 29~ 2JY 30V 408 409 40D 95. 96X AAAVM AAIAL AAJKR AARTL AATVU AAWCG AAYIU AAYQN AAYTO AAZMS ABBXA ABFTD ABFTV ABJNI ABJOX ABKCH ABTEG ABTHY ABTMW ABXPI ACGFS ACKNC ACMLO ADHHG ADINQ ADKPE ADURQ ADZKW AEBTG AEGNC AEJHL AEJRE AEOHA AEPYU AETCA AEXYK AFBBN AFWTZ AFZKB AGAYW AGDGC AGJBK AGQMX AGWZB AGYKE AHAVH AHBYD AHYZX AIIXL AITGF AJBLW AJRNO AKLTO ALFXC ALMA_UNASSIGNED_HOLDINGS AMKLP AMYQR ANMIH AUKKA AXYYD AYJHY BGNMA CSCUP EBS EIOEI EJD ESBYG FIGPU FINBP FRRFC FSGXE FYJPI GGRSB GJIRD GQ6 GQ7 GQ8 H13 HMJXF HQYDN HRMNR HZ~ I0C IXD IZIGR J0Z JBSCW JCJTX KOV M4Y NQJWS NU0 O9J P9P QOS R89 RLLFE ROL RSV S27 S3B SEG SHX SISQX SNX SOJ SPISZ STPWE T13 TSG U2A UG4 UZXMN VFIZW W48 Z45 ~A9 2VQ AAYXX ABFSG ACSTC AEZWR AFHIU AHSBF AHWEU AIXLP CITATION O9- S1Z |
| ID | FETCH-LOGICAL-c316t-d1a300b722d28200a0fdc4092e4d24f6a6adf0a6b38670b9e812ab0d40721bac3 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 107 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000418677400005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2092-6731 |
| IngestDate | Wed Aug 13 04:29:17 EDT 2025 Sat Nov 29 01:54:05 EST 2025 Tue Nov 18 22:37:50 EST 2025 Fri Feb 21 02:26:46 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Keywords | Encryption/decryption Chaotic function Statistical attacks Cryptography Differential attacks S-box |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c316t-d1a300b722d28200a0fdc4092e4d24f6a6adf0a6b38670b9e812ab0d40721bac3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 1963513701 |
| PQPubID | 2043802 |
| PageCount | 35 |
| ParticipantIDs | proquest_journals_1963513701 crossref_citationtrail_10_1007_s13319_017_0148_5 crossref_primary_10_1007_s13319_017_0148_5 springer_journals_10_1007_s13319_017_0148_5 |
| PublicationCentury | 2000 |
| PublicationDate | 2017-12-01 |
| PublicationDateYYYYMMDD | 2017-12-01 |
| PublicationDate_xml | – month: 12 year: 2017 text: 2017-12-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | Seoul |
| PublicationPlace_xml | – name: Seoul – name: Heidelberg |
| PublicationTitle | 3D research |
| PublicationTitleAbbrev | 3D Res |
| PublicationYear | 2017 |
| Publisher | 3D Display Research Center Springer Nature B.V |
| Publisher_xml | – name: 3D Display Research Center – name: Springer Nature B.V |
| References | Barker, W. C., & Barker, E. (2012). Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher. National Institute of Standards and Technology, Special Publication (pp. 800–867). https://doi.org/10.6028/NIST.SP.800-67r1. Biham, E., & Shamir, A. (1993). Differential cryptanalysis of the Data Encryption Standard. Springer. http://www.cs.technion.ac.il/~biham/Reports/differential-cryptanalysis-of-the-data-encryption-standard-biham-shamir-authors-latex-version.pdf. Kester, Q. A. (2013). A hybrid cryptosystem based on Vigenère cipher and columnar transposition cipher. International Journal of Advanced Technology & Engineering Research, 3, 141–147. https://arxiv.org/ftp/arxiv/papers/1307/1307.7786.pdf. Vidal, G., Baptista, M. S., & Mancini, H. (2012). Fundamentals of a classical chaos-based cryptosystem with some quantum cryptography features. International Journal of Bifurcation and Chaos, 22, Article number 1250243. LiSZhaoYQuBWangJImage scrambling based on chaotic sequences and Veginère cipherMultimedia Tools and Applications20126657358810.1007/s11042-012-1281-z DangPPChauPMImage encryption for secure internet multimedia