(Publisher of Peer Reviewed Open Access Journals)

International Journal of Advanced Computer Research (IJACR)

ISSN (Print):2249-7277    ISSN (Online):2277-7970
Volume-10 Issue-50 September-2020
Full-Text PDF
Paper Title : An analytical survey on the role of image cryptography and related computational methods
Author Name : Vivek Ranjan, Kailash Patidar and Rishi Kushwaha
Abstract :

In the current scenario data security is an important and crucial aspects. It is crucial in terms of different domains and application areas like banking, enterprises, educational institutes, etc. In this paper a survey and analysis have been presented on the role of image cryptography and related computational methods. This paper covers and highlighted different cryptography, steganography and related computational methods in case of image data security. It also covers the areas of applicability and the gaps in the previous methods. The impact of the current results has been analyzed also along with the implication.

Keywords : Image cryptography, Steganography, Data security, Data sharing, Privacy.
Cite this article : Ranjan V, Patidar K, Kushwaha R. An analytical survey on the role of image cryptography and related computational methods. International Journal of Advanced Computer Research. 2020; 10(50):206-211. DOI:10.19101/IJACR.2020.10480104.
References :
[1]Hu G, Feng Z, Wang L. Analysis of a type of digital chaotic cryptosystem. In international symposium on circuits and systems. Proceedings 2002 (pp. III-III). IEEE.
[Crossref] [Google Scholar]
[2]Boiko J, Kovtun I, Petrashchuk S. Productivity of telecommunication systems with modified signal-code constructions. In international scientific-practical conference problems of infocommunications. science and technology 2017 (pp. 173-8). IEEE.
[Crossref] [Google Scholar]
[3]Kocarev L. Chaos-based cryptography: a brief overview. IEEE Circuits and Systems Magazine. 2001; 1(3):6-21.
[Crossref] [Google Scholar]
[4]Millérioux G, Amigó JM, Daafouz J. A connection between chaotic and conventional cryptography. IEEE Transactions on Circuits and Systems I: Regular Papers. 2008; 55(6):1695-703.
[Crossref] [Google Scholar]
[5]Ni Z, Shi YQ, Ansari N, Su W. Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology. 2006; 16(3):354-62.
[Crossref] [Google Scholar]
[6]Seethalakshmi AV, Hemachitra HS. Complex type seed variety identification and recognition using optimized image processing techniques. ACCENTS Transactions on Image Processing and Computer Vision. 2020; 6 (19): 23-31.
[Crossref] [Google Scholar]
[7]Sasubilli SM, Dubey AK, Kumar A. Hybrid security analysis based on intelligent adaptive learning in Big Data. In international conference on advances in computing and communication engineering 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[8]Nazmudeen NH, Farsana FJ. Satellite image security improvement by combining DWT-DCT watermarking and AES encryption. International Journal of Advanced Computer Research. 2014; 4(15):645-52.
[Google Scholar]
[9]Sasubilli SM, Dubey AK, Kumar A. A computational and analytical approach for cloud computing security with user data management. In international conference on advances in computing and communication engineering 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[10]Provos N, Honeyman P. Hide and seek: an introduction to steganography. IEEE Security & Privacy. 2003; 1(3):32-44.
[Crossref] [Google Scholar]
[11]Qiu J, Wang P. An image encryption and authentication scheme. In international conference on computational intelligence and security 2011 (pp. 784-7). IEEE.
[Crossref] [Google Scholar]
[12]Gladwin SJ, Gowthami PL. Combined cryptography and steganography for enhanced security in suboptimal images. In international conference on artificial intelligence and signal processing 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[13]Al-Kadei FH, Mardan HA, Minas NA. Speed up image encryption by using RSA algorithm. In international conference on advanced computing and communication systems 2020 (pp. 1302-7). IEEE.
[Crossref] [Google Scholar]
[14]Duan X, Guo D, Liu N, Li B, Gou M, Qin C. A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network. IEEE Access. 2020; 8:25777-88.
[Crossref] [Google Scholar]
[15]Abhinav A, Manikandan VM, Bini AA. An improved reversible data hiding on encrypted images by selective pixel flipping technique. In international conference on devices, circuits and systems 2020 (pp. 294-8). IEEE.
[Crossref] [Google Scholar]
[16]Sharma V, Shukla M, Srivastava S, Mandal R. Generative network based image encryption. In international conference on intelligent computing and control systems 2020 (pp. 1-5). IEEE.
