0% found this document useful (0 votes)
11 views

Chapter 2

This document provides a literature review on image encryption techniques. It summarizes 10 research papers on topics related to image encryption using chaotic systems and other cryptographic methods. The papers cover a range of approaches to image encryption including using compressed sensing, substitution-permutation networks, genetic algorithms, cellular automata and multidimensional chaotic maps. The literature review analyzes the performance and security of different techniques.

Uploaded by

sajalkumar1904
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Chapter 2

This document provides a literature review on image encryption techniques. It summarizes 10 research papers on topics related to image encryption using chaotic systems and other cryptographic methods. The papers cover a range of approaches to image encryption including using compressed sensing, substitution-permutation networks, genetic algorithms, cellular automata and multidimensional chaotic maps. The literature review analyzes the performance and security of different techniques.

Uploaded by

sajalkumar1904
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

CHAPTER 2

LITERATURE REVIEW

Y. Xie, J. Yu, S. Guo, Q. Ding, and E. Wang, “Image encryption scheme with
compressed sensing based on new three-dimensional chaotic system,” Entropy, vol.
21, no. 9, p. 819, 2019.
In this paper, a new three-dimensional chaotic system is proposed for image
encryption. The core of the encryption algorithm is the combination of chaotic system
and compressed sensing, which can complete image encryption and compression at
the same time. The Lyapunov exponent, bifurcation diagram and complexity of the
new three-dimensional chaotic system are analyzed. The performance analysis shows
that the chaotic system has two positive Lyapunov exponents and high complexity. In
the encryption scheme, a new chaotic system is used as the measurement matrix for
compressed sensing, and Arnold is used to scrambling the image further. The
proposed method has better reconfiguration ability in the compressible range of the
algorithm compared with other methods. The experimental results show that the
proposed encryption scheme has good encryption effect and image compression
capability.

M. Kaur and V. Kumar, “A comprehensive review on image encryption


techniques,” Archives of Computational Methods in Engineering, vol. 27, pp. 1–29,
2018.
This paper presents a comprehensive study of various image encryption techniques.
This paper covers the most significant developments in meta-heuristic based image
encryption techniques. The various attacks and performance measures related to
image encryption techniques have also been studied. The existing techniques are
analyzed with respect to differential, statistical, and key analyses. The main goal of
this paper is to give a broad perspective on characteristics of image encryption
techniques. The paper concludes by discussing significant advancements in the field
of image encryption and highlighting future challenges.

10
A. Belazi, A. A. Abd El-Latif, and S. Belghith, “A novel image encryption scheme
based on substitution-permutation network and chaos,” Signal Processing, vol. 128,
pp. 155–170, 2016.
In this paper, a novel image encryption approach based on permutation-substitution
(SP) network and chaotic systems is proposed. It consists of four cryptographic
phases: diffusion, substitution, diffusion and permutation. Firstly, a diffusion phase is
proposed based on new chaotic map. Then, a substitution phase based on strong S-
boxes followed by a diffusion phase based on chaotic logistic map are presented
which will, in turn, significantly increase the encryption performance. Finally, a block
permutation phase is accomplished by a permutation function to enhance the
statistical performance of the proposed encryption approach. Conducted experiments
based on various types of differential and statistical analyses show that the proposed
encryption approach has high security, sensitivity and speed compared to previous
approaches.

M. Kaur and V. Kumar, “Adaptive differential evolution-based lorenz chaotic system


for image encryption,” Arabian Journal for Science and Engineering, vol. 43, no. 12,
pp. 8127–8144, 2018.
In this paper the proposed technique, ADE is used to optimize the input parameters of
Lorenz chaotic system. SHA-3 is used to generate secret key based on the input
image. The optimized parameters and external secret keys are used to generate initial
values for Lorenz chaotic system that make it sensitive toward input image and
provide resistance against both known-plaintext and known-ciphertext attacks. The
proposed technique is compared with five well-known image encryption techniques
over four color images. The experimental results reveal that the proposed technique
outperforms existing techniques in terms of security and quality measures. The noise
and enhancement attacks are also applied to test the robustness of proposed technique.

