Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 31743
A Survey on Principal Aspects of Secure Image Transmission

Authors: Ali Soleymani, Zulkarnain Md Ali, Md Jan Nordin


This paper is a review on the aspects and approaches of design an image cryptosystem. First a general introduction given for cryptography and images encryption and followed by different techniques in image encryption and related works for each technique surveyed. Finally, general security analysis methods for encrypted images are mentioned.

Keywords: Image, cryptography, encryption, security, analysis.

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2181


[1] B. Furht and D. Kirovski, Multimedia Security Handbook, CRC Press, USA, 2005.
[2] P. Dang and P. M. Chau, Image encryption for secure internet multimedia applications, IEEE Transaction on Consumer Eletronics, 46(3): pp. 395403, 2000.
[3] P. Dang and P. M. Chau, Implem1entation IDEA algorithm for image encryption, Mathematics and Applications of Data/Image Coding , Compression and Encryption, volume 4122 of Proceedings of SPIE, pp. 19, 2000.
[4] P. Dang and P. M. Chau, Hardware/software implementation 3-Way algorithm for image encryption, Security and Watermarking of Multimedia Contents II, volume 3971 of Proceedings of SPIE, pp. 274283, 2000.
[5] S. McCanne and V. Jacobson, A flexible framework for packet video, Proceedings of 3rd ACM International Conference on Multimedia, pp. 511522, 1995.
[6] B. Furht, E. Muharemagic and Daniel Socek, multimedia encryption and watermarking, Springer, 2005.
[7] J. Daemen and V. Rijmen, AES Proposal: Rijndael, AES Algorithm Submission, September 3, 1999.
[8] M. Zeghid, M. Machhout, L. Khriji, A. Baganne and R. Tourki, A Modified AES Based Algorithm for ImageEncryption, World Academy of Science, Engineering & Technology, 2007.
[9] B. Subramanyan, V. M. Chhabria, T. G. S. babu, Image Encryption Based On AES Key Expansion, Second International IEEE Conference on Emerging Applications of Information Technology, 2011.
[10] Q. Gong-bin, J. Qing-feng and Q. Shui-sheng, A New Image Encryption Scheme Based on DES Algorithm and Chuas Circuit, Int. Journal of Computer Science and Network Security, VOL.8, No.4, April 2008.
[11] W. Diffie and M. E. Hellman, New Directions in Cryptography, IEEE Transactions on Information Theory, Vol. 22, Issue 6, Nov 1976.
[12] H. Shuihua and Y. Shuangyuan, An Asymmetric Image Encryption Based on Matrix Transformation, Transactions on Computer and Information Technology, Vol. 1, No. 2, 2005.
[13] K.Ganesan, I. Singh and M. Narain, Public Key Encryption of Images and Videos in Real Time Using Chebyshev Maps, Fifth International Conference on Computer Graphics, Imaging and Visualization, 2008.
[14] K. Gupta, S. Silakari, R. Gupta and S. A. Khan, An Ethical way for Image Encryption using ECC, First I. Conference on Computational Intelligence, Communication Systems and Networks, 2009.
[15] M. Naor and A. Shamir, Visual cryptography, Advances in Cryptology-EUROCRYPT94, Lecture Notes in Computer Science, Vol. 950, Springer-Verlag, Berlin, pp. 1-12, 1995.
[16] A. M. Jaafar and A. Samsudin, A New Public-Key Encryption Scheme Based on Non-Expansion Visual Cryptography and Boolean Operation, Int. Journal of Computer Science Issues, Vol. 7, Issue 4, No. 2, July 2010.
[17] R. Matthews, On the derivation of a chaotic encryption algorithm. Cryptologia, pp. 2942, 1989.
[18] B. Mohammed, G. Mourad, Z. Nourddine, R. Fakhita and B. ElHoussine, Encryption-Compression Method of Images, Int. Journal on Computer Science and Information Systems Vol. 4, No. 1, pp. 30-41, 2009.