[Crossref] [Google Scholar]
[17]Hu D, Zheng Y, Zhang H, Sun S, Xie F, Shi J, et al. Informative retrieval framework for histopathology whole slides images based on deep hashing network. In international symposium on biomedical imaging 2020 (pp. 244-8). IEEE.
[Crossref] [Google Scholar]
[18]Santos TA, Magalhães EP, Basílio NP, Nepomuceno EG, Karimov TI, Butusov DN. Improving chaotic image encryption using maps with small lyapunov exponents. In Moscow workshop on electronic and networking technologies 2020 (pp. 1-4). IEEE.
[Crossref] [Google Scholar]
[19]Yadahalli SS, Rege S, Sonkusare R. Implementation and analysis of image steganography using least significant bit and discrete wavelet transform techniques. In international conference on communication and electronics systems 2020 (pp. 1325-30). IEEE.
[Crossref] [Google Scholar]
[20]Kalaichelvi T, Apuroop P. Image steganography method to achieve confidentiality using CAPTCHA for authentication. In international conference on communication and electronics systems 2020 (pp. 495-9). IEEE.
[Crossref] [Google Scholar]
[21]Ye H, Huang S, Liu W. Research on image scrambling method based on combination of arnold transform and exclusive-or operation. In IEEE information technology, networking, electronic and automation control conference 2020 (pp. 151-4). IEEE.
[Crossref] [Google Scholar]
[22]Srivastava M, Siddiqui J, Ali MA. Local binary pattern based technique for content based image copy detection. In international conference on power electronics & IoT applications in renewable energy and its control 2020 (pp. 374-7). IEEE.
[Crossref] [Google Scholar]
[23]Harini M, Dhivya R, Rengarajan A. Implementation of image encryption based on chaos-iwt–an image security. In international conference on computer communication and informatics 2020 (pp. 1-4). IEEE.
[Crossref] [Google Scholar]
[24]Pramanik S, Bandyopadhyay SK, Ghosh R. Signature image hiding in color image using steganography and cryptography based on digital signature concepts. In international conference on innovative mechanisms for industry applications 2020 (pp. 665-9). IEEE.
[Crossref] [Google Scholar]
[25]Maurya R, Kannojiya AK, Rajitha B. An extended visual cryptography technique for medical image security. In international conference on innovative mechanisms for industry applications 2020 (pp. 415-21). IEEE.
[Crossref] [Google Scholar]
[26]Rane SS, Phansalkar KA, Shinde MY, Kazi A. Avoiding phishing attack on online votig system using visual cryptography. In international conference on computer communication and informatics 2020 (pp. 1-4). IEEE.
[Crossref] [Google Scholar]
[27]Kushnir M, Kosovan H, Kroialo P, Komarnytskyy A. Encryption of the images on the basis of two chaotic systems with the use of fuzzy logic. In international conference on advanced trends in radioelectronics, telecommunications and computer engineering 2020 (pp. 610-3). IEEE.
[Crossref] [Google Scholar]
[28]Han B, Jia Y, Huang G, Cai L. A medical image encryption algorithm based on hermite chaotic neural network. In information technology, networking, electronic and automation control conference 2020 (pp. 2644-8). IEEE.
[Crossref] [Google Scholar]
[29]Kaur S, Jindal A. Singular value decomposition (SVD) based image tamper detection scheme. In international conference on inventive computation technologies 2020 (pp. 695-9). IEEE.
[Crossref] [Google Scholar]
[30]Peng X, Zeng Y. Image encryption application in a system for compounding self-excited and hidden attractors. Chaos, Solitons & Fractals. 2020.
[Crossref] [Google Scholar]
[31]Wang X, Li Y, Jin J. A new one-dimensional chaotic system with applications in image encryption. Chaos, Solitons & Fractals. 2020.
[Crossref] [Google Scholar]
[32]Brahim AH, Pacha AA, Said NH. Image encryption based on compressive sensing and chaos systems. Optics & Laser Technology. 2020.
[Crossref] [Google Scholar]
[33]Ul Haq T, Shah T. Algebra-chaos amalgam and DNA transform based multiple digital image encryption. Journal of Information Security and Applications. 2020.
[Crossref] [Google Scholar]
[34]Ul Haq T, Shah T. 12× 12 S-box design and its application to RGB image encryption. Optik. 2020.
[Crossref] [Google Scholar]
[35]Dubey AK, Kumar A, Agrawal R. An efficient ACO-PSO-based framework for data classification and preprocessing in big data. Evolutionary Intelligence. 2020:1-4.
[Crossref] [Google Scholar]
[36]Dubey AK, Dubey AK, Namdev M, Shrivastava SS. Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment. In international conference on software engineering 2012 (pp. 1-8). IEEE.
[Crossref] [Google Scholar]