Advertisement

A Review on Different Image Encryption Approaches

  • Amina SouyahEmail author
  • Kamel Mohamed Faraoun
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 1)

Abstract

The design of image encryption schemes that make a good compromise between sufficient level of security and execution time is one of the main directions of research, due to their ever-increasing use in real-time Internet image encryption and transmission applications. For such task, a variety of mathematical and biological strategies are investigated in the literature as chaos theory, cellular automata and DNA computing. The intend of this paper is to present a complete study of some recent and prevalent proposed works in the literature, this study covers the analysis of each work by giving its advantages and limitations in terms of security level and execution time. We believe that our study within this contribution will help in the design of new secure crypto-systems for image encryption.

Keywords

Cryptography DNA computing Chaotic maps Cellular automata Known/chosen plain-text attacks 

References

  1. 1.
    Acharya, B., Patra, S.K., Panda, G.: Image encryption by novel cryptosystem using matrix transformation. In: ICETET’08. First International Conference on Emerging Trends in Engineering and Technology, pp. 77–81. IEEE (2008)Google Scholar
  2. 2.
    Norouzi, B., Seyedzadeh, S.M., Mirzakuchaki, S., Mosavi, M.R.: A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed. Tools Appl. 74(3), 781–811 (2015)Google Scholar
  3. 3.
    Howard, R.: Data encryption standard. Inf. Age 9(4), 204–210 (1987)Google Scholar
  4. 4.
    Lai, X., Massey, J.L.: A proposal for a new block encryption standard. In: Advances in Cryptology EUROCRYPT90, pp. 389–404. Springer (1990)Google Scholar
  5. 5.
    Kak, A., Mayes, K.: Aes: The Advanced Encryption Standard. Lecture Notes on Computer and Network Security. Purdue University (2013)Google Scholar
  6. 6.
    El Assad, S., Farajallah, M., Vladeanu, C.: Chaos-based block ciphers: an overview. In: 2014 10th International Conference on Communications (COMM), pp. 1–4. IEEE (2014)Google Scholar
  7. 7.
    Pellicer-Lostao, C., Lopez-Ruiz, R.: Notions of chaotic cryptography: sketch of a chaos based cryptosystem (2012). arXiv:1203.4134
  8. 8.
    Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 8(06), 1259–1284 (1998)MathSciNetCrossRefzbMATHGoogle Scholar
  9. 9.
    Wolfram, S.: Cryptography with cellular automata. In: Advances in Cryptology CRYPTO85 Proceedings, pp. 429–432. Springer (1985)Google Scholar
  10. 10.
    Sarkar, P.: A brief history of cellular automata. ACM Comput. Surv. (CSUR) 32(1), 80–107 (2000)CrossRefGoogle Scholar
  11. 11.
    Watada, J., et al.: Dna computing and its applications. In: ISDA’08. Eighth International Conference on Intelligent Systems Design and Applications, vol. 2, pp. 288–294. IEEE (2008)Google Scholar
  12. 12.
    Gao, T., Chen, Z.: A new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(4), 394–400 (2008)MathSciNetCrossRefzbMATHGoogle Scholar
  13. 13.
    Arroyo, D., Rhouma, R., Alvarez, G., Fernandez, V., Belghith, S.: On the skew tent map as base of a new image chaos-based encryption scheme. In: Second Workshop on Mathematical Cryptology, pp. 113–117 (2008)Google Scholar
  14. 14.
    Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(38), 5973–5978 (2008)CrossRefzbMATHGoogle Scholar
  15. 15.
    Jeng, F.-G., Huang, W.-L., Chen, T.-H.: Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes. Signal Process.: Image Commun. 34, 45–51 (2015)Google Scholar
  16. 16.
    Zhu, Z., Zhang, W., Wong, K., Hai, Y.: A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf. Sci. 181(6), 1171–1186 (2011)CrossRefGoogle Scholar
  17. 17.
