International Journal of Advanced Computer Research (IJACR) ISSN (P): 2249-7277 ISSN (O): 2277-7970 Vol - 10, Issue - 50, September 2020
  1. 1
    Google Scholar
  2. 4
    Impact Factor
An analytical survey on the role of image cryptography and related computational methods

Vivek Ranjan, Kailash Patidar and Rishi Kushwaha

Abstract

In the current scenario data security is an important and crucial aspects. It is crucial in terms of different domains and application areas like banking, enterprises, educational institutes, etc. In this paper a survey and analysis have been presented on the role of image cryptography and related computational methods. This paper covers and highlighted different cryptography, steganography and related computational methods in case of image data security. It also covers the areas of applicability and the gaps in the previous methods. The impact of the current results has been analyzed also along with the implication.

Keyword

Image cryptography, Steganography, Data security, Data sharing, Privacy.

Cite this article

Ranjan V, Patidar K, Kushwaha R

Refference

[1][1]Hu G, Feng Z, Wang L. Analysis of a type of digital chaotic cryptosystem. In international symposium on circuits and systems. Proceedings 2002 (pp. III-III). IEEE.

[2][2]Boiko J, Kovtun I, Petrashchuk S. Productivity of telecommunication systems with modified signal-code constructions. In international scientific-practical conference problems of infocommunications. science and technology 2017 (pp. 173-8). IEEE.

[3][3]Kocarev L. Chaos-based cryptography: a brief overview. IEEE Circuits and Systems Magazine. 2001; 1(3):6-21.

[4][4]Millérioux G, Amigó JM, Daafouz J. A connection between chaotic and conventional cryptography. IEEE Transactions on Circuits and Systems I: Regular Papers. 2008; 55(6):1695-703.

[5][5]Ni Z, Shi YQ, Ansari N, Su W. Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology. 2006; 16(3):354-62.

[6][6]Seethalakshmi AV, Hemachitra HS. Complex type seed variety identification and recognition using optimized image processing techniques. ACCENTS Transactions on Image Processing and Computer Vision. 2020; 6 (19): 23-31.

[7][7]Sasubilli SM, Dubey AK, Kumar A. Hybrid security analysis based on intelligent adaptive learning in Big Data. In international conference on advances in computing and communication engineering 2020 (pp. 1-5). IEEE.

[8][8]Nazmudeen NH, Farsana FJ. Satellite image security improvement by combining DWT-DCT watermarking and AES encryption. International Journal of Advanced Computer Research. 2014; 4(15):645-52.

[9][9]Sasubilli SM, Dubey AK, Kumar A. A computational and analytical approach for cloud computing security with user data management. In international conference on advances in computing and communication engineering 2020 (pp. 1-5). IEEE.

[10][10]Provos N, Honeyman P. Hide and seek: an introduction to steganography. IEEE Security & Privacy. 2003; 1(3):32-44.

[11][11]Qiu J, Wang P. An image encryption and authentication scheme. In international conference on computational intelligence and security 2011 (pp. 784-7). IEEE.

[12][12]Gladwin SJ, Gowthami PL. Combined cryptography and steganography for enhanced security in suboptimal images. In international conference on artificial intelligence and signal processing 2020 (pp. 1-5). IEEE.

[13][13]Al-Kadei FH, Mardan HA, Minas NA. Speed up image encryption by using RSA algorithm. In international conference on advanced computing and communication systems 2020 (pp. 1302-7). IEEE.

[14][14]Duan X, Guo D, Liu N, Li B, Gou M, Qin C. A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network. IEEE Access. 2020; 8:25777-88.

[15][15]Abhinav A, Manikandan VM, Bini AA. An improved reversible data hiding on encrypted images by selective pixel flipping technique. In international conference on devices, circuits and systems 2020 (pp. 294-8). IEEE.

[16][16]Sharma V, Shukla M, Srivastava S, Mandal R. Generative network based image encryption. In international conference on intelligent computing and control systems 2020 (pp. 1-5). IEEE.

