A Survey of Image Encryption Algorithms

Security of data/images is one of the crucial aspects in the gigantic and still expanding domain of digital transfer. Encryption of images is one of the well known mechanisms to preserve confidentiality of images over a reliable unrestricted public media. This medium is vulnerable to attacks and hen...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:3D research Ročník 8; číslo 4; s. 1 - 35
Hlavní autoři: Kumari, Manju, Gupta, Shailender, Sardana, Pranshul
Médium: Journal Article
Jazyk:angličtina
Vydáno: Seoul 3D Display Research Center 01.12.2017
Springer Nature B.V
Témata:
ISSN:2092-6731, 2092-6731
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Security of data/images is one of the crucial aspects in the gigantic and still expanding domain of digital transfer. Encryption of images is one of the well known mechanisms to preserve confidentiality of images over a reliable unrestricted public media. This medium is vulnerable to attacks and hence efficient encryption algorithms are necessity for secure data transfer. Various techniques have been proposed in literature till date, each have an edge over the other, to catch-up to the ever growing need of security. This paper is an effort to compare the most popular techniques available on the basis of various performance metrics like differential, statistical and quantitative attacks analysis. To measure the efficacy, all the modern and grown-up techniques are implemented in MATLAB-2015. The results show that the chaotic schemes used in the study provide highly scrambled encrypted images having uniform histogram distribution. In addition, the encrypted images provided very less degree of correlation coefficient values in horizontal, vertical and diagonal directions, proving their resistance against statistical attacks. In addition, these schemes are able to resist differential attacks as these showed a high sensitivity for the initial conditions, i.e. pixel and key values. Finally, the schemes provide a large key spacing, hence can resist the brute force attacks, and provided a very less computational time for image encryption/decryption in comparison to other schemes available in literature.
AbstractList Security of data/images is one of the crucial aspects in the gigantic and still expanding domain of digital transfer. Encryption of images is one of the well known mechanisms to preserve confidentiality of images over a reliable unrestricted public media. This medium is vulnerable to attacks and hence efficient encryption algorithms are necessity for secure data transfer. Various techniques have been proposed in literature till date, each have an edge over the other, to catch-up to the ever growing need of security. This paper is an effort to compare the most popular techniques available on the basis of various performance metrics like differential, statistical and quantitative attacks analysis. To measure the efficacy, all the modern and grown-up techniques are implemented in MATLAB-2015. The results show that the chaotic schemes used in the study provide highly scrambled encrypted images having uniform histogram distribution. In addition, the encrypted images provided very less degree of correlation coefficient values in horizontal, vertical and diagonal directions, proving their resistance against statistical attacks. In addition, these schemes are able to resist differential attacks as these showed a high sensitivity for the initial conditions, i.e. pixel and key values. Finally, the schemes provide a large key spacing, hence can resist the brute force attacks, and provided a very less computational time for image encryption/decryption in comparison to other schemes available in literature.
ArticleNumber 37
Author Kumari, Manju
Gupta, Shailender
Sardana, Pranshul
Author_xml – sequence: 1
  givenname: Manju
  surname: Kumari
  fullname: Kumari, Manju
  organization: YMCA University of Science and Technology
– sequence: 2
  givenname: Shailender
  surname: Gupta
  fullname: Gupta, Shailender
  email: shailender81@gmail.com
  organization: YMCA University of Science and Technology
– sequence: 3
  givenname: Pranshul
  surname: Sardana
  fullname: Sardana, Pranshul
  organization: YMCA University of Science and Technology
BookMark eNp9kEFLw0AQhRepYK39Ad4CHjxFZ3aT3eRYSq2Fggf1vGySTUxJs3U3EfLv3RAPRdDDMHN437zHuyaz1rSakFuEBwQQjw4ZwzQEFH6iJIwvyJxCSkMuGM7O7iuydO4AAJhQjFI6J_er4LW3X3oITBnsjqrSwabN7XDqatMGq6Yytu4-ju6GXJaqcXr5sxfk_Wnztn4O9y_b3Xq1D3OGvAsLVAwgE5QWNKEACsoij7y9jgoalVxxVZSgeMYSLiBLdYJUZVBEIChmKmcLcjf9PVnz2WvXyYPpbestJaacxcgEoFeJSZVb45zVpczrTo2RO6vqRiLIsRg5FSN9MXIsRsaexF_kydZHZYd_GToxzmvbStuzTH9C3xfQdJY
