comparative studies of various techniques for encrypting ...ijsrcseit.com/paper/cseit1833170.pdfmore...

12
CSEIT1833170 | Received : 20 March 2018 | Accepted : 10 April 2018 | March-April-2018 [ (3 ) 3 : 1235-1244] International Journal of Scientific Research in Computer Science, Engineering and Information Technology © 2018 IJSRCSEIT | Volume 3 | Issue 3 | ISSN : 2456-3307 1235 Comparative Studies of Various Techniques for Encrypting Digital Image Salil Bharany 1 , Prabhpreet Kaur 2 1 MTech Student , CET Department GNDU, Amritsar ,India 2 Assistant Professor , CET Department, GNDU, Amritsar, India ABSTRACT The images has bestow significantly to the multimedia communication. When a user transfers an image to an unsafe communications network, absolute protection is a challenge for image surveillance. Encryption is a method of preserving the mystery of images This document provides a brief overview of cryptography and comparative comparison of criteria for the many radical securities of Image Cryptography algorithms. This work shows a number of technical studies on cryptographic images and computations for individual analysis, illustrations, conclusions, and future suggestions. Keywords : Encrypted image; histogram; image, image encryption; image security parameters; permutation and substitution; scrambling, XOR operation. I. INTRODUCTION The Internet and information technology are evolving rapidly. As a result, people use media to communicate extensively. For example audio and video images. The image occupies most of the multimedia. The image plays an important role in communication .For example Military, national security agents, and diplomatic affairs. Since these images may contain the most confidential information, these images require additional protection when you accumulate somewhere in the repository. Additionally, when people want to transfer their images over the network, then it is important to give absolute protection. Overall, the image needs protection against various attacks .The primary purpose of preserving the protected image is to maintain confidentiality and accuracy [16]. Different techniques can make the image safer and more technical is encryption. Usually, cryptography is a procedure that transforms a picture into a mysterious image by victimization of keys. In addition, the user can download the original image by applying the encryption method to the encryption image, which is usually performed instead of the encoding process. For illustration of figure 1 is a main picture. Users use cryptographic techniques and create cryptographic images. Figure 2 shows encrypted images as a result of the coding process. On the other hand, when you get this hidden image, it performs the decryption and restore the information back. Figure 3 shows the resultant image Figure 1. Original image Figure 2. Cipher Figure 3. Recovered image

Upload: others

Post on 28-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Comparative Studies of Various Techniques for Encrypting ...ijsrcseit.com/paper/CSEIT1833170.pdfMore important, cryptography has two main types. (1) symmetric key cryptography, (2)

CSEIT1833170 | Received : 20 March 2018 | Accepted : 10 April 2018 | March-April-2018 [ (3 ) 3 : 1235-1244]

International Journal of Scientific Research in Computer Science, Engineering and Information Technology

© 2018 IJSRCSEIT | Volume 3 | Issue 3 | ISSN : 2456-3307

1235

Comparative Studies of Various Techniques for Encrypting

Digital Image Salil Bharany1, Prabhpreet Kaur2

1MTech Student , CET Department GNDU, Amritsar ,India 2Assistant Professor , CET Department, GNDU, Amritsar, India

ABSTRACT

The images has bestow significantly to the multimedia communication. When a user transfers an image to an

unsafe communications network, absolute protection is a challenge for image surveillance. Encryption is a

method of preserving the mystery of images This document provides a brief overview of cryptography and

comparative comparison of criteria for the many radical securities of Image Cryptography algorithms. This

work shows a number of technical studies on cryptographic images and computations for individual analysis,

illustrations, conclusions, and future suggestions.

Keywords : Encrypted image; histogram; image, image encryption; image security parameters; permutation and

substitution; scrambling, XOR operation.

I. INTRODUCTION

The Internet and information technology are

evolving rapidly. As a result, people use media to

communicate extensively. For example audio and

video images. The image occupies most of the

multimedia. The image plays an important role in

communication .For example Military, national

security agents, and diplomatic affairs. Since these

images may contain the most confidential

information, these images require additional

protection when you accumulate somewhere in the

repository. Additionally, when people want to

transfer their images over the network, then it is

important to give absolute protection. Overall, the

image needs protection against various attacks .The

primary purpose of preserving the protected image is

to maintain confidentiality and accuracy [16].