M. Kaur and V. Kumar, “Beta chaotic map based image encryption using genetic
algorithm,” International Journal of Bifurcation and Chaos, vol. 28, no. 11, Article
ID 1850132, 2018.
In this paper, an efficient image encryption technique using beta chaotic map,
nonsubsampled contourlet transform, and genetic algorithm is proposed. Initially, the

11
nonsubsampled contourlet transform is utilized to decompose the input image into
subbands. The beta chaotic map is used to develop pseudo-random key that encrypts
the coefficients of subbands. However, it requires certain parameters to encrypt these
coefficients. A multiobjective fitness function for genetic algorithm is designed to
find the optimal parameter of beta chaotic map. The inverse of nonsubsampled
contourlet transform is performed to obtain a ciphered image. The performance of the
proposed technique is compared with recently developed well-known meta-heuristic
based image encryption techniques. Experimental results reveal that the proposed
technique provides better computational speed and high encryption intensity. The
comparative analyses show effectiveness of the proposed image encryption technique.

M. Kaur, D. Singh, K. Sun, and U. Rawat, “Color image encryption using non-
dominated sorting genetic algorithm with local chaotic search based 5d chaotic
map,” Future Generation Computer Systems, vol. 107, pp. 333–350, 2020.
In this paper author specify a new secure key generation which is the predominant
requirement of an image encryption. Chaotic maps are often considered by the
researchers for secure key generation. However, chaotic maps suffer from hyper-
tuning issue because the requirement of initial parameters. Therefore, an integrated
non-dominated sorting genetic algorithm and local chaotic search based
image encryption technique is proposed to tune the hyper-parameters of 5 chaotic map
(TFCM). To implement TFCM, initially, the input image is decomposed into sub-
bands using a dual-tree complex wavelet transform (DTCWT). These sub-bands are
then diffused using the secret key obtained from the optimized 5 chaotic map. Finally,
the inverse DTCWT is applied to obtain the final encrypted image. However, TFCM
is computationally extensive for images with a larger size. Therefore, a parallel
implementation of TFCM is also considered. Experimental analyses show that TFCM
outperforms the competitive techniques in terms of NPCR, entropy, PSNR, and UACI
by 0.9572%, 1.1576%, 1.0373%, and 1.0854%, respectively.

X. Wang and D. Luan, “A novel image encryption algorithm using chaos and
reversible cellular automata,” Communications in Nonlinear Science and Numerical
Simulation, vol. 18, no. 11, pp. 3075–3085, 2013.

12
In this paper, a novel image encryption scheme is proposed based on
reversible cellular automata (RCA) combining chaos. In this algorithm, an
intertwining logistic map with complex behavior and periodic boundary reversible
cellular automata are used. We split each pixel of image into units of 4 bits, then
adopt pseudorandom key stream generated by the intertwining logistic map to
permute these units in confusion stage. And in diffusion stage, two-dimensional
reversible cellular automata which are discrete dynamical systems are applied to
iterate many rounds to achieve diffusion on bit-level, in which we only consider the
higher 4 bits in a pixel because the higher 4 bits carry almost the information of an
image. Theoretical analysis and experimental results demonstrate the proposed
algorithm achieves a high security level and processes good performance against
common attacks like differential attack and statistical attack. This algorithm belongs
to the class of symmetric systems.

C. Zhu, G. Wang, and K. Sun, “Improved cryptanalysis and enhancements of an


image encryption scheme using combined 1d chaotic maps,” Entropy, vol. 20, no. 11,
p. 843, 2018.
This paper presents an improved cryptanalysis of a chaos-based image encryption
scheme, which integrated permutation, diffusion, and linear transformation process. It
was found that the equivalent key streams and all the unknown parameters of the
cryptosystem can be recovered by our chosen-plaintext attack algorithm. Both a
theoretical analysis and an experimental validation are given in detail. Based on the
analysis of the defects in the original cryptosystem, an improved color image
encryption scheme was further developed. By using an image content–related
approach in generating diffusion arrays and the process of interweaving diffusion and
confusion, the security of the cryptosystem was enhanced. The experimental results
and security analysis demonstrate the security superiority of the improved
cryptosystem.