CitedBy_id crossref_primary_10_1007_s11071_019_05157_5
crossref_primary_10_3390_a13040101
crossref_primary_10_1007_s11042_022_13244_w
crossref_primary_10_1007_s12065_021_00683_x
crossref_primary_10_1007_s11042_023_14338_9
crossref_primary_10_1007_s42979_025_04216_6
crossref_primary_10_1016_j_ins_2020_11_045
crossref_primary_10_1007_s11042_023_15673_7
crossref_primary_10_1186_s13677_024_00702_z
crossref_primary_10_3390_e22050589
crossref_primary_10_1007_s11042_024_18722_x
crossref_primary_10_3390_rs14010125
crossref_primary_10_1007_s11042_019_08337_y
crossref_primary_10_1038_s41598_025_89397_z
crossref_primary_10_1007_s10207_022_00588_5
crossref_primary_10_1007_s11042_023_14841_z
crossref_primary_10_1002_adts_202401032
crossref_primary_10_1007_s11227_019_02878_7
crossref_primary_10_35193_bseufbd_1491435
crossref_primary_10_1007_s12145_021_00684_5
crossref_primary_10_1117_1_JEI_33_4_043026
crossref_primary_10_1007_s11227_024_05906_3
crossref_primary_10_1016_j_future_2019_04_005
crossref_primary_10_3390_s21030701
crossref_primary_10_1007_s11042_019_08166_z
crossref_primary_10_1016_j_jnca_2021_103167
crossref_primary_10_2478_ias_2024_0006
crossref_primary_10_1016_j_jisa_2020_102553
crossref_primary_10_1007_s11416_025_00559_z
crossref_primary_10_1016_j_jisa_2020_102472
crossref_primary_10_1038_s41598_024_64741_x
crossref_primary_10_1007_s11042_023_15587_4
crossref_primary_10_1016_j_optlastec_2020_106339
crossref_primary_10_1038_s41598_025_86569_9
crossref_primary_10_1007_s11042_021_10531_w
crossref_primary_10_1016_j_measurement_2022_111175
crossref_primary_10_3390_math11081769
crossref_primary_10_1007_s11220_020_0275_6
crossref_primary_10_1016_j_adhoc_2019_102005
crossref_primary_10_1007_s11042_022_12653_1
crossref_primary_10_1049_iet_ipr_2018_5654
crossref_primary_10_3390_s20051326
crossref_primary_10_3390_computers12080160
crossref_primary_10_1007_s11042_019_08223_7
crossref_primary_10_1016_j_jisa_2019_05_004
crossref_primary_10_1109_ACCESS_2021_3096224
crossref_primary_10_1080_1206212X_2023_2260617
crossref_primary_10_1007_s11042_022_14184_1
crossref_primary_10_1007_s11042_024_19472_6
crossref_primary_10_1109_ACCESS_2024_3353294
crossref_primary_10_1007_s11063_020_10412_7
crossref_primary_10_3390_e24030384
crossref_primary_10_1016_j_dsp_2024_104908
crossref_primary_10_1007_s13198_023_02174_x
crossref_primary_10_1109_ACCESS_2022_3226319
crossref_primary_10_1007_s11042_021_10670_0
crossref_primary_10_1007_s11760_023_02811_9
crossref_primary_10_1140_epjs_s11734_021_00319_2
crossref_primary_10_3390_sym17020166
crossref_primary_10_1016_j_cosrev_2022_100530
crossref_primary_10_1016_j_dsp_2022_103523
crossref_primary_10_1109_ACCESS_2024_3367232
crossref_primary_10_1080_09540091_2022_2162000
crossref_primary_10_1007_s11042_021_11178_3
crossref_primary_10_1016_j_displa_2025_103175
crossref_primary_10_3233_JIFS_213337
crossref_primary_10_1007_s11042_023_16629_7
crossref_primary_10_1080_02564602_2020_1799875
crossref_primary_10_3390_electronics12030774
crossref_primary_10_29026_oea_2024_230202
crossref_primary_10_1088_1674_1056_ad8a4b
crossref_primary_10_1061_JCEMD4_COENG_14718
crossref_primary_10_1007_s00521_023_09151_2
crossref_primary_10_1016_j_heliyon_2024_e30353
crossref_primary_10_1142_S0218127425500336
crossref_primary_10_3390_app122412856
Cites_doi 10.5120/7909-1038
10.1016/j.cnsns.2012.05.033
10.1007/3-540-60590-8_7
10.1007/978-1-4613-9314-6
10.1080/0161-118991863745
10.1007/s11071-012-0402-6
10.1109/ICSMC.2009.5346839
10.1142/S0218127412502434
10.1016/j.imavis.2008.12.008
10.1007/3-540-48658-5_1
10.1016/S0164-1212(01)00029-2
10.1007/s11042-010-0652-6
10.1109/30.883383
10.1016/j.optcom.2011.02.039
10.1016/0031-3203(92)90074-S
10.1007/s13319-015-0062-7
10.1364/OE.18.012033
10.1016/j.chaos.2003.12.022
10.1016/j.imavis.2006.02.021
10.14257/ijsia.2016.10.8.07
10.1364/AO.52.003311
10.1109/ICEE.2007.4287293
10.1007/s11042-012-1281-z
10.1109/CIS.2008.146
10.1016/j.image.2011.11.003
10.1007/s11042-016-3926-9
10.6028/NIST.SP.800-67r1
ContentType Journal Article
Copyright 3D Research Center, Kwangwoon University and Springer-Verlag GmbH Germany, part of Springer Nature 2017
Copyright Springer Science & Business Media 2017
Copyright_xml – notice: 3D Research Center, Kwangwoon University and Springer-Verlag GmbH Germany, part of Springer Nature 2017
– notice: Copyright Springer Science & Business Media 2017
DBID AAYXX
CITATION
DOI 10.1007/s13319-017-0148-5
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2092-6731
EndPage 35
ExternalDocumentID 10_1007_s13319_017_0148_5
GroupedDBID -EM
06D
0R~
1N0
203
29~
2JY
30V
408
409
40D
95.