[19] L. Vorwerk, T. Engel and C. Meinel, A proposal for combination of compression and encryption, Proceedings of Visual Communications and Image Processing, SPIE, Vol. 4067, 2000.
[20] I. Masanori, O. Noboru, A. Ayman, M. Ali, New Image Encryption and Compression Method Based on Independent Component Analysis, 3rd International Conference on Information and Communication Technologies: From Theory to Applications, April 2008.
[21] C. P. Wu and J. Kuo, Design of Integrated Multimedia Compression and Encryption Systems, IEEE Transactions on Multimedia, Vol. 7, No. 5, 2005.
[22] W. Effelsberg and R. Steinmetz, Video Compression Techniques, Heidelberg, Germany: Dpunkt-Verlag, 1998.
[23] W. Zeng and S. Lei, Efficient Frequency Domain Selective Scrambling of Digital Video, IEEE Transactions on Multimedia, 5(1), March 2003.
[24] T. Maples and G. Spanos, Performance study of a selective encryption scheme for the security of networked real-time video, Proceedings of the 4th International Conference on Computer Communications and Networks, Las Vegas, 1995.
[25] I. Agi and L. Gong, An empirical study of secure MPEG video transmission, Symposium on Network and Distributed Systems Security, 1996.
[26] M. V. Droogenbroeck and R. Benedett, Techniques for a selective encryption of uncompressed and compressed images, Proceedings of ACIVS, Ghent, Belgium, September 2002.
[27] M. V. Droogenbroeck, Partial Encryption of Images for Real-Time Applications, 4th IEEE Signal Processing Symposium, Hilvarenbeek, The Netherlands, pp. 11-15, 2004.
[28] O. M. Odibat, M. H. Abdallah and M. B. Al-Zoubi, New Techniques in the Implementation of the Partial Image Encryption , 4th International Multi-conference on Computer Science and Information Technology, Jordan, 2006.
[29] K. Hong and K. Jung, Partial Encryption of Digital Contents Using Face Detection Algorithm, Springer-Verlag, 2006.
[30] J. M. Rodrigues, W. Puech, P. Meuel, J. C. Bajard and M. Chaumont, Face Protection by Fast Selective Encryption in a Video, The Institution of Engineering and Technology Press, Seattle, WA, 1993.
[31] S. Lian, J. Sun, D. Zhang and Z. Wang, A Selective Image Encryption Scheme Based on JPEG2000 Codec, LNCS 3332, pp. 6572, Springer-Verlag, Berlin Heidelberg, 2004.
[32] N. Tanejaa, B. Ramanb, I. Guptaa, Selective image encryption in fractional wavelet domain, In. Journal of Electronics and Communications, (AE) 65, pp. 338344, Elsevier, 2011.
[33] E. N. Lorenz, The Essence of Chaos, University of Washington Press, Seattle, WA, 1993.
[34] H. S. Kellert, In the Wake of Chaos: Unpredictable Order in Dynamical Systems, University of Chicago, pp. 56-62, 1993.
[35] L. Kocarev, Chaos-based cryptography: a brief overview, IEEE Circuits and Systems Magazine 1(3): pp. 6 21, 2001.
[36] S. Li, Analyses and New Designs of Digital Chaotic Ciphers., PhD thesis, School of Electronics & Information Engineering, Xian Jiaotong University, Xian, China, 2003.
[37] M. S. Baptista, Cryptography with chaos, Physics Letters A 240, pp. 50-54, Elsevier Science, 1998.
[38] G. Jakimoski and L. Kocarev, Analysis of Some Recently Proposed Chaos-Based Encryption Algorithms, International IEEE conference on Multimedia, 2007.
[39] M. Sharma and M. K. Kowar, Image Encryption Techniques Using Chaotic Scheme: a Review, Int. Journal of Engineering Science and Technology, Vol.2, pp. 2359-2363, 2010.
[40] J. Fridrich, Image encryption based on chaotic maps, Proceedings of International IEEE Conference on Sysytems, Man and Cybernetics, Vol. 2, pp. 11051110, 1997.
