CHAPTER TWO
LITERATURE REVIEW
2.1 Review of Key Concepts
Image encryption is a critical aspect of information security that involves protecting visual
data from unauthorized access. Cryptography techniques play a vital role in achieving this
goal. An encryption algorithm has been presented by Norouzi et al. According to the
hyper-chaotic systems. The advantages of this suggestive approach include the need for
only one round of diffusion processing and the simple calculations. High security, severe
sensitivity to the key and high sensitivity to the original text are the other features of this
method. The key stream generated by the hyper-chaotic systems is related to the original
image. In addition, for encrypting each pixel, the set of pixels before that pixel are used.
The algorithm uses different sets for encrypting various input images. This, in turn,
improves the resistance of the encryption system against the differential, known-plain text
and chosen-plain text attacks. In this research, the NPCR and UACI are high. Also, the
results of the experimentations such as the key space analysis, histogram, correlation
coefficient, and information entropy, the highest proportion of signal to noise, key
sensitivity analysis, and differential analysis and decryption quality clarify that the
proposed image encryption algorithm is secure and reliable and can be used for secure
image communication applications. A beta-based chaos map was used for generating the
chaos sequence. This approach is divided into three steps: permutation, diffusion and
substitution. The pseudorandom sequence is generated in order to replace the image pixel
locations to eliminate the relation between the original and encrypted images. Hence, the
severity of the resistance of the encrypted image increases against the attacks.
Wang et al. proposed a hyper-chaotic plan and bit area permutation for the colorful image
encryption. First, the colorful image of M × N size is converted to the grayscale image of
M × 3N. Then, this image is converted to an even matrix and the matrix changes into an
irregular linear plot at bit level with mapping combination. Next, the Chen system is
applied in order to simultaneously encrypt the combinations of red, green and blue. The
experimental results and security analyses indicate that not only the plan can provide good
encryption achievements, but also the original space is large enough which enables this
method for resisting against attacks.
Guan et al. proposed a novel image encryption plan. In this algorithm, first, Arnold cat
mapping is used to identify the locations of the image’s pixels in the spatial domain. Then,
the output signal is preprocessed using Chen chaos mapping. After that, the converted
image due to Arnold mapping is encrypted with the preprocessed signal in a pixel-to-pixel
manner. The experiment results show that the original space is so large to resist the
attacks. Also, the grayscale parts of the encrypted image are distributed randomly. The
encryption algorithm of this approach has three advantages: (1) the key space is large
enough which makes it resistant against all kinds of attacks, (2) the encrypted image has
an appropriate statistical feature, and (3) the encryption algorithm is very sensitive to the
keys.
2.1.1 Chaotic System for Image Encryptions
Y. Zhou and L. Bao 2021 proposed a new chaotic system that consists of 3 unique 1D
chaotic maps in this script. The proposed method uses a Logistic map as controller in
order to determine whether to produce random sequences using a Sine map and a Tent
map. The algorithm then employs the substitution-permutation network (SPN) topology
to acquire the diffusion and confusion properties. For a large key space, this approach
utilizes a 240-bit key. This key primarily comprises all of the new chaotic system's initial
values and parameter settings, as well as excessive sensitivity in key changes for
decryption and encryption. As a result, the suggested method offers great security towards
the brute force attacks, in addition to excessive chaotic behavior and key sensitivity.
2.1.2 NN Method for the Encryption/Decryption of the Digital Data
A study by Sethi, N., Sharma, (2022) have proposed a method for scanning an image
pixel by pixel. After that, it applies permutation and substitution to such pixels to
transform them. The encoding technique garbles the transformed image by inserting the
impurity. To ensure effective security, this method employs two levels of enciphering.
For decrypting the cipher image, the presented approach leverages an ANN. There are
three steps to decryption. The system removes the additional impurity in first stage. The
network then rejects excess conjoined columns in matrix in the second stage. The received
image data and weight values that have been saved after training have been used for the
purpose of stimulating the network in the third step. The significance of this approach is
owing to the availability of random encryption on the side of the sender, which eliminates
the need for an exchange of keys. As a result, the suggested approach delivers a high level
of safety. The drawbacks is that decryption takes longer. A study conducted by Sethi,
N., Sharma, (2022) shows how to create encryption algorithms using genetic algorithms
in cryptography, as well as the randomness characteristics of Linear Congruential and
Fibonacci generators, as well as CNN and dynamic adaptive diffusion. This entire
method of conveying secret information is extremely secure and dependable. As a result,
no one will be able to deduce the message without knowing the pseudorandom sequence.