96X
AAAVM
AAIAL
AAJKR
AARTL
AATVU
AAWCG
AAYIU
AAYQN
AAYTO
AAZMS
ABBXA
ABFTD
ABFTV
ABJNI
ABJOX
ABKCH
ABTEG
ABTHY
ABTMW
ABXPI
ACGFS
ACKNC
ACMLO
ADHHG
ADINQ
ADKPE
ADURQ
ADZKW
AEBTG
AEGNC
AEJHL
AEJRE
AEOHA
AEPYU
AETCA
AEXYK
AFBBN
AFWTZ
AFZKB
AGAYW
AGDGC
AGJBK
AGQMX
AGWZB
AGYKE
AHAVH
AHBYD
AHYZX
AIIXL
AITGF
AJBLW
AJRNO
AKLTO
ALFXC
ALMA_UNASSIGNED_HOLDINGS
AMKLP
AMYQR
ANMIH
AUKKA
AXYYD
AYJHY
BGNMA
CSCUP
EBS
EIOEI
EJD
ESBYG
FIGPU
FINBP
FRRFC
FSGXE
FYJPI
GGRSB
GJIRD
GQ6
GQ7
GQ8
H13
HMJXF
HQYDN
HRMNR
HZ~
I0C
IXD
IZIGR
J0Z
JBSCW
JCJTX
KOV
M4Y
NQJWS
NU0
O9J
P9P
QOS
R89
RLLFE
ROL
RSV
S27
S3B
SEG
SHX
SISQX
SNX
SOJ
SPISZ
STPWE
T13
TSG
U2A
UG4
UZXMN
VFIZW
W48
Z45
~A9
2VQ
AAYXX
ABFSG
ACSTC
AEZWR
AFHIU
AHSBF
AHWEU
AIXLP
CITATION
O9-
S1Z
ID FETCH-LOGICAL-c316t-d1a300b722d28200a0fdc4092e4d24f6a6adf0a6b38670b9e812ab0d40721bac3
IEDL.DBID RSV
ISICitedReferencesCount 107
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000418677400005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2092-6731
IngestDate Wed Aug 13 04:29:17 EDT 2025
Sat Nov 29 01:54:05 EST 2025
Tue Nov 18 22:37:50 EST 2025
Fri Feb 21 02:26:46 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords Encryption/decryption
Chaotic function
Statistical attacks
Cryptography
Differential attacks
S-box
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c316t-d1a300b722d28200a0fdc4092e4d24f6a6adf0a6b38670b9e812ab0d40721bac3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 1963513701
PQPubID 2043802
PageCount 35
ParticipantIDs proquest_journals_1963513701
crossref_citationtrail_10_1007_s13319_017_0148_5
crossref_primary_10_1007_s13319_017_0148_5
springer_journals_10_1007_s13319_017_0148_5
PublicationCentury 2000
PublicationDate 2017-12-01
PublicationDateYYYYMMDD 2017-12-01
PublicationDate_xml – month: 12
  year: 2017
  text: 2017-12-01
  day: 01
PublicationDecade 2010
PublicationPlace Seoul
PublicationPlace_xml – name: Seoul
– name: Heidelberg
PublicationTitle 3D research
PublicationTitleAbbrev 3D Res
PublicationYear 2017
Publisher 3D Display Research Center
Springer Nature B.V
Publisher_xml – name: 3D Display Research Center
– name: Springer Nature B.V
References Barker, W. C., & Barker, E. (2012). Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher. National Institute of Standards and Technology, Special Publication (pp. 800–867). https://doi.org/10.6028/NIST.SP.800-67r1.
Biham, E., & Shamir, A. (1993). Differential cryptanalysis of the Data Encryption Standard. Springer. http://www.cs.technion.ac.il/~biham/Reports/differential-cryptanalysis-of-the-data-encryption-standard-biham-shamir-authors-latex-version.pdf.
Kester, Q. A. (2013). A hybrid cryptosystem based on Vigenère cipher and columnar transposition cipher. International Journal of Advanced Technology & Engineering Research, 3, 141–147. https://arxiv.org/ftp/arxiv/papers/1307/1307.7786.pdf.
Vidal, G., Baptista, M. S., & Mancini, H. (2012). Fundamentals of a classical chaos-based cryptosystem with some quantum cryptography features. International Journal of Bifurcation and Chaos, 22, Article number 1250243.