Different techniques can make the image safer and

more technical is encryption. Usually, cryptography

is a procedure that transforms a picture into a

mysterious image by victimization of keys. In

addition, the user can download the original image

by applying the encryption method to the encryption

image, which is usually performed instead of the

encoding process. For illustration of figure 1 is a

main picture. Users use cryptographic techniques and

create cryptographic images. Figure 2 shows

encrypted images as a result of the coding process.

On the other hand, when you get this hidden image,

it performs the decryption and restore the

information back. Figure 3 shows the resultant image

Figure 1. Original image Figure 2. Cipher

Figure 3. Recovered image

Page 2: Comparative Studies of Various Techniques for Encrypting ...ijsrcseit.com/paper/CSEIT1833170.pdfMore important, cryptography has two main types. (1) symmetric key cryptography, (2)

Volume 3, Issue 3 | March-April-2018 | http:// ijsrcseit.com

Salil Bharany et al. Int J S Res CSE & IT. 2018 Mar-Apr;3(3) : 1235-1244

1236

More important, cryptography has two main types.

(1) symmetric key cryptography, (2) incompatible

key cryptography[16].

In cryptographic cryptography same keys is used for

encrypt and decrypt images[16].

Figure 4. Symmetric Key Encryption

Asymmetric or public key cryptography for

decrypting and encryption different keys are being

used [16]. This technique uses public keys and

private keys to encode and decode the image

respectively. However, these two keys are unique,

but mathematically connects.

Figure 5. Asymmetric Key Encryption

Additionally, a hashing authenticates the received

image due to having the one way property. Many

algorithms exist for encryption of particular

information. RSA, DES, AES, etc. These algorithms,

are most important to encrypt text data, however, are

not suitable for encrypting the image. [6] Since this

image intrinsic features such as several elevators and

a close relationship between pixels [6] adjacent to

each other So it's easier to pinpoint the location of

neighbouring pixels. Therefore, the image needs an

effective method to achieve invulnerable security.

Techniques for image encryption based on three

methods.(1) Pixel permutation :scrambling of

alternative set of pixels [22,23].

(2) Pixel substitution : Replacement of the pixel:

changing Pixel change value [22,23] . (3) Visual

transformation [22, 23]. An artificial nerve network

is a different approach to the protection of this image

and is useful because of its nonlinear and its own

unique properties [11].In ANN ,to calculate the final

result is easy, in contrast, downloading raw data from

the resulting task is a problem. Thus ,it will be not

possible to decide what kind of initial data from

result[11].in figure 6 there is a feed forward neutral

network and formula which figure out the output of

network

Figure 6. Artificial Neural Network n

Y f (Wi X i b) (1)

i1

Where Y is output, W is the weight, X is an input; b

is bias and n is the number of neurons in different

layer.

In addition, compression is another technique for

image encoding by abbreviating an image. So the

compressed image form is hard to understand. In

addition, the main advantage of encryption through a

compressive process is that it helps to reduce image

size without losing the information provided,

without loss of information. However, lossy

compression can be used when minor distortion is

allowed.

II. INTRODUCTION TO IMAGE SECURITY

PARAMETERS

Wherever Times is specified, Times Roman or Times

New Roman may be used. If neither is available on

Page 3: Comparative Studies of Various Techniques for Encrypting ...ijsrcseit.com/paper/CSEIT1833170.pdfMore important, cryptography has two main types. (1) symmetric key cryptography, (2)

Volume 3, Issue 3 | March-April-2018 | http:// ijsrcseit.com

Salil Bharany et al. Int J S Res CSE & IT. 2018 Mar-Apr;3(3) : 1235-1244

1237

your word processor, please use the font closest in

appearance to Times. Avoid using bit-mapped fonts if

possible. True-Type 1 or Open Type fonts are

preferred. Please embed symbol fonts, as well, for

math, etc.

Generally, an excellent encryption technique

qualifies various security criteria and some of them

are following as:

2.1 Large key space :A huge keys space should be

needed for reducing the chances of brute force

attack [2]. For example, the key of size 512 bits

provides the key space of 2512 (≅ 10154 possible

combinations).Thus, if a computation machine does

1010 calculations per second, will take about 10136

years to find the right key which is simply not

possible .