applicationsIEEE Transactions on Consumer Electronics20004639540310.1109/30.883383 MatthewsROn the derivation of a “chaotic” encryption algorithmCryptologia198914294297582210.1080/0161-118991863745 Anuradha, K., & Naik, P. P. S. (2015). Medical image cryptanalysis using histogram matching bitplane and adjoin mapping algorithms. International Journal & Magazine of Engineering, Technology, Management and Research, 2, 100–105. http://www.ijmetmr.com/oloctober2015/KolakaluriAnuradha-PPeddaSadhuNaik-13.pdf. SamISDevarajPBhuvaneswaranRSAn intertwining chaotic maps based image encryption schemeNonlinear Dynamics20126919952007294553510.1007/s11071-012-0402-6 Basu, S. (2011). International Data Encryption Algorithm (IDEA)—A typical illustration. Journal of Global Research in Computer Science, 2, 116–118. http://www.rroij.com/open-access/international-data-encryption-algorithm-idea-a-typical-illustration-116-118.pdf. Rayarikar, R., Upadhyay, S., & Pimpale, P. (2012). SMS encryption using AES algorithm on android. International Journal of Computer Applications, 50, 12–17. http://research.ijcaonline.org/volume50/number19/pxc3881038.pdf. AndersonTWAn introduction to multivariate statistical analysis1958New YorkWiley0083.14601 Karuvandan, V., Chellamuthu, S., & Periyasamy, S. (2016). Cryptanalysis of AES-128 and AES-256 block ciphers using Lorenz information measure. The International Arab Journal of Information Technology, 13, 306–312. http://ccis2k.org/iajit/PDF/Vol.13,%20No.3/5373.pdf. SamISDevarajPBhuvaneswaranRSA novel image cipher based on mixed transformed logistic mapsMultimedia Tools and Applications20125631533010.1007/s11042-010-0652-6 BourbakisNAlexopoulosCPicture data encryption using scan patternsPattern Recognition19922556758110.1016/0031-3203(92)90074-S Younes, M. A. B., & Jantan, A. (2008). Image encryption using block-based transformation algorithm. International Journal of Computer Science, 35, 407–415. http://www.iaeng.org/IJCS/issues_v35/issue_1/IJCS_35_1_03.pdf. Mousa, A., & Hamad, A. (2006). Evaluation of the RC4 algorithm for data encryption. International Journal of Computer Science & Applications, 3, 44–56. http://www.tmrfindia.org/ijcsa/v3i24.pdf. TayalNBansalRGuptaSDhallSAnalysis of various cryptography techniques: A surveyInternational Journal of Security and Its Applications201610599210.14257/ijsia.2016.10.8.07 The next tier, 8 security predictions for 2017. https://www.trendmicro.ae/vinfo/ae/security/research-and-analysis/predictions/2017. Matsui, M. (1994). The first experimental cryptanalysis of the Data Encryption Standard. Advances in cryptology—CRYPTO’94 (pp. 1–11). https://doi.org/10.1007/3-540-48658-5_1. PareekNKPatidarVSudKKImage encryption using chaotic logistic mapImage and Vision Computing20062492693410.1016/j.imavis.2006.02.021 ZhangGLiuQA novel image encryption method based on total shuffling schemeOptics Communications20112842775278010.1016/j.optcom.2011.02.039 LiuZGuoQXuLAhmadMALiuSDouble image encryption by using iterative random binary encoding in gyrator domainsOptics Express201018120331204310.1364/OE.18.012033 HanchinamaniGKulkarniLAn efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher3D Research2015 ChenGMaoYChuiCKA symmetric image encryption based on 3D chaotic mapsChaos, Solitons & Fractals200421749761204374910.1016/j.chaos.2003.12.0221049.94009 FrançoisMGrosgesTBarchiesiDErraRA new image encryption scheme based on a