    Zhang, Y.-Q., Wang, X.-Y.: Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn. 77(3), 687–698 (2014)CrossRefGoogle Scholar
  18. 18.
    Song, C.-Y., Qiao, Y.-L., Zhang, X.-Z.: An image encryption scheme based on new spatiotemporal chaos. Optik-Int. J. Light Electr. Optics 124(18), 3329–3334 (2013)CrossRefGoogle Scholar
  19. 19.
    Rabei, B., Hermassi, H., Abd El-Latif, A.A., Rhouma, R., Belghith, S.: Breaking an image encryption scheme based on a spatiotemporal chaotic system. Signal Process.: Image Commun. 39, 151–158 (2015)Google Scholar
  20. 20.
    Mirzaei, O., Yaghoobi, M., Irani, H.: A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn. 67(1), 557–566 (2012)MathSciNetCrossRefGoogle Scholar
  21. 21.
    Wu, Y., Yang, G., Jin, H., Noonan, J.P.: Image encryption using the two-dimensional logistic chaotic map. J. Electr. Imaging 21(1), 013014-1 (2012)Google Scholar
  22. 22.
    El Assad, S., Farajallah, M.: A new chaos-based image encryption system. Signal Process.: Image Commun. (2015)Google Scholar
  23. 23.
    El Assad, S., Noura, H.: Generator of chaotic sequences and corresponding generating system (2014)(. US Patent 8,781,116Google Scholar
  24. 24.
    Hua, Z., Zhou, Y.: Image encryption using 2d logistic-adjusted-sine map. Inf. Sci. (2016)Google Scholar
  25. 25.
    Souyah, A., Faraoun, K.M.: Fast and efficient randomized encryption scheme for digital images based on quadtree decomposition and reversible memory cellular automata. Nonlinear Dyn. 1–18 (2015)Google Scholar
  26. 26.
    Bakhshandeh, A., Eslami, Z.: An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Optics Lasers Eng. 51(6), 665–673 (2013)CrossRefGoogle Scholar
  27. 27.
    Kabirirad, S., Hajiabadi, H.: Cryptanalysis of an authenticated image encryption scheme based on chaotic maps and memory cellular automata. IACR Cryptol. ePrint Arch. 2015, 326 (2015)Google Scholar
  28. 28.
    Zhang, Q., Guo, L., Wei, X.: A novel image fusion encryption algorithm based on dna sequence operation and hyper-chaotic system. Optik-Int. J. Light Electr. Optics 124(18), 3596–3600 (2013)CrossRefGoogle Scholar
  29. 29.
    Zhang, Q., Wei, X.: A novel couple images encryption algorithm based on dna subsequence operation and chaotic system. Optik-Int. J. Light Electr. Optics 124(23), 6276–6281 (2013)CrossRefGoogle Scholar
  30. 30.
    Liao, X., Kulsoom, A., Ullah, S., et al.: A modified (dual) fusion technique for image encryption using sha-256 hash and multiple chaotic maps. Multimed. Tools Appl. 1–26 (2015)Google Scholar
  31. 31.
    Zhang, Y., Wen, W., Moting, S., Li, M.: Cryptanalyzing a novel image fusion encryption algorithm based on dna sequence operation and hyper-chaotic system. Optik-Int. J. Light Electr. Optics 125(4), 1562–1564 (2014)CrossRefGoogle Scholar
  32. 32.
    Xie, T., Liu, Y., Tang, J.: Breaking a novel image fusion encryption algorithm based on dna sequence operation and hyper-chaotic system. Optik-Int. J. Light Electr. Optics 125(24), 7166–7169 (2014)CrossRefGoogle Scholar
  33. 33.
    Zhang, Y.: Cryptanalysis of a novel image fusion encryption algorithm based on dna sequence operation and hyper-chaotic system. Optik-Int. J. Light Electr. Optics 126(2), 223–229 (2015)CrossRefGoogle Scholar
  34. 34.
    Li, S., Li, C., Chen, G., Bourbakis, N.G., Lo, K.-T.: A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process.: Image Commun. 23(3), 212–223 (2008)Google Scholar
  35. 35.
    Zeng, L., Liu, R.R.: Cryptanalyzing a novel couple images encryption algorithm based on dna subsequence operation and chaotic system. Optik-Int. J. Light Electr. Optics 126(24), 5022–5025 (2015)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Computer Science DepartmentDjilalli Liabes UniversitySidi Bel AbbesAlgeria

Personalised recommendations