2.2 Key sensitivity: It ensures that this system will

have a completely opposite effect, regardless of key

changes [8].this leads to if we make change to the

shortest part of key it will surely create a different

encrypted image

2.3 Constant Image histogram: Continuous pixel

distribution and density estimation [19, 20] are

provided by the histograms. Therefore, the encrypted

image must have the different histogram to make it

more secure from that the plain text attack [21].In

Fig 7 original image is represented by the histogram

and in fig 8 the histogram of the encrypted image is

there which is highly desirable and uniform

Figure 7. Histogram of an original image

Figure 8. Histogram of Cipher Image

2.4 Information entropy: It limits the level of

uncertainty and even distribution within the system

[17]. Therefore, Randomness and Even distribution

must be shown in the encryption process. By using a

formula (2) Information entropy is calculated.

Where p (mi) defines the probability of a pixel and N

is the number of bits in each pixel. For a grey level

image, each pixel has 8 bits, so the probability of a

pixel is 1∕ 28. Hence, information entropy of the grey

level image is H (m) = 8. However, practically it is

intricate to obtain ideal entropy; so slight difference

is also tolerable.

2.5 Correlation analyses: It evaluates the ratio

between two adjacent pixels of ordinary images and

encrypted images [17]. The secret image must have

minimum correlation between two consecutive

pixels. For example, xi and yi are two pixels pixel, the

correlation can be calculated by equation (6) [24].

Page 4: Comparative Studies of Various Techniques for Encrypting ...ijsrcseit.com/paper/CSEIT1833170.pdfMore important, cryptography has two main types. (1) symmetric key cryptography, (2)

Volume 3, Issue 3 | March-April-2018 | http:// ijsrcseit.com

Salil Bharany et al. Int J S Res CSE & IT. 2018 Mar-Apr;3(3) : 1235-1244

1238

Where xi and yi are grey level value of two adjacent

pixels, N is the number of pairs (xi, yi) and E(x) is the

mean of xi and E(y) is the mean of yi.

2.6 Differential analyses : NPCR (Rate of

Exchange Rate Ratings) and UACI (Compression of

the Unified Medium Normalization Level) measure

the variability of the anti-apartheid algorithm over

the image [17]. The NPCR estimates the rate of

change in pixels in the encoded image after a pixel

correction of the main image [17] [18] so that the

high NPCR value is effective. Additionally ,the

amend between the pixels of the plain image and

encrypted image is being calculated by the UACI [18],

Before changing the bit of the original image , if the

C1 and C2 are encoded in the image the by the use

of the formula (7) and (8) we can obtain UACI and

NPCR .

Image Encryption Using Affine Transform and XOR

Operation (2011)

In this work, Amitava Nag, Jyoti Prakas Singh,

Srabanin han, Susanna Bisvas, D. Sarkar, and Parta

Pratim Sarkar [1] has used a technique with a 64-bit

key to encryption. A techniques in which affine

transformation of dissipate the pixels by applying sub

keys of 8 bits each and use 4 sub keys.Next, the

image is decomposed in 2 × 2 pixels of the block, and

then apply the XOR operation on each block with 4

sub keys of 8 bits to change the value of the pixel.

Figure 9 shows the image. Relevant systems manage

the processing operations on the original image to

create the transformed image. The fiction process

uses XOR operations on the transformed image of an

encrypted image Figure 9 shows the original image

and Figure 10 shows the transformed image . Figure

11,12,13 Represents the image converted , display the

histogram of the original image and display the

histogram of the secret image

Figure 9. Car Figure 10. Transformed image

Figure 11. Cipher image after XOR opertaion

Page 5: Comparative Studies of Various Techniques for Encrypting ...ijsrcseit.com/paper/CSEIT1833170.pdfMore important, cryptography has two main types. (1) symmetric key cryptography, (2)

Volume 3, Issue 3 | March-April-2018 | http:// ijsrcseit.com

Salil Bharany et al. Int J S Res CSE & IT. 2018 Mar-Apr;3(3) : 1235-1244

1239

Figure 12. Histogram of the original car

Figure 13. Histogram of Cipher

Consequently, the method shown is less effective in

reducing the pixel ratio and also having short key

space. This algorithm is not complicated enough in

the main procedures that are used by the encryption

process. Therefore, the provided technique does not

provide a picture-security level, due to short and

simple operations with the XOR

A New Chaotic System for Image Encryption (2012)

In this scenario, Longboe and Yixing Cho have

proposed a new chaotic system that represents three

1-dimensional chaotic maps. In purposed technique

random sequences [2] is generated by using logistic

map as the controller which select the tent or sine

map .The algorithm then uses the node replacement

structure (SPN) to get confusion and diffusion assets

[2, 15]. This scheme uses a 240-bit key for large key

space. Normally , for excessive sensitivity for

encryption and decryption we can change the

parameters settings of key.Therefore, the proposed

approach offers good protection against attacks of

brute force, as well as the variations of key words

and chaotic behavior.