chaotic functionSignal Processing: Image Communication2012272492591360.94308 Mandal, S., Das, S., & Nath, A. (2014). Data hiding and retrieval using visual cryptography. International Journal of Innovative Research in Advanced Engineering, 1, 102–110. http://ijirae.com/images/downloads/vol1issue2/ACS10107.April14.19.pdf. Rivest, R. L. (1995). RC5 encryption algorithm. Dr Dobb’s Journal, 226, 146–148. http://www.drdobbs.com/security/the-rc5-encryption-algorithm/184409480. Xu, S., Wang, Y., & Wang, J. (2008). Cryptanalysis of two chaotic image encryption schemes based on permutation and XOR operations. In International conference on computational intelligence and security (pp. 433–437). https://doi.org/10.1109/CIS.2008.146. Ahmed, H. E. H., Kalash, H. M., & Farag Allah, O. S. (2007). Encryption efficiency analysis and security evaluation of RC6 block cipher for digital images. In International Conference on Electrical Engineering, 2007 (pp. 1–7). https://doi.org/10.1109/ICEE.2007.4287293. BansalRGuptaSSharmaGAn innovative image encryption scheme based on chaotic map and Vigenère schemeMultimedia Tools and Applications2016 ChangCCHwangMSChenTSA new encryption algorithm for image cryptosystemsJournal of Systems and Software200158839110.1016/S0164-1212(01)00029-2 García-Martínez, M., Denisenko, N., Soto, D., Arroyo, D., Orue, A., & Fernandez, V. (2013). High-speed free-space quantum key distribution system for urban daylight applications. Applied Optics, 52, 3311–3317. http://www.opticsinfobase.org/ao/upcomingpdf.cfm?id=185412. Zeghid, M., Machhout, M., Khriji, L., Baganne, A., & Tourki, R. (2007). A modified AES based algorithm for image encryption. International Journal of Computer and Information Engineering,1(3), 745–750. http://scholar.waset.org/1307-6892/7580. Schneier, B. (1994). The Blowfish encryption algorithm. Dr. Dobb’s Journal, 19, 38–40. http://www.drdobbs.com/security/the-blowfish-encryption-algorithm/184409216. Yun-peng, Z., Zheng-jun, Z., Wei, L., Xuan, N., Shui-ping, C., & Wei-di, D. (2009). Digital image encryption algorithm based on chaos and improved DES. In IEEE international conference on systems, man, and cybernetics (pp. 474–479). https://doi.org/10.1109/ICSMC.2009.5346839. Akhshani, A., Akhavan, A., Lim, S. C., & Hassan, Z. (2012). An image encryption scheme based on quantum logistic map. Communications in Nonlinear Science and Numerical Simulation,17(12), 4653–4661. https://arxiv.org/pdf/1307.7786. LiCLiSAsimMNunezJAlvarezGChenGOn the security defects of an image encryption schemeImage and Vision Computing2009271371138110.1016/j.imavis.2008.12.008 M François (148_CR29) 2012; 27 IS Sam (148_CR30) 2012; 56 R Bansal (148_CR32) 2016 TW Anderson (148_CR33) 1958 148_CR7 CC Chang (148_CR3) 2001; 58 N Tayal (148_CR5) 2016; 10 148_CR8 S Li (148_CR37) 2012; 66 PP Dang (148_CR10) 2000; 46 148_CR1 148_CR16 148_CR38 148_CR15 148_CR14 148_CR13 148_CR35 148_CR12 148_CR34 148_CR11 148_CR19 148_CR18 Z Liu (148_CR4) 2010; 18 G Chen (148_CR9) 2004; 21 NK Pareek (148_CR36) 2006; 24 148_CR20 IS Sam (148_CR28) 2012; 69 N Bourbakis (148_CR2) 1992; 25 C Li (148_CR24) 2009; 27 G Zhang (148_CR6) 2011; 284 148_CR27 G Hanchinamani (148_CR31) 2015 148_CR26 R Matthews (148_CR17) 1989; 14 148_CR25 148_CR23 148_CR22 148_CR21 |