LiSZhaoYQuBWangJImage scrambling based on chaotic sequences and Veginère cipherMultimedia Tools and Applications20126657358810.1007/s11042-012-1281-z
DangPPChauPMImage encryption for secure internet multimedia applicationsIEEE Transactions on Consumer Electronics20004639540310.1109/30.883383
MatthewsROn the derivation of a “chaotic” encryption algorithmCryptologia198914294297582210.1080/0161-118991863745
Anuradha, K., & Naik, P. P. S. (2015). Medical image cryptanalysis using histogram matching bitplane and adjoin mapping algorithms. International Journal & Magazine of Engineering, Technology, Management and Research, 2, 100–105. http://www.ijmetmr.com/oloctober2015/KolakaluriAnuradha-PPeddaSadhuNaik-13.pdf.
SamISDevarajPBhuvaneswaranRSAn intertwining chaotic maps based image encryption schemeNonlinear Dynamics20126919952007294553510.1007/s11071-012-0402-6
Basu, S. (2011). International Data Encryption Algorithm (IDEA)—A typical illustration. Journal of Global Research in Computer Science, 2, 116–118. http://www.rroij.com/open-access/international-data-encryption-algorithm-idea-a-typical-illustration-116-118.pdf.
Rayarikar, R., Upadhyay, S., & Pimpale, P. (2012). SMS encryption using AES algorithm on android. International Journal of Computer Applications, 50, 12–17. http://research.ijcaonline.org/volume50/number19/pxc3881038.pdf.
AndersonTWAn introduction to multivariate statistical analysis1958New YorkWiley0083.14601
Karuvandan, V., Chellamuthu, S., & Periyasamy, S. (2016). Cryptanalysis of AES-128 and AES-256 block ciphers using Lorenz information measure. The International Arab Journal of Information Technology, 13, 306–312. http://ccis2k.org/iajit/PDF/Vol.13,%20No.3/5373.pdf.
SamISDevarajPBhuvaneswaranRSA novel image cipher based on mixed transformed logistic mapsMultimedia Tools and Applications20125631533010.1007/s11042-010-0652-6
BourbakisNAlexopoulosCPicture data encryption using scan patternsPattern Recognition19922556758110.1016/0031-3203(92)90074-S
Younes, M. A. B., & Jantan, A. (2008). Image encryption using block-based transformation algorithm. International Journal of Computer Science, 35, 407–415. http://www.iaeng.org/IJCS/issues_v35/issue_1/IJCS_35_1_03.pdf.
Mousa, A., & Hamad, A. (2006). Evaluation of the RC4 algorithm for data encryption. International Journal of Computer Science & Applications, 3, 44–56. http://www.tmrfindia.org/ijcsa/v3i24.pdf.
TayalNBansalRGuptaSDhallSAnalysis of various cryptography techniques: A surveyInternational Journal of Security and Its Applications201610599210.14257/ijsia.2016.10.8.07
The next tier, 8 security predictions for 2017. https://www.trendmicro.ae/vinfo/ae/security/research-and-analysis/predictions/2017.
Matsui, M. (1994). The first experimental cryptanalysis of the Data Encryption Standard. Advances in cryptology—CRYPTO’94 (pp. 1–11). https://doi.org/10.1007/3-540-48658-5_1.
PareekNKPatidarVSudKKImage encryption using chaotic logistic mapImage and Vision Computing20062492693410.1016/j.imavis.2006.02.021
ZhangGLiuQA novel image encryption method based on total shuffling schemeOptics Communications20112842775278010.1016/j.optcom.2011.02.039
LiuZGuoQXuLAhmadMALiuSDouble image encryption by using iterative random binary encoding in gyrator domainsOptics Express201018120331204310.1364/OE.18.012033
HanchinamaniGKulkarniLAn efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher3D Research2015
ChenGMaoYChuiCKA symmetric image encryption based on 3D chaotic mapsChaos, Solitons & Fractals200421749761204374910.1016/j.chaos.2003.12.0221049.94009
FrançoisMGrosgesTBarchiesiDErraRA new image encryption scheme based on a chaotic functionSignal Processing: Image Communication2012272492591360.94308
Mandal, S., Das, S., & Nath, A. (2014). Data hiding and retrieval using visual cryptography. International Journal of Innovative Research in Advanced Engineering, 1, 102–110. http://ijirae.com/images/downloads/vol1issue2/ACS10107.April14.19.pdf.
Rivest, R. L. (1995). RC5 encryption algorithm. Dr Dobb’s Journal, 226, 146–148. http://www.drdobbs.com/security/the-rc5-encryption-algorithm/184409480.
Xu, S., Wang, Y., & Wang, J. (2008). Cryptanalysis of two chaotic image encryption schemes based on permutation and XOR operations. In International conference on computational intelligence and security (pp. 433–437). https://doi.org/10.1109/CIS.2008.146.
Ahmed, H. E. H., Kalash, H. M., & Farag Allah, O. S. (2007). Encryption efficiency analysis and security evaluation of RC6 block cipher for digital images. In International Conference on Electrical Engineering, 2007 (pp. 1–7). https://doi.org/10.1109/ICEE.2007.4287293.