Novel Digital Image Encryption Method Based on

One-dimensional Random Scrambling (2012)

In this, Ping Guan, Yunfeng Xue ,Yongping and,

Qiudong Sun [3] use a random scrambling technique

using one- dimensional . starting the process convert

2-dimensional image into one- dimensional image

and then a random shuffling (one-dimensional)is

applied .then works against the transformation on

the dispersed vector to create an encrypted picture.

So the design scheme does not require a

computational requirement as one or two execution

are sufficient for the best result. Figure 14 shows the

original image. After the initial operation of

technical procedure, produce the encoded image

with the code as shown in Figure 15. After 15

operating cycles. Encrypted image is produced are

shown in Figure 16.Orginal image is shown in fig 17

and in Fig 18 histogram representation of original

image and encrypted image of dog .

Figure 14. Dog Figure 15. Cipher at iteration 1

Figure 16. Cipher at iteration 15

Page 6: Comparative Studies of Various Techniques for Encrypting ...ijsrcseit.com/paper/CSEIT1833170.pdfMore important, cryptography has two main types. (1) symmetric key cryptography, (2)

Volume 3, Issue 3 | March-April-2018 | http:// ijsrcseit.com

Salil Bharany et al. Int J S Res CSE & IT. 2018 Mar-Apr;3(3) : 1235-1244

1240

Figure 18. Histogram of the cipher image

Figure 19. Histogram of the cipher image

After the experiment it was found that the histogram

of the original image and the ciphered image was the

same because of the scrambling process. However,

scrambling processes reduce the interconnection

between pixels but does not affect histograms.

Because the histogram of the image shows enough

information about the original image. Therefore, the

requested technique does not fit into the high

confidential image.

Technique for Image Encryption Based On Explosive

n*n Block Displacement Followed By Inter-Pixel

Displacement of RGB Attribute of A Pixel (2012)

In this scenario , Amnes Goel and nidhi Chandra[4]

have proposed an efficient method that decomposes

the original image of image having a size of n*n size

of block .After this ,minimizing the correlation

between pixels[4] is done using an algorithm .In

general, the technique provided has two main stages.

This is the initial settlement process of the blocking

of the block, followed by the vertical movement of

the block. Then, in the second stage, the RGB value

is changed between pixels. Each stage contains a

mask or its own key used in the process [4]. Figure 19

represents the original image with 300 * 300

dimensions, and after applying this image block,

Figure 20 was created. In addition, after performing

the vertical movement of the unit on a horizontal

motion image, a picture was created, shown in Figure

21. Then use the pixel shift in the RGB value to

obtain an encrypted picture that is represented in

Figure 22.

Figure 21.Vertical displacement Figure 22. Cipher

Image at 10*10 block size

Figure 19. Original Image Figure 10. Horizontal

displacement of 10*10

The experimental outcomes validate that the

propounded system generates a robust cipher image

with the help of explosive displacement in RGB

values.

Novel Neural Network Approach for Digital Data

Encryption/Decryption (2012)

In this paper , Saraswati D. Joshi Dr. VR. Udupi and

MD D. Joshi has perfected a strategy which examines

a picture pixel by pixel.. Then, transformation is

committed which involves substitution and

permutation of pixelsIn addition, the coding

procedure introduces irregularities in the

transformed image to separate it. This system uses

two levels of encryption to gain powerful security. In

addition, artificial Neural networks are used to

Page 7: Comparative Studies of Various Techniques for Encrypting ...ijsrcseit.com/paper/CSEIT1833170.pdfMore important, cryptography has two main types. (1) symmetric key cryptography, (2)

Volume 3, Issue 3 | March-April-2018 | http:// ijsrcseit.com

Salil Bharany et al. Int J S Res CSE & IT. 2018 Mar-Apr;3(3) : 1235-1244

1241

decoded the images that include three stages [5].In

the first phase this system will clear irregularities

which were added . Then 2 stage ,network discards

the extra conjoined columns in matrix. In addition,

the third stage , stimulation of the network is done

by the received image data and weight which were

stored after training . The effect of this method is due

to arbitrary encryption on the sender side and

prevents the change of keys. Therefore, the proposed

technique provides a powerful level of security. The

basic assumption is that the decryption process is

longer and take time .