| References_xml | – reference: BourbakisNAlexopoulosCPicture data encryption using scan patternsPattern Recognition19922556758110.1016/0031-3203(92)90074-S – reference: The next tier, 8 security predictions for 2017. https://www.trendmicro.ae/vinfo/ae/security/research-and-analysis/predictions/2017. – reference: Vidal, G., Baptista, M. S., & Mancini, H. (2012). Fundamentals of a classical chaos-based cryptosystem with some quantum cryptography features. International Journal of Bifurcation and Chaos, 22, Article number 1250243. – reference: LiuZGuoQXuLAhmadMALiuSDouble image encryption by using iterative random binary encoding in gyrator domainsOptics Express201018120331204310.1364/OE.18.012033 – reference: Basu, S. (2011). International Data Encryption Algorithm (IDEA)—A typical illustration. Journal of Global Research in Computer Science, 2, 116–118. http://www.rroij.com/open-access/international-data-encryption-algorithm-idea-a-typical-illustration-116-118.pdf. – reference: AndersonTWAn introduction to multivariate statistical analysis1958New YorkWiley0083.14601 – reference: Zeghid, M., Machhout, M., Khriji, L., Baganne, A., & Tourki, R. (2007). A modified AES based algorithm for image encryption. International Journal of Computer and Information Engineering,1(3), 745–750. http://scholar.waset.org/1307-6892/7580. – reference: SamISDevarajPBhuvaneswaranRSA novel image cipher based on mixed transformed logistic mapsMultimedia Tools and Applications20125631533010.1007/s11042-010-0652-6 – reference: Schneier, B. (1994). The Blowfish encryption algorithm. Dr. Dobb’s Journal, 19, 38–40. http://www.drdobbs.com/security/the-blowfish-encryption-algorithm/184409216. – reference: Rivest, R. L. (1995). RC5 encryption algorithm. Dr Dobb’s Journal, 226, 146–148. http://www.drdobbs.com/security/the-rc5-encryption-algorithm/184409480. – reference: Anuradha, K., & Naik, P. P. S. (2015). Medical image cryptanalysis using histogram matching bitplane and adjoin mapping algorithms. International Journal & Magazine of Engineering, Technology, Management and Research, 2, 100–105. http://www.ijmetmr.com/oloctober2015/KolakaluriAnuradha-PPeddaSadhuNaik-13.pdf. – reference: Biham, E., & Shamir, A. (1993). Differential cryptanalysis of the Data Encryption Standard. Springer. http://www.cs.technion.ac.il/~biham/Reports/differential-cryptanalysis-of-the-data-encryption-standard-biham-shamir-authors-latex-version.pdf. – reference: ChangCCHwangMSChenTSA new encryption algorithm for image cryptosystemsJournal of Systems and Software200158839110.1016/S0164-1212(01)00029-2 – reference: Karuvandan, V., Chellamuthu, S., & Periyasamy, S. (2016). Cryptanalysis of AES-128 and AES-256 block ciphers using Lorenz information measure. The International Arab Journal of Information Technology, 13, 306–312. http://ccis2k.org/iajit/PDF/Vol.13,%20No.3/5373.pdf. – reference: Yun-peng, Z., Zheng-jun, Z., Wei, L., Xuan, N., Shui-ping, C., & Wei-di, D. (2009). Digital image encryption algorithm based on chaos and improved DES. In IEEE international conference on systems, man, and cybernetics (pp. 474–479). https://doi.org/10.1109/ICSMC.2009.5346839. – reference: Barker, W. C., & Barker, E. (2012). Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher. National Institute of Standards and Technology, Special Publication (pp. 800–867). https://doi.org/10.6028/NIST.SP.800-67r1. – reference: ZhangGLiuQA novel image encryption method based on total shuffling schemeOptics Communications20112842775278010.1016/j.optcom.2011.02.039 – reference: TayalNBansalRGuptaSDhallSAnalysis of various cryptography techniques: A surveyInternational Journal of Security and Its Applications201610599210.14257/ijsia.2016.10.8.07 – reference: LiCLiSAsimMNunezJAlvarezGChenGOn the security defects of an image encryption schemeImage and Vision Computing2009271371138110.1016/j.imavis.2008.12.008 – reference: PareekNKPatidarVSudKKImage encryption using chaotic logistic mapImage and Vision Computing20062492693410.1016/j.imavis.2006.02.021 – reference: Xu, S., Wang, Y., & Wang, J. (2008). Cryptanalysis of two chaotic image encryption schemes based on permutation and XOR operations. In International conference on computational intelligence and security (pp. 433–437). https://doi.org/10.1109/CIS.2008.146. – reference: MatthewsROn the derivation of a “chaotic” encryption algorithmCryptologia198914294297582210.1080/0161-118991863745 – reference: SamISDevarajPBhuvaneswaranRSAn intertwining chaotic maps based image encryption schemeNonlinear Dynamics20126919952007294553510.1007/s11071-012-0402-6 – reference: Younes, M. A. B., & Jantan, A. (2008). Image encryption using block-based transformation algorithm. International Journal of Computer Science, 35, 407–415. http://www.iaeng.org/IJCS/issues_v35/issue_1/IJCS_35_1_03.pdf. – reference: Mandal, S., Das, S., & Nath, A. (2014). Data hiding and retrieval using visual cryptography. International Journal of Innovative Research in Advanced Engineering, 1, 102–110. http://ijirae.com/images/downloads/vol1issue2/ACS10107.April14.19.pdf. – reference: Rayarikar, R., Upadhyay, S., & Pimpale, P. (2012). SMS encryption using AES algorithm on android. International Journal of Computer Applications, 50, 12–17. http://research.ijcaonline.org/volume50/number19/pxc3881038.pdf. – reference: García-Martínez, M., Denisenko, N., Soto, D., Arroyo, D., Orue, A., & Fernandez, V. (2013). High-speed free-space quantum key distribution system for urban daylight applications. Applied Optics, 52, 3311–3317. http://www.opticsinfobase.org/ao/upcomingpdf.cfm?id=185412. – reference: ChenGMaoYChuiCKA symmetric image encryption based on 3D chaotic mapsChaos, Solitons & Fractals200421749761204374910.1016/j.chaos.2003.12.0221049.94009 – reference: DangPPChauPMImage encryption for secure internet multimedia applicationsIEEE Transactions on Consumer Electronics20004639540310.1109/30.883383 – reference: LiSZhaoYQuBWangJImage scrambling based on chaotic sequences and Veginère cipherMultimedia Tools and Applications20126657358810.1007/s11042-012-1281-z – reference: FrançoisMGrosgesTBarchiesiDErraRA new image encryption scheme based on a chaotic functionSignal Processing: Image Communication2012272492591360.94308 – reference: Matsui, M. (1994). The first experimental cryptanalysis of the Data Encryption Standard. Advances in cryptology—CRYPTO’94 (pp. 1–11). https://doi.org/10.1007/3-540-48658-5_1. – reference: Ahmed, H. E. H., Kalash, H. M., & Farag Allah, O. S. (2007). Encryption efficiency analysis and security evaluation of RC6 block cipher for digital images. In International Conference on Electrical Engineering, 2007 (pp. 1–7). https://doi.org/10.1109/ICEE.2007.4287293. – reference: BansalRGuptaSSharmaGAn innovative image encryption scheme based on chaotic map and Vigenère schemeMultimedia Tools and Applications2016 – reference: Akhshani, A., Akhavan, A., Lim, S. C., & Hassan, Z. (2012). An image encryption scheme based on quantum logistic map. Communications