BansalRGuptaSSharmaGAn innovative image encryption scheme based on chaotic map and Vigenère schemeMultimedia Tools and Applications2016
ChangCCHwangMSChenTSA new encryption algorithm for image cryptosystemsJournal of Systems and Software200158839110.1016/S0164-1212(01)00029-2
García-Martínez, M., Denisenko, N., Soto, D., Arroyo, D., Orue, A., & Fernandez, V. (2013). High-speed free-space quantum key distribution system for urban daylight applications. Applied Optics, 52, 3311–3317. http://www.opticsinfobase.org/ao/upcomingpdf.cfm?id=185412.
Zeghid, M., Machhout, M., Khriji, L., Baganne, A., & Tourki, R. (2007). A modified AES based algorithm for image encryption. International Journal of Computer and Information Engineering,1(3), 745–750. http://scholar.waset.org/1307-6892/7580.
Schneier, B. (1994). The Blowfish encryption algorithm. Dr. Dobb’s Journal, 19, 38–40. http://www.drdobbs.com/security/the-blowfish-encryption-algorithm/184409216.
Yun-peng, Z., Zheng-jun, Z., Wei, L., Xuan, N., Shui-ping, C., & Wei-di, D. (2009). Digital image encryption algorithm based on chaos and improved DES. In IEEE international conference on systems, man, and cybernetics (pp. 474–479). https://doi.org/10.1109/ICSMC.2009.5346839.
Akhshani, A., Akhavan, A., Lim, S. C., & Hassan, Z. (2012). An image encryption scheme based on quantum logistic map. Communications in Nonlinear Science and Numerical Simulation,17(12), 4653–4661. https://arxiv.org/pdf/1307.7786.
LiCLiSAsimMNunezJAlvarezGChenGOn the security defects of an image encryption schemeImage and Vision Computing2009271371138110.1016/j.imavis.2008.12.008
M François (148_CR29) 2012; 27
IS Sam (148_CR30) 2012; 56
R Bansal (148_CR32) 2016
TW Anderson (148_CR33) 1958
148_CR7
CC Chang (148_CR3) 2001; 58
N Tayal (148_CR5) 2016; 10
148_CR8
S Li (148_CR37) 2012; 66
PP Dang (148_CR10) 2000; 46
148_CR1
148_CR16
148_CR38
148_CR15
148_CR14
148_CR13
148_CR35
148_CR12
148_CR34
148_CR11
148_CR19
148_CR18
Z Liu (148_CR4) 2010; 18
G Chen (148_CR9) 2004; 21
NK Pareek (148_CR36) 2006; 24
148_CR20
IS Sam (148_CR28) 2012; 69
N Bourbakis (148_CR2) 1992; 25
C Li (148_CR24) 2009; 27
G Zhang (148_CR6) 2011; 284
148_CR27
G Hanchinamani (148_CR31) 2015
148_CR26
R Matthews (148_CR17) 1989; 14
148_CR25
148_CR23
148_CR22
148_CR21
References_xml – reference: BourbakisNAlexopoulosCPicture data encryption using scan patternsPattern Recognition19922556758110.1016/0031-3203(92)90074-S
– reference: The next tier, 8 security predictions for 2017. https://www.trendmicro.ae/vinfo/ae/security/research-and-analysis/predictions/2017.
– reference: Vidal, G., Baptista, M. S., & Mancini, H. (2012). Fundamentals of a classical chaos-based cryptosystem with some quantum cryptography features. International Journal of Bifurcation and Chaos, 22, Article number 1250243.
– reference: LiuZGuoQXuLAhmadMALiuSDouble image encryption by using iterative random binary encoding in gyrator domainsOptics Express201018120331204310.1364/OE.18.012033
– reference: Basu, S. (2011). International Data Encryption Algorithm (IDEA)—A typical illustration. Journal of Global Research in Computer Science, 2, 116–118. http://www.rroij.com/open-access/international-data-encryption-algorithm-idea-a-typical-illustration-116-118.pdf.
– reference: AndersonTWAn introduction to multivariate statistical analysis1958New YorkWiley0083.14601
– reference: Zeghid, M., Machhout, M., Khriji, L., Baganne, A., & Tourki, R. (2007). A modified AES based algorithm for image encryption. International Journal of Computer and Information Engineering,1(3), 745–750. http://scholar.waset.org/1307-6892/7580.
– reference: SamISDevarajPBhuvaneswaranRSA novel image cipher based on mixed transformed logistic mapsMultimedia Tools and Applications20125631533010.1007/s11042-010-0652-6
– reference: Schneier, B. (1994). The Blowfish encryption algorithm. Dr. Dobb’s Journal, 19, 38–40. http://www.drdobbs.com/security/the-blowfish-encryption-algorithm/184409216.
– reference: Rivest, R. L. (1995). RC5 encryption algorithm. Dr Dobb’s Journal, 226, 146–148. http://www.drdobbs.com/security/the-rc5-encryption-algorithm/184409480.
– reference: Anuradha, K., & Naik, P. P. S. (2015). Medical image cryptanalysis using histogram matching bitplane and adjoin mapping algorithms. International Journal & Magazine of Engineering, Technology, Management and Research, 2, 100–105. http://www.ijmetmr.com/oloctober2015/KolakaluriAnuradha-PPeddaSadhuNaik-13.pdf.