A Novel Encryption method for Image Security

(2012)

In this article, Mohammed Abbas and Fajil al-

Hussein have developed a method that relies on

changes on bit level permutation. Security is

enhanced by using two Boolean operations XOR and

rotation of pixels bits .this will create diffusion and

confusion .In addition to this procedure, the

algorithm has applied XOR functions sequentially to

all pixel bits in the image and by the circular right

rotation of these bits. Techniques have repeatedly

made these two actions to provide better security. In

addition, this method uses same encryption and

encryption key generally. Figure 23 is the main

image, and Figure 24 is an encrypted image

completely different from the original.

Figure 23. Original Image Figure 24. Cipher Image

Two Layer Chaotic Network Based Image Encryption

Technique (2012)

In this article, Angel Jain and Navin Ripal provide

technical reliance which relies on the diffusion and

substitution. A doubled layered chaotic neural

networks is used in propound system for encryption

and decryption of image In addition, this method

uses a logical chaotic map to Design weights and

biases for neural networks and external keys that

provide initial conditions [7]. Defined algorithms

typically use an 80-bit key. However, the chaotic

order sequence is the same as coding and decoding

[7].Diffusion is being used by the first layer and the

second layer is used for substitution while decrypting

Layout of layers is in reverse order. Therefore, the

technology provided gives significant security against

the attacks of brute force and known plaintexts or

chosen plaintext attack .

A New Cryptographic Approach for Image

Encryption (2012)

In this scenario, Nidhi Seth and Dipika Sharma [8]

provide an encryption method that takes advantage

of the logistic mapping to encode and compress

images. The full implementation of the proposed

algorithm is as follows: First the imparted scheme

abbreviates an image through Haar Wavelet

transformation. Then the system breaks the image

into 8 * 8 size of block ; then this disjoint picture

goes into the encoding process.. Typically, this

encoding procedure has two stages. At first, the inter

pixel correlation by using a block based scrambling is

minimized by the propounded program. A crossover

approach is being utilized by the shuffling method

that relies on genetic algorithm [8].Additionally, in

phase 2, this system is used to encrypt the pixel

values of the dispelled facsimile a 2D Logistic map.

including, the Logistic based mode satisfies the

confusion and diffusion properties in the cipher

picture, which makes it harder to encrypt or decrypt

it from a third party. The logistic map then generates

the key that is sent to the recipient through a

prohibited method (watermarking) for powerful

security. The results suggest that the proposed

strategy can provide reliable protection.

I. SD-AEI: An Advanced Encryption Technique

for images (2012)

Page 8: Comparative Studies of Various Techniques for Encrypting ...ijsrcseit.com/paper/CSEIT1833170.pdfMore important, cryptography has two main types. (1) symmetric key cryptography, (2)

Volume 3, Issue 3 | March-April-2018 | http:// ijsrcseit.com

Salil Bharany et al. Int J S Res CSE & IT. 2018 Mar-Apr;3(3) : 1235-1244

1242

In this script, the Somdip dev [9] provides a technical

approach to be proposed depends on three methods

of cryptography: (1) reversal and rotation of bit,(2)

extended Hill Cipher, (3) modified MSA

randomization[9]. In addition, the requested system

uses four stages of encrypting the image. In the early

stages, the algorithm produces a unique number for

symmetric key. In step 2, the rotation of bits and the

reversal are applied based on the length of the

symmetric key. Then, in the third phase, extended

hill cipher is being used as an encryption technique.

Then, in step four, this project uses MSA

randomization approach for substitution. The

experimental results indicate that the coding

procedure for SD-AEI has an impact on the SD-EI

due to additional randomization.

