0% found this document useful (0 votes)
12 views10 pages

CHAPTER 2 Reps

The literature review discusses various image encryption techniques, highlighting the importance of cryptography in securing visual data. It covers methods utilizing chaotic systems, neural networks, and advanced algorithms to enhance security against attacks while ensuring efficient encryption and decryption processes. The review identifies existing gaps in security, speed, and image size management, emphasizing the need for improved encryption methods in digital image transmission.

Uploaded by

mrkeem4real
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views10 pages

CHAPTER 2 Reps

The literature review discusses various image encryption techniques, highlighting the importance of cryptography in securing visual data. It covers methods utilizing chaotic systems, neural networks, and advanced algorithms to enhance security against attacks while ensuring efficient encryption and decryption processes. The review identifies existing gaps in security, speed, and image size management, emphasizing the need for improved encryption methods in digital image transmission.

Uploaded by

mrkeem4real
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

CHAPTER TWO

LITERATURE REVIEW

2.1 Review of Key Concepts


Image encryption is a critical aspect of information security that involves protecting visual

data from unauthorized access. Cryptography techniques play a vital role in achieving this

goal. An encryption algorithm has been presented by Norouzi et al. According to the

hyper-chaotic systems. The advantages of this suggestive approach include the need for

only one round of diffusion processing and the simple calculations. High security, severe

sensitivity to the key and high sensitivity to the original text are the other features of this

method. The key stream generated by the hyper-chaotic systems is related to the original

image. In addition, for encrypting each pixel, the set of pixels before that pixel are used.

The algorithm uses different sets for encrypting various input images. This, in turn,

improves the resistance of the encryption system against the differential, known-plain text

and chosen-plain text attacks. In this research, the NPCR and UACI are high. Also, the

results of the experimentations such as the key space analysis, histogram, correlation

coefficient, and information entropy, the highest proportion of signal to noise, key

sensitivity analysis, and differential analysis and decryption quality clarify that the

proposed image encryption algorithm is secure and reliable and can be used for secure

image communication applications. A beta-based chaos map was used for generating the

chaos sequence. This approach is divided into three steps: permutation, diffusion and

substitution. The pseudorandom sequence is generated in order to replace the image pixel

locations to eliminate the relation between the original and encrypted images. Hence, the

severity of the resistance of the encrypted image increases against the attacks.
Wang et al. proposed a hyper-chaotic plan and bit area permutation for the colorful image

encryption. First, the colorful image of M × N size is converted to the grayscale image of

M × 3N. Then, this image is converted to an even matrix and the matrix changes into an

irregular linear plot at bit level with mapping combination. Next, the Chen system is

applied in order to simultaneously encrypt the combinations of red, green and blue. The

experimental results and security analyses indicate that not only the plan can provide good

encryption achievements, but also the original space is large enough which enables this

method for resisting against attacks.

Guan et al. proposed a novel image encryption plan. In this algorithm, first, Arnold cat

mapping is used to identify the locations of the image’s pixels in the spatial domain. Then,

the output signal is preprocessed using Chen chaos mapping. After that, the converted

image due to Arnold mapping is encrypted with the preprocessed signal in a pixel-to-pixel

manner. The experiment results show that the original space is so large to resist the

attacks. Also, the grayscale parts of the encrypted image are distributed randomly. The

encryption algorithm of this approach has three advantages: (1) the key space is large

enough which makes it resistant against all kinds of attacks, (2) the encrypted image has

an appropriate statistical feature, and (3) the encryption algorithm is very sensitive to the

keys.

2.1.1 Chaotic System for Image Encryptions

Y. Zhou and L. Bao 2021 proposed a new chaotic system that consists of 3 unique 1D

chaotic maps in this script. The proposed method uses a Logistic map as controller in

order to determine whether to produce random sequences using a Sine map and a Tent

map. The algorithm then employs the substitution-permutation network (SPN) topology
to acquire the diffusion and confusion properties. For a large key space, this approach

utilizes a 240-bit key. This key primarily comprises all of the new chaotic system's initial

values and parameter settings, as well as excessive sensitivity in key changes for

decryption and encryption. As a result, the suggested method offers great security towards

the brute force attacks, in addition to excessive chaotic behavior and key sensitivity.

2.1.2 NN Method for the Encryption/Decryption of the Digital Data

A study by Sethi, N., Sharma, (2022) have proposed a method for scanning an image

pixel by pixel. After that, it applies permutation and substitution to such pixels to

transform them. The encoding technique garbles the transformed image by inserting the

impurity. To ensure effective security, this method employs two levels of enciphering.