– reference: Biham, E., & Shamir, A. (1993). Differential cryptanalysis of the Data Encryption Standard. Springer. http://www.cs.technion.ac.il/~biham/Reports/differential-cryptanalysis-of-the-data-encryption-standard-biham-shamir-authors-latex-version.pdf.
– reference: ChangCCHwangMSChenTSA new encryption algorithm for image cryptosystemsJournal of Systems and Software200158839110.1016/S0164-1212(01)00029-2
– reference: Karuvandan, V., Chellamuthu, S., & Periyasamy, S. (2016). Cryptanalysis of AES-128 and AES-256 block ciphers using Lorenz information measure. The International Arab Journal of Information Technology, 13, 306–312. http://ccis2k.org/iajit/PDF/Vol.13,%20No.3/5373.pdf.
– reference: Yun-peng, Z., Zheng-jun, Z., Wei, L., Xuan, N., Shui-ping, C., & Wei-di, D. (2009). Digital image encryption algorithm based on chaos and improved DES. In IEEE international conference on systems, man, and cybernetics (pp. 474–479). https://doi.org/10.1109/ICSMC.2009.5346839.
– reference: Barker, W. C., & Barker, E. (2012). Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher. National Institute of Standards and Technology, Special Publication (pp. 800–867). https://doi.org/10.6028/NIST.SP.800-67r1.
– reference: ZhangGLiuQA novel image encryption method based on total shuffling schemeOptics Communications20112842775278010.1016/j.optcom.2011.02.039
– reference: TayalNBansalRGuptaSDhallSAnalysis of various cryptography techniques: A surveyInternational Journal of Security and Its Applications201610599210.14257/ijsia.2016.10.8.07
– reference: LiCLiSAsimMNunezJAlvarezGChenGOn the security defects of an image encryption schemeImage and Vision Computing2009271371138110.1016/j.imavis.2008.12.008
– reference: PareekNKPatidarVSudKKImage encryption using chaotic logistic mapImage and Vision Computing20062492693410.1016/j.imavis.2006.02.021
– reference: Xu, S., Wang, Y., & Wang, J. (2008). Cryptanalysis of two chaotic image encryption schemes based on permutation and XOR operations. In International conference on computational intelligence and security (pp. 433–437). https://doi.org/10.1109/CIS.2008.146.
– reference: MatthewsROn the derivation of a “chaotic” encryption algorithmCryptologia198914294297582210.1080/0161-118991863745
– reference: SamISDevarajPBhuvaneswaranRSAn intertwining chaotic maps based image encryption schemeNonlinear Dynamics20126919952007294553510.1007/s11071-012-0402-6
– reference: Younes, M. A. B., & Jantan, A. (2008). Image encryption using block-based transformation algorithm. International Journal of Computer Science, 35, 407–415. http://www.iaeng.org/IJCS/issues_v35/issue_1/IJCS_35_1_03.pdf.
– reference: Mandal, S., Das, S., & Nath, A. (2014). Data hiding and retrieval using visual cryptography. International Journal of Innovative Research in Advanced Engineering, 1, 102–110. http://ijirae.com/images/downloads/vol1issue2/ACS10107.April14.19.pdf.
– reference: Rayarikar, R., Upadhyay, S., & Pimpale, P. (2012). SMS encryption using AES algorithm on android. International Journal of Computer Applications, 50, 12–17. http://research.ijcaonline.org/volume50/number19/pxc3881038.pdf.
– reference: García-Martínez, M., Denisenko, N., Soto, D., Arroyo, D., Orue, A., & Fernandez, V. (2013). High-speed free-space quantum key distribution system for urban daylight applications. Applied Optics, 52, 3311–3317. http://www.opticsinfobase.org/ao/upcomingpdf.cfm?id=185412.
– reference: ChenGMaoYChuiCKA symmetric image encryption based on 3D chaotic mapsChaos, Solitons & Fractals200421749761204374910.1016/j.chaos.2003.12.0221049.94009
– reference: DangPPChauPMImage encryption for secure internet multimedia applicationsIEEE Transactions on Consumer Electronics20004639540310.1109/30.883383
– reference: LiSZhaoYQuBWangJImage scrambling based on chaotic sequences and Veginère cipherMultimedia Tools and Applications20126657358810.1007/s11042-012-1281-z
– reference: FrançoisMGrosgesTBarchiesiDErraRA new image encryption scheme based on a chaotic functionSignal Processing: Image Communication2012272492591360.94308
– reference: Matsui, M. (1994). The first experimental cryptanalysis of the Data Encryption Standard. Advances in cryptology—CRYPTO’94 (pp. 1–11). https://doi.org/10.1007/3-540-48658-5_1.
– reference: Ahmed, H. E. H., Kalash, H. M., & Farag Allah, O. S. (2007). Encryption efficiency analysis and security evaluation of RC6 block cipher for digital images. In International Conference on Electrical Engineering, 2007 (pp. 1–7). https://doi.org/10.1109/ICEE.2007.4287293.