S. Zhu and C. Zhu, “Plaintext-related image encryption algorithm based on block


structure and five-dimensional chaotic map,” IEEE Access, vol. 7, pp. 147106–
147118, 2019.

13
In this paper, a five-dimensional discrete hyperchaotic map is constructed by
combining Logistic map and 3D discrete Lorenz map. Based on this chaotic system, a
block-based image encryption scheme related to plaintext is designed. The encryption
scheme includes scrambling operation and diffusion operation. In the scrambling
operation, the scrambling sequence is related to the pixels of the plaintext image,
while in the diffusion operation, two rounds of diffusion are carried out for intra-block
diffusion, and the generation of random diffusion sequence is related to a pixel value
in the block in each round of diffusion, which makes the algorithm resist chosen-
plaintext attack. When the next block is diffused, the generation of the diffusion
sequence is related to the first and last pixels of the previous block, which makes the
block and block interact with each other and enhances the sensitivity of the algorithm
to plaintext. Theoretical analysis and experimental results demonstrate the security
and practicability of the cryptosystem.

T. Sivakumar and R. Venkatesan, “A novel image encryption using calligraphy based


scan method and random number,” KSII Transactions on Internet & Information
Systems, vol. 9, no. 6, 2015.
Cryptography provides an effective solution to secure the communication over public
networks. The communication over public networks that includes electronic
commerce, business and military services, necessitates the requirement of simple and
robust encryption techniques. In this paper, a novel image encryption method which
employs calligraphy based hybrid scan and random number is presented. The original
image is scrambled by pixel position permutation with calligraphy based diagonal and
novel calligraphy based scan patterns. The cipher image is obtained by XORing the
scrambled image with random numbers. The suggested method resists statistical,
differential, entropy, and noise attacks which have been demonstrated with a set of
standard images.

H. Liu, B. Zhao, and L. Huang, “A novel quantum image encryption algorithm based
on crossover operation and mutation operation,” Multimedia Tools and Applications,
vol. 78, no. 14, pp. 20465–20483, 2019.
In this paper, a new algorithm of image encryption based on random selection of
crossover operation and mutation operation is proposed. Crossover operation and

14
mutation operation come from genetic algorithm that gets high-quality solutions to
optimization. First, quantum chaos sequence and two-dimensional logistic sequence
are XORed with plain-image. And then, adjacent pixels of the image are carried out
bit-level crossover operation and crossover bits rely heavily on chaotic maps for
chaotic property. Finally, two different bits of each pixel are employed to perform
mutation for high randomness. In order to obtain the high complexity and
unpredictability further, quantum chaotic map is coupled with nearest-neighboring
coupled-map lattices (NCML). Computer simulations and statistical analyses show
that the proposed algorithm has more than 1045 bits key space, low correlation closed
to 0, ideal information entropy closed to 8, acceptable speed performance
4.7081Mbt/s and resistance to various attacks.

Y. Zhang, B. Xu, and N. Zhou, “A novel image compression-encryption hybrid


algorithm based on the analysis sparse representation,” Optics Communications, vol.
392, pp. 223–233, 2017.
In this paper we concentrate on an alternative sparse representation model, i.e., the
analysis sparse model, to propose a novel image compression–encryption hybrid
algorithm. The analysis sparse representation of the original image is obtained with an
over complete fixed dictionary that the order of the dictionary atoms is scrambled, and
the sparse representation can be considered as an encrypted version of the image.
Moreover, the sparse representation is compressed to reduce its dimension and re-
encrypted by the compressive sensing simultaneously. To enhance the security of the
algorithm, a pixel-scrambling method is employed to re-encrypt the measurements of
the compressive sensing. Various simulation results verify that the proposed image
compression–encryption hybrid algorithm could provide a considerable compression
performance with a good security.