[17][17]Hu D, Zheng Y, Zhang H, Sun S, Xie F, Shi J, et al. Informative retrieval framework for histopathology whole slides images based on deep hashing network. In international symposium on biomedical imaging 2020 (pp. 244-8). IEEE.

[18][18]Santos TA, Magalhães EP, Basílio NP, Nepomuceno EG, Karimov TI, Butusov DN. Improving chaotic image encryption using maps with small lyapunov exponents. In Moscow workshop on electronic and networking technologies 2020 (pp. 1-4). IEEE.

[19][19]Yadahalli SS, Rege S, Sonkusare R. Implementation and analysis of image steganography using least significant bit and discrete wavelet transform techniques. In international conference on communication and electronics systems 2020 (pp. 1325-30). IEEE.

[20][20]Kalaichelvi T, Apuroop P. Image steganography method to achieve confidentiality using CAPTCHA for authentication. In international conference on communication and electronics systems 2020 (pp. 495-9). IEEE.

[21][21]Ye H, Huang S, Liu W. Research on image scrambling method based on combination of arnold transform and exclusive-or operation. In IEEE information technology, networking, electronic and automation control conference 2020 (pp. 151-4). IEEE.

[22][22]Srivastava M, Siddiqui J, Ali MA. Local binary pattern based technique for content based image copy detection. In international conference on power electronics & IoT applications in renewable energy and its control 2020 (pp. 374-7). IEEE.

[23][23]Harini M, Dhivya R, Rengarajan A. Implementation of image encryption based on chaos-iwt–an image security. In international conference on computer communication and informatics 2020 (pp. 1-4). IEEE.

[24][24]Pramanik S, Bandyopadhyay SK, Ghosh R. Signature image hiding in color image using steganography and cryptography based on digital signature concepts. In international conference on innovative mechanisms for industry applications 2020 (pp. 665-9). IEEE.

[25][25]Maurya R, Kannojiya AK, Rajitha B. An extended visual cryptography technique for medical image security. In international conference on innovative mechanisms for industry applications 2020 (pp. 415-21). IEEE.

[26][26]Rane SS, Phansalkar KA, Shinde MY, Kazi A. Avoiding phishing attack on online votig system using visual cryptography. In international conference on computer communication and informatics 2020 (pp. 1-4). IEEE.

[27][27]Kushnir M, Kosovan H, Kroialo P, Komarnytskyy A. Encryption of the images on the basis of two chaotic systems with the use of fuzzy logic. In international conference on advanced trends in radioelectronics, telecommunications and computer engineering 2020 (pp. 610-3). IEEE.

[28][28]Han B, Jia Y, Huang G, Cai L. A medical image encryption algorithm based on hermite chaotic neural network. In information technology, networking, electronic and automation control conference 2020 (pp. 2644-8). IEEE.

[29][29]Kaur S, Jindal A. Singular value decomposition (SVD) based image tamper detection scheme. In international conference on inventive computation technologies 2020 (pp. 695-9). IEEE.

[30][30]Peng X, Zeng Y. Image encryption application in a system for compounding self-excited and hidden attractors. Chaos, Solitons & Fractals. 2020.

[31][31]Wang X, Li Y, Jin J. A new one-dimensional chaotic system with applications in image encryption. Chaos, Solitons & Fractals. 2020.

[32][32]Brahim AH, Pacha AA, Said NH. Image encryption based on compressive sensing and chaos systems. Optics & Laser Technology. 2020.

[33][33]Ul Haq T, Shah T. Algebra-chaos amalgam and DNA transform based multiple digital image encryption. Journal of Information Security and Applications. 2020.

[34][34]Ul Haq T, Shah T. 12× 12 S-box design and its application to RGB image encryption. Optik. 2020.

[35][35]Dubey AK, Kumar A, Agrawal R. An efficient ACO-PSO-based framework for data classification and preprocessing in big data. Evolutionary Intelligence. 2020:1-4.

[36][36]Dubey AK, Dubey AK, Namdev M, Shrivastava SS. Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment. In international conference on software engineering 2012 (pp. 1-8). IEEE.