J. Digital Image Encryption Algorithm Based on

Multi-Dimensional Chaotic System and Pixels

Location (2012)

In this article, Hazern Mohammad al-Najjar [10]

has requested the creation of digital encoding

technology based on multidimensional chaotic

functionality. This system will dispels pixels and

change the pixel value. . By applying two

substitution methods and using two scrambling

processes to scatter pixels is used to change the

pixel values In addition, the proposed courses

encrypt the following images first applies the first

substitution scheme using column index

value ,followed by the first scrambling method

which utilizes X,Y,Z planes of Rossler equation.

Then system operates the second replacement

process using row index followed by shuffling plan

which employs X,Y,Z planes [10]. Observes that

the algorithm is sensitive to the original state and

may also invulnerable to brute force attacks and

other types because of the large key size 10 ^ 45.

K. Unified Approach with Neural Network for

Authentication, Security and Compression of

Image: UNICAP (2012)

In this paper, Dattatherya, S. Venkata Chalam and

Manoj Kumar Singh provide three stage encryption

method : compression, security, and authentication.

The proposed method uses an neural network to

perform these tasks. The proposed scheme uses a

universal approximation for the compression.In

addition, this method carries forward neural network

for compression. the hidden layer has the least

number of neurons compared to the input layer. The

procedures being carried out ensure the safety of the

neural network, due to the one way property of

neural networks .the system provides authenticity by

the one to one mapping.Later on, this method offers

sufficient security, along with image area detection

features. A separate section of the system is shown in

the image below. Figure 25 shows the architecture of

an artificial neural network that causes compression.

Figure 26 is a compact module that is used which is

used for the abridgement and generates a compact

output for a block. In addition, Figure 27 displays a

module, which decompresses the squashed data for a

block.

Figure 25. Architecture of Artificial Neural Network

for compression training

Figure 26. Compression part of Artificial Neural

Network

Page 9: Comparative Studies of Various Techniques for Encrypting ...ijsrcseit.com/paper/CSEIT1833170.pdfMore important, cryptography has two main types. (1) symmetric key cryptography, (2)

Volume 3, Issue 3 | March-April-2018 | http:// ijsrcseit.com

Salil Bharany et al. Int J S Res CSE & IT. 2018 Mar-Apr;3(3) : 1235-1244

1243

Figure 27. Decompression part of Artificial Neural

Network

L. Image Encryption and Decryption Using

Blowfish Algorithm in MATLAB (2013)

In this research, Pia Singh and Karameet Singh [12]

developed a technique based on the blowfish

algorithm. Generally, the Blowfish algorithm is a 64-

bit symmetric block cipher, in which it repeats 16

times and applies a range of variable key lengths

from 32 to 448 bits.The offered system follows the

two processes; the first is a key expansion, and the

second is a data encryption. Furthermore, the

Blowfish algorithm includes a swap operation after

executing two exclusive-or operations that are

performed after 16 rounds. The complications have

proved that blowfish method is fast and safe.

M. Digital Color Image Encryption Using RC4

Stream Cipher and Chaotic Logistic Map (2013)

In this situation, Riah Ukur Ginting and Rocky

Yefrences Dillak [13] have built up the algorithm

utilizing the RC4 Stream Cipher and Chaotic Logistic

maps. The invented strategy comprises of three

phases. At the beginning, the system changes the

system key to its original value .Then, in the second

step, the technique applies the original value to the

chaotic Logistic Map to In this scenario, Riah Ukur

Ginting and Rocky Yefrences Dillak [13] have

developed the algorithms using the RC4 Stream

Cipher and Chaotic Logistic maps. The developed

technique consists of three stages which generate the

random number pseudo. Subsequently, in the third

stage, the system XOR the byte stream of the plain

picture with the stream of pseudo arbitrary number

for the encryption. Test results of this encryption

calculation approve that the decryption procedure is

the very high tactful.

N. GS-IES: An Advanced Image

Encryption Scheme (2013)

In this article, Amandeep Kaur [14] , Gurpreet Singh

has developed a new method which use SD_IES by

adding a new permutation block in SD-IES

techniques .The latest developed method consists of

five stages. In the first step, the technique uses an

RSA algorithm to generate a password and perform a

one-bit rotation based on the generated password. In

addition, in the second phase, the technique

proposed to implement the extended hill cipher

technique which make encryption insusceptible.In

addition, in the third step techniques apply bit’s

reversal. Then, in stage 4, the process uses

permutation and combination rotation using

password length , and in fifth stage ,the encrypted

image stored . ultimately , the GS-IES algorithm is

authoritative on the last SD-IES due to the intimacy

of permutation block in the last stage.