– reference: BansalRGuptaSSharmaGAn innovative image encryption scheme based on chaotic map and Vigenère schemeMultimedia Tools and Applications2016
– reference: Akhshani, A., Akhavan, A., Lim, S. C., & Hassan, Z. (2012). An image encryption scheme based on quantum logistic map. Communications in Nonlinear Science and Numerical Simulation,17(12), 4653–4661. https://arxiv.org/pdf/1307.7786.
– reference: HanchinamaniGKulkarniLAn efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher3D Research2015
– reference: Mousa, A., & Hamad, A. (2006). Evaluation of the RC4 algorithm for data encryption. International Journal of Computer Science & Applications, 3, 44–56. http://www.tmrfindia.org/ijcsa/v3i24.pdf.
– reference: Kester, Q. A. (2013). A hybrid cryptosystem based on Vigenère cipher and columnar transposition cipher. International Journal of Advanced Technology & Engineering Research, 3, 141–147. https://arxiv.org/ftp/arxiv/papers/1307/1307.7786.pdf.
– ident: 148_CR27
  doi: 10.5120/7909-1038
– ident: 148_CR13
  doi: 10.1016/j.cnsns.2012.05.033
– ident: 148_CR23
  doi: 10.1007/3-540-60590-8_7
– ident: 148_CR7
  doi: 10.1007/978-1-4613-9314-6
– volume: 14
  start-page: 29
  year: 1989
  ident: 148_CR17
  publication-title: Cryptologia
  doi: 10.1080/0161-118991863745
– volume: 69
  start-page: 1995
  year: 2012
  ident: 148_CR28
  publication-title: Nonlinear Dynamics
  doi: 10.1007/s11071-012-0402-6
– ident: 148_CR12
  doi: 10.1109/ICSMC.2009.5346839
– ident: 148_CR15
  doi: 10.1142/S0218127412502434
– volume: 27
  start-page: 1371
  year: 2009
  ident: 148_CR24
  publication-title: Image and Vision Computing
  doi: 10.1016/j.imavis.2008.12.008
– ident: 148_CR8
– ident: 148_CR19
  doi: 10.1007/3-540-48658-5_1
– volume: 58
  start-page: 83
  year: 2001
  ident: 148_CR3
  publication-title: Journal of Systems and Software
  doi: 10.1016/S0164-1212(01)00029-2
– volume: 56
  start-page: 315
  year: 2012
  ident: 148_CR30
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-010-0652-6
– ident: 148_CR34
– volume: 46
  start-page: 395
  year: 2000
  ident: 148_CR10
  publication-title: IEEE Transactions on Consumer Electronics
  doi: 10.1109/30.883383
– volume: 284
  start-page: 2775
  year: 2011
  ident: 148_CR6
  publication-title: Optics Communications
  doi: 10.1016/j.optcom.2011.02.039
– ident: 148_CR11
– volume: 25
  start-page: 567
  year: 1992
  ident: 148_CR2
  publication-title: Pattern Recognition
  doi: 10.1016/0031-3203(92)90074-S
– ident: 148_CR22
– ident: 148_CR20
– year: 2015
  ident: 148_CR31
  publication-title: 3D Research
  doi: 10.1007/s13319-015-0062-7
– volume-title: An introduction to multivariate statistical analysis
  year: 1958
  ident: 148_CR33
– ident: 148_CR1
– volume: 18
  start-page: 12033
  year: 2010
  ident: 148_CR4
  publication-title: Optics Express
  doi: 10.1364/OE.18.012033
– volume: 21
  start-page: 749
  year: 2004
  ident: 148_CR9
  publication-title: Chaos, Solitons & Fractals
  doi: 10.1016/j.chaos.2003.12.022
– ident: 148_CR35
– volume: 24
  start-page: 926
  year: 2006
  ident: 148_CR36
  publication-title: Image and Vision Computing
  doi: 10.1016/j.imavis.2006.02.021
– volume: 10
  start-page: 59
  year: 2016
  ident: 148_CR5
  publication-title: International Journal of Security and Its Applications
  doi: 10.14257/ijsia.2016.10.8.07
– ident: 148_CR16
– ident: 148_CR18
– ident: 148_CR14
  doi: 10.1364/AO.52.003311
– ident: 148_CR25
  doi: 10.1109/ICEE.2007.4287293
– volume: 66
  start-page: 573
  year: 2012
  ident: 148_CR37
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-012-1281-z
– ident: 148_CR38