For decrypting the cipher image, the presented approach leverages an ANN. There are

three steps to decryption. The system removes the additional impurity in first stage. The

network then rejects excess conjoined columns in matrix in the second stage. The received

image data and weight values that have been saved after training have been used for the

purpose of stimulating the network in the third step. The significance of this approach is

owing to the availability of random encryption on the side of the sender, which eliminates

the need for an exchange of keys. As a result, the suggested approach delivers a high level

of safety. The drawbacks is that decryption takes longer. A study conducted by Sethi,

N., Sharma, (2022) shows how to create encryption algorithms using genetic algorithms

in cryptography, as well as the randomness characteristics of Linear Congruential and

Fibonacci generators, as well as CNN and dynamic adaptive diffusion. This entire

method of conveying secret information is extremely secure and dependable. As a result,

no one will be able to deduce the message without knowing the pseudorandom sequence.
These studies were completed and evaluated. Microsoft.NET was used for

implementation purposes Following the analyses of the suggested approach, it is

obvious that it meets the aims which any encryption technique must meet. Lastly,

experimental analysis and numerical analysis are used to confirm the algorithms'

effectiveness and practicality.

2.1.3 Encryption Method for Image Security

A study conducted by Navin Rajpal and Anchal Jain (2023) devised a method based on bit

level permutation. To meet the diffusion and confusion features, this system uses 2

Boolean operations on pixel bits: Rotation and XOR. In addition, the technique

encrypts an image by performing a sequential XOR operations on all pixel bits in the

image, which were succeeded by a circular right rotation regarding such bits. Following
that, the approach repeats these 2 steps several times in order to achieve greater

security. Furthermore, this approach encrypts and decrypts using the same secret key.

A study conducted by Homayun, Abdorreza, and Rasul (2023) Jain to developed a

system referred to as (FCIES-Fr-HP) which showed and compared the cipher image

with its related histogram, as shown in Figure 8. The input image histogram depicted in

Figure 8 (d) appears to have a certain pattern which highlights the notion connected to

image structure. The randomization properties of the output value may be observed in the

histogram of the encryption image with even and randomly distributed pixel values. Yet,

the histogram of cipher image depicted in Figure 8 (e) exemplifies consistently distributed

pixel values, making information gathering complicated for the hacker. Furthermore, the

estimated deviation between absolute matrices of decrypted and plain images that have

been given in Figure 8 (f) demonstrates the suggested FCIES-Fr-HP Scheme's superiority

in terms of effective decryption and encryption.

2.1.4 Cryptographic Approach for Image Encryption


Due to the faster communication medium and effective internet technology, information

transformation has lately been a hot topic. Huge amounts of data are transferred across a

variety of transferring mediums nowadays, with images being one of them. Singh,

Parida, and Pradhan (2021) must use any cryptographic technology, such as encryption,

to guarantee confidentiality and present ownership of the data. To present a new image

encryption cryptography approach that combines two different image encryption

methods in order to improve data security. Arnold's cat map and Zaslavskii map are two

different approaches. The two approaches are used for decryption and encryption. In this

study, we first encrypt the image with the use of Zaslavskii approach, and after that re-

encrypt the encrypted image with the use of Arnold's cat map to achieve the desired

image utilizing two encryptions. The final encrypted image is after that decrypted with

the use of Arnold's cat map, and the decrypted image is after that decrypted utilizing

Zaslavskii decryption in order to provide the final derived image that must be

identical to original image. Which suggested approach, which has a high correlation value

and high entropy value, provides users with more key values for improved unpredictability

and security. The

UACI and NPCR, which are utilized for every little change in pixels, as well as entropy

and correlation coefficient values, are used to verify the efficiency of image

encryption systems.

2.1.5 SD-AEI: Advanced Encryption Method for images

Somdip Dey (2022) has introduced a combined method. The proposed approach is

based on three cryptographic techniques: Extended Hill Cipher, Bit rotation and

reversal, and Modified MSA Randomization. In addition, the suggested technique


encrypts an image in four phases. The algorithm produces distinctive number from

symmetric key in the first step. Depending on symmetric key's length, the 2nd stage

performs bit rotation and reversal. The system then uses the Extended Hill Cipher

algorithm for encryptions in third phase. The technique then utilizes the modified

MSA randomization method for substitution in the fourth phase. Because of the

added randomization, empirical results have confirmed that the SD-AEI encoding

approach is dominating on the SD-EI.

2.2 Review of Related Literature


Extensive research has been conducted to find the most accurate image encryption

technique that not only increases the level of security but also reduces the risks of attacks

by hackers, crackers etc. ‟A Highly Secure and Accurate Method for RGB Image

Encryption”, (2020). This paper discusses the method of using RGB color image

encryption-decryption which provides a higher level of security, accuracy and an accurate

encryption-decryption technique which requires minimum hard work and software

implementations. Image Encryption Using Elliptical Curve Cryptography‟ (2023). This

paper deals with Image encryption using a unique method called the Elliptical Curve

Cryptography. This approach uses public key cryptography based on algebraic structure of

elliptic curves over finite fields. Encryption-Decryption RGB Color Image Using Matrix

Multiplication‟ (2022). This paper deals with Image encryption and decryption using the

RGB color image using matrix multiplication. The accurate matrix for encryption is

generated using matrix multiplication and then it is encrypted via using the desired key

and thus decrypted later at the receiver ‟send. ‟An Image Encryption and Decryption

method uses AES Algorithm”, (2024). This paper involves the usage of Advance

Encryption standard (AES) algorithm which provides a better method to perform


encryption and decryption over the images, thereby increasing the security from

unauthorized users.