in Nonlinear Science and Numerical Simulation,17(12), 4653–4661. https://arxiv.org/pdf/1307.7786. – reference: HanchinamaniGKulkarniLAn efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher3D Research2015 – reference: Mousa, A., & Hamad, A. (2006). Evaluation of the RC4 algorithm for data encryption. International Journal of Computer Science & Applications, 3, 44–56. http://www.tmrfindia.org/ijcsa/v3i24.pdf. – reference: Kester, Q. A. (2013). A hybrid cryptosystem based on Vigenère cipher and columnar transposition cipher. International Journal of Advanced Technology & Engineering Research, 3, 141–147. https://arxiv.org/ftp/arxiv/papers/1307/1307.7786.pdf. – ident: 148_CR27 doi: 10.5120/7909-1038 – ident: 148_CR13 doi: 10.1016/j.cnsns.2012.05.033 – ident: 148_CR23 doi: 10.1007/3-540-60590-8_7 – ident: 148_CR7 doi: 10.1007/978-1-4613-9314-6 – volume: 14 start-page: 29 year: 1989 ident: 148_CR17 publication-title: Cryptologia doi: 10.1080/0161-118991863745 – volume: 69 start-page: 1995 year: 2012 ident: 148_CR28 publication-title: Nonlinear Dynamics doi: 10.1007/s11071-012-0402-6 – ident: 148_CR12 doi: 10.1109/ICSMC.2009.5346839 – ident: 148_CR15 doi: 10.1142/S0218127412502434 – volume: 27 start-page: 1371 year: 2009 ident: 148_CR24 publication-title: Image and Vision Computing doi: 10.1016/j.imavis.2008.12.008 – ident: 148_CR8 – ident: 148_CR19 doi: 10.1007/3-540-48658-5_1 – volume: 58 start-page: 83 year: 2001 ident: 148_CR3 publication-title: Journal of Systems and Software doi: 10.1016/S0164-1212(01)00029-2 – volume: 56 start-page: 315 year: 2012 ident: 148_CR30 publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-010-0652-6 – ident: 148_CR34 – volume: 46 start-page: 395 year: 2000 ident: 148_CR10 publication-title: IEEE Transactions on Consumer Electronics doi: 10.1109/30.883383 – volume: 284 start-page: 2775 year: 2011 ident: 148_CR6 publication-title: Optics Communications doi: 10.1016/j.optcom.2011.02.039 – ident: 148_CR11 – volume: 25 start-page: 567 year: 1992 ident: 148_CR2 publication-title: Pattern Recognition doi: 10.1016/0031-3203(92)90074-S – ident: 148_CR22 – ident: 148_CR20 – year: 2015 ident: 148_CR31 publication-title: 3D Research doi: 10.1007/s13319-015-0062-7 – volume-title: An introduction to multivariate statistical analysis year: 1958 ident: 148_CR33 – ident: 148_CR1 – volume: 18 start-page: 12033 year: 2010 ident: 148_CR4 publication-title: Optics Express doi: 10.1364/OE.18.012033 – volume: 21 start-page: 749 year: 2004 ident: 148_CR9 publication-title: Chaos, Solitons & Fractals doi: 10.1016/j.chaos.2003.12.022 – ident: 148_CR35 – volume: 24 start-page: 926 year: 2006 ident: 148_CR36 publication-title: Image and Vision Computing doi: 10.1016/j.imavis.2006.02.021 – volume: 10 start-page: 59 year: 2016 ident: 148_CR5 publication-title: International Journal of Security and Its Applications doi: 10.14257/ijsia.2016.10.8.07 – ident: 148_CR16 – ident: 148_CR18 – ident: 148_CR14 doi: 10.1364/AO.52.003311 – ident: 148_CR25 doi: 10.1109/ICEE.2007.4287293 – volume: 66 start-page: 573 year: 2012 ident: 148_CR37 publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-012-1281-z – ident: 148_CR38 doi: 10.1109/CIS.2008.146 – volume: 27 start-page: 249 year: 2012 ident: 148_CR29 publication-title: Signal Processing: Image Communication doi: 10.1016/j.image.2011.11.003 – ident: 148_CR21 – year: 2016 ident: 148_CR32 publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-016-3926-9 – ident: 148_CR26 doi: 10.6028/NIST.SP.800-67r1 |