  doi: 10.1109/CIS.2008.146
– volume: 27
  start-page: 249
  year: 2012
  ident: 148_CR29
  publication-title: Signal Processing: Image Communication
  doi: 10.1016/j.image.2011.11.003
– ident: 148_CR21
– year: 2016
  ident: 148_CR32
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-016-3926-9
– ident: 148_CR26
  doi: 10.6028/NIST.SP.800-67r1
SSID ssj0001821492
Score 2.4135323
SecondaryResourceType review_article
Snippet Security of data/images is one of the crucial aspects in the gigantic and still expanding domain of digital transfer. Encryption of images is one of the well...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms 3DR Review
Algorithms
Computer Imaging
Correlation coefficients
Cybersecurity
Data transfer (computers)
Digital imaging
Encryption
Engineering
Initial conditions
Lasers
Optical Devices
Optics
Pattern Recognition and Graphics
Performance measurement
Photonics
Signal,Image and Speech Processing
Vision
Title A Survey of Image Encryption Algorithms
URI https://link.springer.com/article/10.1007/s13319-017-0148-5
https://www.proquest.com/docview/1963513701
Volume 8
WOSCitedRecordID wos000418677400005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 2092-6731
  dateEnd: 20190930
  omitProxy: false
  ssIdentifier: ssj0001821492
  issn: 2092-6731
  databaseCode: RSV
  dateStart: 20100301
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEB60etCDb7FaJQdBUBZ2N-9jkRa9FKEqvYV9ZLXQppKkhf57d7eJraKCnjMbktnJzDfZmW8ALmNDUicUQRqMUuQRjhHjgiDDdETTQBmbtsMmwl4vGgzih6qPu6ir3esjSeupl81urm24IaZU0ouQvw4bviGbMSl6_3n5YyWiGvXT-gTzu5WfY9ASWH45C7Uhprv7r4fbg50KUTrthQnsw1qaHcD2Cs_gIVy1nf40n6VzZ6Kc-7F2IU4nE_ncugunPXqZ5MPydVwcwVO383h7h6oJCUi4JCiRJMzFmIeUSp06YcywkkJnbDT1JPVUwAImFWYBd6MgxDxOdThnHEvLisaZcI-hkU2y9AQcybl0lYoDzw896QeR0FAg9JhGhMy8WxNwrbNEVPThZorFKFkSHxu5ROsgMTpI_CZcfyx5W3Bn_CbcqjciqT6jIjHuwSduiEkTbmrFr1z-6Wanf5I-gy1qds4WqbSgUebT9Bw2xawcFvmFta53wzPG5Q
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEB60CurBt1itmoMgKAubTbJJjkVaKtYitEpvYR-JFtpU0rTQf-9umpgqKug1mQ3J7GQeOzPfAFz6GqRORCZSzihBtskxYlyYSCMdkZBGWqazYRNup-P1-_5j3sc9Kardi5RkpqnLZjcra7gxdamk7SFnFdZsPWVHh-jd5_JgxVMXfVJkML9b-dkGlY7ll1xoZmKaO_96uV3Yzj1Ko74QgT1YCeN92FrCGTyAq7rRnSazcG6MI-NupFSI0YhFMs_UhVEfvoyTQfo6mhzCU7PRu22hfEICEpZJUyRNZmHMXUKkCp0wZjiSQkVsJLQlsSPKKJMRZpRbHnUx90NlzhnHMkNF40xYR1CJx3F4DIbkXFpR5FPbcW3pUE8oV8C1mfIImf62KuCCZ4HI4cP1FIthUAIfa7pA8SDQPAicKlx_LHlbYGf8RlwrNiLIf6NJoNWDY1ouNqtwUzB-6fZPDzv5E_UFbLR6D-2gfde5P4VNoncxK1ipQSVNpuEZrItZOpgk55mkvQMgHsnJ
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8NAEB60iujBt1itmoMgKKGbzftYtMWilGJVvIV9ZLXQpiVJC_337qaJqaKCeM5sSGYm88jMfANw7iuQOiYMXQajWLcMinRCmaErpCMcOkLpdLZswu10vJcXv5vvOU2KbveiJDmfaVAoTVFaH3NRLwffzGz4xlBtk5an28uwYslERvV0PfSey58sHpYZAC6qmd-d_OyPyiDzS100czetrX8_6DZs5pGm1pirxg4shdEubCzgD-7BRUPrTeJpONNGQmsPpWnRmhGLZ5kZ0RqD11HcT9-GyT48tZqP17d6vjlBZ6bhpDo3iIkQdTHmMqVCiCDBmczkcGhxbAmHOIQLRBxqeo6LqB9KN08o4hlaGiXMPIBKNIrCQ9A4pdwUwncs27W47XhMhgiuRWSkSNS7VQEV_AtYDiuutlsMghIQWdEFkgeB4kFgV-Hy48h4jqnxG3GtEEqQf15JoMyGbZguMqpwVQhh4fJPNzv6E_UZrHVvWsF9u3N3DOtYCTHrY6lBJY0n4QmssmnaT-LTTOneAXU_0q0
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Survey+of+Image+Encryption+Algorithms&rft.jtitle=3D+research&rft.au=Kumari%2C+Manju&rft.au=Gupta%2C+Shailender&rft.au=Sardana%2C+Pranshul&rft.date=2017-12-01&rft.pub=Springer+Nature+B.V&rft.eissn=2092-6731&rft.volume=8&rft.issue=4&rft.spage=1&rft.epage=35&rft_id=info:doi/10.1007%2Fs13319-017-0148-5&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2092-6731&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2092-6731&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2092-6731&client=summon