A new medical imaging safety and security policy was introduced for Viswanathan P,

Venkata Krishna.p. The author used the traditional FED watermarking system for security

purposes. The Fingerprint, Coding and Dual Watermarking System method is used for

securing Teleradiology. In introduced a modern solution to a chaotic map with shifting

parameters. The suggested approach has two essential features: simultaneous encoding and

message extension. The method uses a disorderly asymmetric tent map and piece-wise

linear map to convert extended messages blocks iteratively into an ASCII code in which

parameters are dynamically modified with the position of the respective message block

index and the decimal portion is then generated which is then cascaded to the integer. The

theoretical examination and simulation of the system's machine disclose a rather effective

process. Chaotic frames and wavelet transition are part of the proposed platform. The

suggested solution creates unequal sequences by introducing the logistic map. This refers

to the plaintext being provided. The distributed plaintext is then followed by the transition

of the wavelet and the disruptive disorder. The Inverse Wavelet Transform IS was then

used to reconstruct the encrypted image. The algorithm testing is carried out on the basis

of the key study, which ensures that a small alteration of the key may benefit from major

changes, a gray-level histogram, anti-noise test and anti-cutting tests. The analysis showed

that pre-encryption diffusion decreased the strength of the ambiguity encryption attack.

Due to unsafe cryptography, the result of diffusion is secret and the unfeasible features of

the file may be deciphered. A new digital watermarking technology was developed by

Lina. The author used in the essay to establish interactive watermarks the concept of
distinct wavelet transformation and chaos. First the discrete wavelet transformation is

applied to the image, then the low-frequency part is removed, and the mess sequence is

applied to encrypt the small-frequency element. The first image is used for extraction, and

this is a method of non-blind recognition. The NC coefficient and high noise to signal ratio

test the device (PNSR). The results suggested that the mixture of a combined technical

photographic culture, a noise attack, a filtration, etc. The influence of the watermark image

has been quite high. For the data encryption method, the author used the logistic solution

of chaos. The analysis of the algorithm takes place on the following principles, such as

randomness, resemblance and complexity. The chaos sequence simulation has shown that

it satisfies the criteria of the encryption algorithm. In introduced a method for the

encryption of images. The method suggested uses discreet chaotic diagrams, which

combine permutation and substitute techniques. A standard Lena picture verified the

algorithm that indicated that the original image was transformed by chaotic series into

random image. The operation was effective and reasonably healthy. In has given a creative

approach for uniform hash function decoding into propositional logic formulas. The

technique is applied to the C vocabulary. The writers have built a modern approach to

deliver rough and satisfying propositional formulas and difficult and incomplete

propositional formulas. By using these formulas, the contrast of different functions can be

done and disadvantages can be identified. The encryption of images linked to the Baker

chart has been enhanced by. Unfortunately, methods for the encryption of photos have

been created and tested to suggest that certain keys have generated poor encryption. The

algorithm has therefore been improved by adding new features, such as changing the

meaning of grayscale pixels, transposing the pixels by moving and binding a password to
the image to maximize the encryption power. The method is tracked by drawing the pixels

and results grayscale meaning.

Conclusion

In conclusion these literature review indicates that several methods have been established

to encrypt the image for network transmission. The principle of chaos and wavelet

transformation was found for the encryption of pictures. The literature survey reveals that

the privacy of the image was preserved, but the integrity of the image was not upheld. A

modern method to protecting integrity and privacy has been introduced in this article. The

approach proposed uses photo fingerprints to shield the identification of the picture inside

a protected network. Image encryption techniques are useful in several methods for

various applications such as in medical imaging as well. A range of its usefulness is

available in many cases in the literature.

2.3 Research Gap

Since machines' calculating powers are continually expanding, almost all image encryption

approaches suffer from a number of flaws with regard to security and speed. As a result,

image enciphering algorithms necessitate efficient, continual enrichment. Images take up

more space on the network than text data and demand more bandwidth to send. Generally,

there’s a scarcity of excellent image encryption approaches which may as well minimize

size (i.e. compress image) of encoded image. Furthermore, the recipient expects the

decrypted image to reproduce original data without any distortion. As a result, operating in

speed, space, and security is now a must. This project research will work in improving and

enhancing the encryption and decryption digital images files security.

You might also like