M. Kaur, D. Singh, and R. S. Uppal, “Parallel strength pareto evolutionary algorithm-


ii based image encryption,” IET Image Processing, vol. 14, no. 6, pp. 1015–1026,
2019.
In recent years, many image encryption approaches have been proposed on the basis
of chaotic maps. The various types of chaotic maps such as one-dimensional and
multi-dimensional have been used to generate the secret keys. Chaotic maps require

15
some parameters and value assignment to these parameters is very crucial. Because,
poor value assignments may make the chaotic map un-chaotic. Therefore, hyper-
parameter tuning of chaotic maps is required. Recently, meta-heuristic based image
encryption approaches have been designed by researchers to resolve this issue.
However, the majority of the techniques suffer from poor computational speed and
stuck in local optima problems. Therefore, in this study, a strength Pareto
evolutionary algorithm-II based meta-heuristic approach is proposed to tune the
hyper-parameters of the four-dimensional chaotic map. The proposed approach is also
implemented in a parallel fashion to enhance the computational speed. The
effectiveness of the proposed approach is evaluated through extensive experiments.

D. Singh and V. Kumar, “A comprehensive review of computational dehazing


techniques,” Archives of Computational Methods in Engineering, vol. 26, no. 5, pp.
1395–1413, 2019.
The visibility of outdoor images is greatly degraded due to the presence of fog, haze,
smog etc. The poor visibility may cause the failure of computer vision applications
such as intelligent transportation systems, surveillance systems, object tracking
systems, etc. To resolve this problem, many image dehazing techniques have been
developed. These techniques play an important role in improving performance of
various computer vision applications. Due to this, the researchers are attracted toward
the dehazing techniques. This paper carries out a comprehensive review of dehazing
techniques to show that these could be effectively applied in real-life practice. On the
other hand, it encourages the researchers to use these techniques for removal of haze
from hazy images. The seven main classes of dehazing technique, such as depth
estimation, wavelet, enhancement, filtering, supervised learning, fusion, meta-
heuristic techniques and variational model are addressed. In addition, this paper
focuses on mathematical models of dehazing techniques along with their
implementation aspects. Finally, some considerations about challenges and future
scope in dehazing techniques are discussed.

A. Rehman, X. Liao, A. Kulsoom, and S. A. Abbas, “Selective encryption for gray


images based on chaos and dna complementary rules,” Multimedia Tools and
Applications, vol. 74, no. 13, pp. 4655–4677, 2015.

16
A new block cipher for gray images is proposed in this paper which fully utilizes
whole set of DNA complementary rules dynamically for encoding and decoding each
pixel of a block. The most significant (MSB) part of each block is added under DNA
addition operation with least significant (LSB) while LSB part itself get encrypted by
chaotically selecting different DNA rules for each pixel. The initial condition is
calculated from 128-bits external input key and then the said key is modified for each
subsequent block of an image. An image is permuted by Piecewise Linear Chaotic
Map (PWLCM) while logistic sequence is used for the selection of encoding and
decoding rules for each pixel of a block. The simulated experimental results and the
security analysis in terms of quantitative and qualitative way show that our cipher can
not only achieve good encryption effect to resist the exhaustive and statistical attacks
but also is a good candidate for encrypting large sized uncompressed gray images.

E. Chen, L. Min, and G. Chen, “Discrete chaotic systems with one-line equilibria and
their application to image encryption,” International Journal of Bifurcation and
Chaos, vol. 27, no. 3, Article ID 1750046, 2017.
This paper introduces nine four-dimensional discrete chaotic systems with one-line
equilibria (DCSLE), consisting of some simple sine functions. Based on the
generalized chaos synchronization (GCS) theorem, a DCSLE is used to construct an
eight-dimensional DCSLE GCS system. The new DCSLE GCS system is verified by
numerical simulation and then used to design a chaotic pseudorandom number
generator (CPRNG). The randomness of ten 100-key streams generated by the
CPRNG, two GCS-based CPRNGs, the RC4 PRNG and the ZUC PRNG are tested by
the SP800-22/FIPS 140-2 tests. The test results confirm that the randomness
performances of the three CPRNGs are promising, for there are no significant
correlations between a keystream and any perturbed keystream generated by such
CPRNG. Also, the key space of the CPRNG is larger than 2117021170. Finally, the
CPRNG is used with an avalanche-effect encryption scheme to encrypt an RGB
image, demonstrating that the CPRNG is able to generate the avalanche effects which
are similar to those generated by ideal CPRNGs.

M. Kaur and V. Kumar, “Efficient image encryption method based on improved


lorenz chaotic system,” Electronics Letters, vol. 54, no. 9, pp. 562–564, 2018.