| SSID | ssj0001821492 |
| Score | 2.4135323 |
| SecondaryResourceType | review_article |
| Snippet | Security of data/images is one of the crucial aspects in the gigantic and still expanding domain of digital transfer. Encryption of images is one of the well... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1 |
| SubjectTerms | 3DR Review Algorithms Computer Imaging Correlation coefficients Cybersecurity Data transfer (computers) Digital imaging Encryption Engineering Initial conditions Lasers Optical Devices Optics Pattern Recognition and Graphics Performance measurement Photonics Signal,Image and Speech Processing Vision |
| Title | A Survey of Image Encryption Algorithms |
| URI | https://link.springer.com/article/10.1007/s13319-017-0148-5 https://www.proquest.com/docview/1963513701 |
| Volume | 8 |
| WOSCitedRecordID | wos000418677400005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 2092-6731 dateEnd: 20190930 omitProxy: false ssIdentifier: ssj0001821492 issn: 2092-6731 databaseCode: RSV dateStart: 20100301 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEB60etCDb7FaJQdBUBZ2N-9jkRa9FKEqvYV9ZLXQppKkhf57d7eJraKCnjMbktnJzDfZmW8ALmNDUicUQRqMUuQRjhHjgiDDdETTQBmbtsMmwl4vGgzih6qPu6ir3esjSeupl81urm24IaZU0ouQvw4bviGbMSl6_3n5YyWiGvXT-gTzu5WfY9ASWH45C7Uhprv7r4fbg50KUTrthQnsw1qaHcD2Cs_gIVy1nf40n6VzZ6Kc-7F2IU4nE_ncugunPXqZ5MPydVwcwVO383h7h6oJCUi4JCiRJMzFmIeUSp06YcywkkJnbDT1JPVUwAImFWYBd6MgxDxOdThnHEvLisaZcI-hkU2y9AQcybl0lYoDzw896QeR0FAg9JhGhMy8WxNwrbNEVPThZorFKFkSHxu5ROsgMTpI_CZcfyx5W3Bn_CbcqjciqT6jIjHuwSduiEkTbmrFr1z-6Wanf5I-gy1qds4WqbSgUebT9Bw2xawcFvmFta53wzPG5Q |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEB60CurBt1itmoMgKAubTbJJjkVaKtYitEpvYR-JFtpU0rTQf-9umpgqKug1mQ3J7GQeOzPfAFz6GqRORCZSzihBtskxYlyYSCMdkZBGWqazYRNup-P1-_5j3sc9Kardi5RkpqnLZjcra7gxdamk7SFnFdZsPWVHh-jd5_JgxVMXfVJkML9b-dkGlY7ll1xoZmKaO_96uV3Yzj1Ko74QgT1YCeN92FrCGTyAq7rRnSazcG6MI-NupFSI0YhFMs_UhVEfvoyTQfo6mhzCU7PRu22hfEICEpZJUyRNZmHMXUKkCp0wZjiSQkVsJLQlsSPKKJMRZpRbHnUx90NlzhnHMkNF40xYR1CJx3F4DIbkXFpR5FPbcW3pUE8oV8C1mfIImf62KuCCZ4HI4cP1FIthUAIfa7pA8SDQPAicKlx_LHlbYGf8RlwrNiLIf6NJoNWDY1ouNqtwUzB-6fZPDzv5E_UFbLR6D-2gfde5P4VNoncxK1ipQSVNpuEZrItZOpgk55mkvQMgHsnJ |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8NAEB60iujBt1itmoMgKKGbzftYtMWilGJVvIV9ZLXQpiVJC_337qaJqaKCeM5sSGYm88jMfANw7iuQOiYMXQajWLcMinRCmaErpCMcOkLpdLZswu10vJcXv5vvOU2KbveiJDmfaVAoTVFaH3NRLwffzGz4xlBtk5an28uwYslERvV0PfSey58sHpYZAC6qmd-d_OyPyiDzS100czetrX8_6DZs5pGm1pirxg4shdEubCzgD-7BRUPrTeJpONNGQmsPpWnRmhGLZ5kZ0RqD11HcT9-GyT48tZqP17d6vjlBZ6bhpDo3iIkQdTHmMqVCiCDBmczkcGhxbAmHOIQLRBxqeo6LqB9KN08o4hlaGiXMPIBKNIrCQ9A4pdwUwncs27W47XhMhgiuRWSkSNS7VQEV_AtYDiuutlsMghIQWdEFkgeB4kFgV-Hy48h4jqnxG3GtEEqQf15JoMyGbZguMqpwVQhh4fJPNzv6E_UZrHVvWsF9u3N3DOtYCTHrY6lBJY0n4QmssmnaT-LTTOneAXU_0q0 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Survey+of+Image+Encryption+Algorithms&rft.jtitle=3D+research&rft.au=Kumari%2C+Manju&rft.au=Gupta%2C+Shailender&rft.au=Sardana%2C+Pranshul&rft.date=2017-12-01&rft.pub=Springer+Nature+B.V&rft.eissn=2092-6731&rft.volume=8&rft.issue=4&rft.spage=1&rft.epage=35&rft_id=info:doi/10.1007%2Fs13319-017-0148-5&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2092-6731&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2092-6731&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2092-6731&client=summon |