These studies were completed and evaluated. Microsoft.NET was used for
implementation purposes Following the analyses of the suggested approach, it is
obvious that it meets the aims which any encryption technique must meet. Lastly,
experimental analysis and numerical analysis are used to confirm the algorithms'
effectiveness and practicality.
2.1.3 Encryption Method for Image Security
A study conducted by Navin Rajpal and Anchal Jain (2023) devised a method based on bit
level permutation. To meet the diffusion and confusion features, this system uses 2
Boolean operations on pixel bits: Rotation and XOR. In addition, the technique
encrypts an image by performing a sequential XOR operations on all pixel bits in the
image, which were succeeded by a circular right rotation regarding such bits. Following
that, the approach repeats these 2 steps several times in order to achieve greater
security. Furthermore, this approach encrypts and decrypts using the same secret key.
A study conducted by Homayun, Abdorreza, and Rasul (2023) Jain to developed a
system referred to as (FCIES-Fr-HP) which showed and compared the cipher image
with its related histogram, as shown in Figure 8. The input image histogram depicted in
Figure 8 (d) appears to have a certain pattern which highlights the notion connected to
image structure. The randomization properties of the output value may be observed in the
histogram of the encryption image with even and randomly distributed pixel values. Yet,
the histogram of cipher image depicted in Figure 8 (e) exemplifies consistently distributed
pixel values, making information gathering complicated for the hacker. Furthermore, the
estimated deviation between absolute matrices of decrypted and plain images that have
been given in Figure 8 (f) demonstrates the suggested FCIES-Fr-HP Scheme's superiority
in terms of effective decryption and encryption.
2.1.4 Cryptographic Approach for Image Encryption
Due to the faster communication medium and effective internet technology, information
transformation has lately been a hot topic. Huge amounts of data are transferred across a
variety of transferring mediums nowadays, with images being one of them. Singh,
Parida, and Pradhan (2021) must use any cryptographic technology, such as encryption,
to guarantee confidentiality and present ownership of the data. To present a new image
encryption cryptography approach that combines two different image encryption
methods in order to improve data security. Arnold's cat map and Zaslavskii map are two
different approaches. The two approaches are used for decryption and encryption. In this
study, we first encrypt the image with the use of Zaslavskii approach, and after that re-
encrypt the encrypted image with the use of Arnold's cat map to achieve the desired
image utilizing two encryptions. The final encrypted image is after that decrypted with
the use of Arnold's cat map, and the decrypted image is after that decrypted utilizing
Zaslavskii decryption in order to provide the final derived image that must be
identical to original image. Which suggested approach, which has a high correlation value
and high entropy value, provides users with more key values for improved unpredictability
and security. The
UACI and NPCR, which are utilized for every little change in pixels, as well as entropy
and correlation coefficient values, are used to verify the efficiency of image
encryption systems.
2.1.5 SD-AEI: Advanced Encryption Method for images
Somdip Dey (2022) has introduced a combined method. The proposed approach is
based on three cryptographic techniques: Extended Hill Cipher, Bit rotation and
reversal, and Modified MSA Randomization. In addition, the suggested technique
encrypts an image in four phases. The algorithm produces distinctive number from
symmetric key in the first step. Depending on symmetric key's length, the 2nd stage
performs bit rotation and reversal. The system then uses the Extended Hill Cipher
algorithm for encryptions in third phase. The technique then utilizes the modified
MSA randomization method for substitution in the fourth phase. Because of the
added randomization, empirical results have confirmed that the SD-AEI encoding
approach is dominating on the SD-EI.
2.2 Review of Related Literature
Extensive research has been conducted to find the most accurate image encryption
technique that not only increases the level of security but also reduces the risks of attacks
by hackers, crackers etc. ‟A Highly Secure and Accurate Method for RGB Image
Encryption”, (2020). This paper discusses the method of using RGB color image
encryption-decryption which provides a higher level of security, accuracy and an accurate
encryption-decryption technique which requires minimum hard work and software
implementations. Image Encryption Using Elliptical Curve Cryptography‟ (2023). This
paper deals with Image encryption using a unique method called the Elliptical Curve
Cryptography. This approach uses public key cryptography based on algebraic structure of
elliptic curves over finite fields. Encryption-Decryption RGB Color Image Using Matrix
Multiplication‟ (2022). This paper deals with Image encryption and decryption using the
RGB color image using matrix multiplication. The accurate matrix for encryption is
generated using matrix multiplication and then it is encrypted via using the desired key
and thus decrypted later at the receiver ‟send. ‟An Image Encryption and Decryption
method uses AES Algorithm”, (2024). This paper involves the usage of Advance
Encryption standard (AES) algorithm which provides a better method to perform
encryption and decryption over the images, thereby increasing the security from
unauthorized users.