17
A new image encryption method based on permutation–diffusion architecture is
proposed. Permutation and diffusion operations are performed row-wise and column-
wise on input image. To permute and diffuse the pixels, Lorenz-like chaotic system
with varying bifurcation parameter is used to generate six random sequences. Initially,
three sequences help in change the pixel’s position and next three used to diffuse the
pixels. The main benefit of this method is that it is more sensitive to input image.
Since input parameters required for secure key generation depend upon the input
image.

J. Liu, S. Tang, J. Lian, Y. Ma, and X. Zhang, “A novel fourth order chaotic system
and its algorithm for medical image encryption,” Multidimensional Systems and
Signal Processing, vol. 30, no. 4, pp. 1637–1657, 2019.
Today, medical imaging suffers from serious issues such as malicious tampering and
privacy leakage. Encryption is an effective way to protect these images from security
threats. Chaos has been widely used in image encryption, the majority of these
algorithms are based on classical chaotic systems. For now, these systems are easy to
analyze and predict, which are not sufficient for image encryption proposes. In this
paper, a novel fourth order chaotic system is proposed, accompanied by analysis of
Lyapunov exponent and bifurcations. Finally, the application of this system with
medical image encryption is proposed. As this system could have six control
parameters and four initial conditions, the key space is far greater than 5.1 × 218191,
which is large enough to resist brute force attack. Correlation analysis and differential
attack analysis further demonstrate that this scheme has a strong resistance against
statistical attacks and differential attack.

C. Chen, K. Sun, and S. He, “An improved image encryption algorithm with finite
computing precision,” Signal Processing, vol. 168, Article ID 107340, 2020.
When a digital chaotic system is realized on hardware of finite computing precision, it
will lead to short period orbits. Although many existing image encryption algorithms
declared that the average cycle lengths of their digital chaotic systems are larger than
the required cycle lengths in image encryption, there are still many period orbits
whose lengths are far smaller than the average cycle length. To further improve
security with finite precision, an improved cryptosystem is proposed based on a new

18
two-dimensional chaotic map derived from the Sine map, the Chebyshev map and a
linear function (2D-SCL). Performance estimation demonstrates that the 2D-SCL has
good ergodicity, hyperchaotic behavior, large cycle lengths under low computing
precisions, and its complexity is larger and more stable than that of several newly
developed 2D chaotic maps. Thus we design an improved cryptosystem based on the
2D-SCL map. In the scheme, we combine the confusion and diffusion processes in
one stage to improve the running speed. Based on the SHA-1 hash values of plain
image and the chaotic sequence, a pseudorandom sequence is designed and then an
anti-degradation method is introduced to improve the dynamic degradation of the 2D-
SCL map under finite computing precision. Meanwhile, this algorithm also updates
the initial values of the 2D-SCL map in real-time, thus enhancing the ability to resist
known-plaintext and chosen-plaintext attacks. The largest precision is set at 2−16, and
simulation results show that this algorithm has high security, low time complexity,
and the ability to withstand common attacks.

K. Xuejing and G. Zihui, “A new color image encryption scheme based on dna
encoding and spatiotemporal chaotic system,” Signal Processing: Image
Communication, vol. 80, Article ID 115670, 2020.
In this paper, a new color image encryption scheme based on DNA operations and
spatiotemporal chaotic system is presented. Firstly, to hide the distribution
information of the plain image, we convert the plain image into three DNA matrices
based on the DNA random encoding rules. Then, the DNA matrices are combined
into a new matrix and is permutated by a scramble matrix generated by mixed linear-
nonlinear coupled map lattices (MLNCML) system. In which, the key streams are
associated with the secret keys and plain image, which can ensure
our cryptosystem plain-image-dependent and improve the ability to resist known-
plaintext or chosen-plaintext attacks. Thereafter, to resist statistical attacks, the
scrambled matrix is decomposed into three matrices and diffused by DNA deletion-
insertion operations. Finally, the three matrices are decoded based on DNA random
decoding rules and recombined to three channels of the cipher image. Simulation
results demonstrate that the proposed image cryptosystem has good security and can
resist various potential attacks.

19

You might also like