[41] J. Fridrich, Secure image ciphering based on chaos, Technical Report RL-TR-97-155, the Information Directorate of the Air Force Research Laboratory, New York, 1997.
[42] J. C. Yen and J. In Guo, A New Chaotic Key-Based Design for Image Encryption and Decryption, IEEE International Symposium on ISCAS, Geneva, pp. 49-52, 2000.
[43] M. I. Sobhy, and A. R. Shehata, Chaotic Algorithms for Data Encryption, IEEE Proceeding of ICASSP, Vol 2, pp. 997-1000, 2001.
[44] F. Belkhouche and U. Qidwai ,Binary image encoding using 1D chaotic maps, IEEE Annual Technical Conference Region 5, 2003.
[45] Z. Han and W. X. Feng, A new image encryption algorithm based on chaos system Proc. IEEE Int. Conf. Robotics, Intelligent Systems and Signal Processing. Changsha, China, pp. 778-782, 2003.
[46] S. Deng, L. Zhang and Di Xiao, Image Encryption Scheme Based on Chaotic Neural System, Lecture Notes in Computer Science, Volume 3497, pp. 868-872, 2005.
[47] M. R. Zhang, G. C. Shao and K. C. Yi, T-matrix and its applications in image processing, IEEE Electronics Letters, Vol. 40 No. 25, 9th December 2004.
[48] Z. YiWei, W. YuMin and S. XuBang, A chaos-based image encryption algorithm using alternate structure, Science in China Series F: Information Sciences, Springe-Verlag, vol. 50, no. 3, 334-341, 2007.
[49] M. Ahmad and M. Shamsher Alam, A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping, International Journal on Computer Science and Engineering, Vol.2 (1), pp. 46-50, 2009.
[50] I. A. Ismail, M. Amin and H. Diab, A Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps, International Journal of Network Security, Vol.11, No.1, PP.1-10, July 2010.
[51] G. Srividya and P. Nandakumar, A Triple-Key Chaotic Image Encryption Method, International Conference on Communications and Signal Processing (ICCSP), 2011.
[52] N. K. Pareek, Vinod Patidar, K. K. Sud; "Image encryption using chaotic logistic map", Image and Vision Computing 24 (2006) 926-934.
[53] B. Schneier, Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish), Fast Software Encryption, Cambridge Security Workshop Proceedings (December 1993), pp. 191-204, Springer-Verlag, 1994.
[54] Rivest, Shamir and Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM 21 (2): pp. 120126, 1978.
[55] C. Y. Lin and S. Fu Chang, Generating Robust Digital Signature for Image/Video Authentication, Multimedia and Security Workshop at ACM Multimedia, Bristol, UK. , 1998.
[56] T. Chen, J. Wang and Y. Zhou, Combined Digital Signature and Digital Watermark Scheme for Image Authentication, Int. Conferences on Infotech and Info-net, Beijing, 2001.
[57] C. S. Lu and H. Y. Mark Liao, Structural Digital Signature for Image Authentication: An Incidental Distortion Resistant Scheme, IEEE Transactions on Multimedia,Vol.5,No.2, 2003.
[58] H. Zang, L. Min, Li Cao, An Image Encryption and Digital Signature Scheme Based on Generalized Synchronization Theorem, International Conference on Computational Intelligence and Security, 2009.
[59] G. Zhao, X. Yang, B. Zhou and Wei Wei, RSA-based digital image encryption algorithm in wireless sensor networks, 2nd International Conference on Signal Processing Systems (ICSPS), 2010.
[60] K. Gupta, S. Silakari, Performance Analysis for Image Encryption Using ECC, Int. Conference on Computational Intelligence and Communication Networks, 2010.
[61] A. Yahya and Ayman M. Abdalla, A Shuffle Image-Encryption Algorithm, Journal of Computer Science 4 (12): pp. 999-1002, 2008.
[62] J. M. Rodrigues, W. Puech and A. G. Bors, SELECTIVE ENCRYPTION OF HUMAN SKIN IN JPEG IMAGES, International IEEE Conference on Image Processing, 2006.