A new medical imaging safety and security policy was introduced for Viswanathan P,
Venkata Krishna.p. The author used the traditional FED watermarking system for security
purposes. The Fingerprint, Coding and Dual Watermarking System method is used for
securing Teleradiology. In introduced a modern solution to a chaotic map with shifting
parameters. The suggested approach has two essential features: simultaneous encoding and
message extension. The method uses a disorderly asymmetric tent map and piece-wise
linear map to convert extended messages blocks iteratively into an ASCII code in which
parameters are dynamically modified with the position of the respective message block
index and the decimal portion is then generated which is then cascaded to the integer. The
theoretical examination and simulation of the system's machine disclose a rather effective
process. Chaotic frames and wavelet transition are part of the proposed platform. The
suggested solution creates unequal sequences by introducing the logistic map. This refers
to the plaintext being provided. The distributed plaintext is then followed by the transition
of the wavelet and the disruptive disorder. The Inverse Wavelet Transform IS was then
used to reconstruct the encrypted image. The algorithm testing is carried out on the basis
of the key study, which ensures that a small alteration of the key may benefit from major
changes, a gray-level histogram, anti-noise test and anti-cutting tests. The analysis showed
that pre-encryption diffusion decreased the strength of the ambiguity encryption attack.
Due to unsafe cryptography, the result of diffusion is secret and the unfeasible features of
the file may be deciphered. A new digital watermarking technology was developed by
Lina. The author used in the essay to establish interactive watermarks the concept of
distinct wavelet transformation and chaos. First the discrete wavelet transformation is
applied to the image, then the low-frequency part is removed, and the mess sequence is
applied to encrypt the small-frequency element. The first image is used for extraction, and
this is a method of non-blind recognition. The NC coefficient and high noise to signal ratio
test the device (PNSR). The results suggested that the mixture of a combined technical
photographic culture, a noise attack, a filtration, etc. The influence of the watermark image
has been quite high. For the data encryption method, the author used the logistic solution
of chaos. The analysis of the algorithm takes place on the following principles, such as
randomness, resemblance and complexity. The chaos sequence simulation has shown that
it satisfies the criteria of the encryption algorithm. In introduced a method for the
encryption of images. The method suggested uses discreet chaotic diagrams, which
combine permutation and substitute techniques. A standard Lena picture verified the
algorithm that indicated that the original image was transformed by chaotic series into
random image. The operation was effective and reasonably healthy. In has given a creative
approach for uniform hash function decoding into propositional logic formulas. The
technique is applied to the C vocabulary. The writers have built a modern approach to
deliver rough and satisfying propositional formulas and difficult and incomplete
propositional formulas. By using these formulas, the contrast of different functions can be
done and disadvantages can be identified. The encryption of images linked to the Baker
chart has been enhanced by. Unfortunately, methods for the encryption of photos have
been created and tested to suggest that certain keys have generated poor encryption. The
algorithm has therefore been improved by adding new features, such as changing the
meaning of grayscale pixels, transposing the pixels by moving and binding a password to
the image to maximize the encryption power. The method is tracked by drawing the pixels
and results grayscale meaning.
Conclusion
In conclusion these literature review indicates that several methods have been established
to encrypt the image for network transmission. The principle of chaos and wavelet
transformation was found for the encryption of pictures. The literature survey reveals that
the privacy of the image was preserved, but the integrity of the image was not upheld. A
modern method to protecting integrity and privacy has been introduced in this article. The
approach proposed uses photo fingerprints to shield the identification of the picture inside
a protected network. Image encryption techniques are useful in several methods for
various applications such as in medical imaging as well. A range of its usefulness is
available in many cases in the literature.
2.3 Research Gap
Since machines' calculating powers are continually expanding, almost all image encryption
approaches suffer from a number of flaws with regard to security and speed. As a result,
image enciphering algorithms necessitate efficient, continual enrichment. Images take up
more space on the network than text data and demand more bandwidth to send. Generally,
there’s a scarcity of excellent image encryption approaches which may as well minimize
size (i.e. compress image) of encoded image. Furthermore, the recipient expects the
decrypted image to reproduce original data without any distortion. As a result, operating in
speed, space, and security is now a must. This project research will work in improving and
enhancing the encryption and decryption digital images files security.