III. COMPARION OF VARIOUS IMAGE

ENCRYPTION TECHNIQUES

Comparison is done on the basis of; key space, key

sensitivity, entropy of original and cipher image, and

change in the

histogram after encryption, correlation coefficient of

original image and cipher image and NPCR value.

Page 10: Comparative Studies of Various Techniques for Encrypting ...ijsrcseit.com/paper/CSEIT1833170.pdfMore important, cryptography has two main types. (1) symmetric key cryptography, (2)

Volume 3, Issue 3 | March-April-2018 | http:// ijsrcseit.com

Salil Bharany et al. Int J S Res CSE & IT. 2018 Mar-Apr;3(3) : 1235-1244

1244

Table 1. Comparison of various image encryption algorithms

S.

N Authors Technique Key Histogram NPCR %

Used space

1 A. Nag, J.P.

264

Singh, S. Transformation Not good 0

Khan, S. & XOR (negligible)

Biswas et.al

[1]

2 Long Bao and

2240

Yicong Zhou Three one- Good 99.61

[2] dimensional

chaotic map

3 Qiudong Sun,

Ping Guan, One Not No change 99.36

Yongping and dimensional fix (same as

Yunfeng Xue random original

[3] scrambling image)

4 Mohammed

Abbas and Bit level Not Good 0

Fadhil Al- permutation, fix (negligible)

Husainy [6] XOR & rotation

5 Nidhi Sethi

10112

and Deepika Two Good 0

Sharma [8] dimensional (negligible)

logistic map &

compression

Page 11: Comparative Studies of Various Techniques for Encrypting ...ijsrcseit.com/paper/CSEIT1833170.pdfMore important, cryptography has two main types. (1) symmetric key cryptography, (2)

Volume 3, Issue 3 | March-April-2018 | http:// ijsrcseit.com

Salil Bharany et al. Int J S Res CSE & IT. 2018 Mar-Apr;3(3) : 1235-1244

307

6 Hazern

1045

Mohammad Multi- Good 99.63

Al-Najjar [10] dimension

chaotic function

The zero or negligible NPCR value means that the

technique achieves negligible NPCR (less than .01%).

IV. CONCLUSION

This work has found a lot of algorithms for

encrypting images and concludes that the chaotic

method presents extreme uncertainty and offers

incredible security.Moreover, study shoes that the

NPCR is not depended on the sensitivity of keys so,

to achieve satisfactory NPCR in the block based

encryption methods, the values of an encrypted

block should be dependent on the other cipher

blocks .Further, results shoes that to offer the

remarkable security only scrambling is not enough :

so there should include substitution along with

shuffling .Consequently, this review infers that a

unrivalled image encryption technique has the

following properties to provide the best protection;

(1) large key space , (2)high sensitivity of keys, (3)

unique histogram is generated , (4) Shannon's

Confusion and diffusion property is contented (5)

Effective interrelationship between two pixels

which are adjacent to each other (6) High security

due to systemic uncertainty (7) High NPCR (Nearly

100%) and UACI that are appropriate 33%.

V. REFERENCES

[1]. Nag, Jyoti Prakash Singh, Srabani Khan,

Sushanta Biswas, D. Sarkar, Partha Pratim

Sarkar "Image Encryption Using Affine

Transform and XOR Operation" 2011

International Conference on

SignalProcessing, Communication, Computing

and Networking Technologies

[2]. Long Bao, Yicong Zhou, C. L. Philip Chen,

Hongli Liu "A New Chaotic System for Image

Encryption" 2012 International Conference on

System Science and Engineering

[3]. Qiudong Sun, Ping Guan, Yongping Qiu,

Yunfeng Xue "A Novel Digital Image

Encryption Method Based on One-dimensional

Random Scrambling" 2012 9th International

Conference on Fuzzy Systems and Knowledge

Discovery

[4]. Amnesh Goel, Nidhi Chandra "A Technique for

Image Encryption Based On Explosive n*n

Block displacement Followed By Inter-Pixel

Displacement of RGB Attribute of A Pixel"

2012 International Conference on

Communication Systems and Network

Technologies

[5]. Saraswati D. Joshi, Dr. V.R. Udupi, Dr. D.R.

Joshi, "A Novel Neural Network Approach for

Digital Image DataEncryption/Decryption",

Power, Signals, Controls and Computation

(EPSCICON), 2012 International Conference

[6]. Mohammed Abbas Fadhil Al-Husainy, "A

Novel Encryption Method for Image Security",

International Journal of Security and Its

Applications,

[7]. Anchal Jain, Navin Rajpal, "A Two Layer

Chaotic Network Based Image Encryption

Technique", Computing and Communication

Systems (NCCCS), 2012 National Conference

[8]. Nidhi Sethi, Deepika Sharma, "A New

Cryptographic Approach for Image

Page 12: Comparative Studies of Various Techniques for Encrypting ...ijsrcseit.com/paper/CSEIT1833170.pdfMore important, cryptography has two main types. (1) symmetric key cryptography, (2)

Volume 3, Issue 3 | March-April-2018 | http:// ijsrcseit.com

Salil Bharany et al. Int J S Res CSE & IT. 2018 Mar-Apr;3(3) : 1235-1244

1245

Encryption", Parallel, Distributed and Grid

Computing (PDGC), 2012 2nd IEEE

International Conference

[9]. Somdip Dey, "SD-AEI: An Advanced

Encryption Technique for Images", Digital

Information Processing and Communications

(ICDIPC), 2012 Second International

Conference

[10]. Hazem MohammadAl-Najjar, "DigitalImage

Encryption Algorithm Based on Multi-

Dimensional Chaotic System and Pixels

Location",International Journal of Computer

Theory and Engineering

[11]. Dattatherya, S. Venkata Chalam & Manoj

Kumar Singh,"Unified Approach with

Neural Network for Authentication,

Security and Compression of

Image:UNICAP", International Journal of

Image Processing

[12]. Pia Singh, Karamjeet Singh, "Image Encryption

and Decryption Using Blowfish Algorithm in

MATLAB", International Journal of Scientific

& Engineering Research

[13]. Riah Ukur Ginting, Rocky Yefrences Dillak,

"DigitalColor Image Encryption Using RC4

Stream Cipher and Chaotic Logistic Map",

Information Technology and Electrical

Engineering (ICITEE), 2013 International

Conference on

[14]. Gurpreet Singh, Amandeep Kaur, "GS-IES: An

Advanced Image Encryption Scheme"

International Journal of Engineering Research

& Technology,

[15]. D. R.Stinson, Cryptography, Theory and

Practice. Third edition: Chapman & Hall/CRC,

2006. William Stallings, Cryptography and

Network Security, Principles and Practice.

Fifth edition.

[16]. William Stallings, Cryptography and

NetworkSecurity,Principles and Practice. Fifth

edition.

[17]. Shujiang Xu, Yinglong Wang, Jizhi Wang,

Yucui Guo,"A Fast Image Encryption Scheme

Based on a Nonlinear Chaotic Map", 2010 2nd

International Conference on Signal Processing

Systems (ICSPS), 5-7 July 2010

[18]. Linhua Zhang, Xiaofeng Liao, Xuebing Wang,

"An image encryption approach based on

chaotic maps", Chaos, Solitons & Fractals.

Volume 24, Issue 3, May 2005, Pages 759–765.

[19]. http://en.wikipedia.org/wiki/Histogram

[20]. Karl Pearson (1895), "Contributions to the

Mathematical Theory of Evolution II, Skew

Variation in Homogeneous Material".

Philosophical Transactions of the Royal Society

A: Mathematical, Physical and Engineering

Sciences 186:

[21]. Xu Shujiang Wang Yinglong, Guo Yucui Wang

Cong,"A Novel Chaos-based Image

Encryption Scheme", International Conference

on Information Engineering and Computer

Science (ICIECS) 2009, 19-20 Dec. 2009,

[22]. http://www.waset.org/journals/waset/v3/v3-

7.pdf Analysis and Comparison of Image

Encryption Algorithms by Ismet Öztürk and

Ibrahim Soukpinar.

[23]. Abhinav Srivastava, "A survey report on

Different Techniques of Image Encryption",

International Journal of Emerging

[24]. Technology and Advanced Engineering,

Volume 2, Issue 6, June 2012,