Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30302
Analysis and Comparison of Image Encryption Algorithms

Authors: İsmet Öztürk, İbrahim Soğukpınar

Abstract:

With the fast progression of data exchange in electronic way, information security is becoming more important in data storage and transmission. Because of widely using images in industrial process, it is important to protect the confidential image data from unauthorized access. In this paper, we analyzed current image encryption algorithms and compression is added for two of them (Mirror-like image encryption and Visual Cryptography). Implementations of these two algorithms have been realized for experimental purposes. The results of analysis are given in this paper.

Keywords: Security, Transmission, Image Encryption, image cryptosystem

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1334958

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4477

References:


[1] Aloha Sinha, Kehar Singh, “A technique for image encryption using digital signature", Optics Communications, ARTICLE IN PRESS, 2003, 1-6, www.elsevier.com/locate/optcom
[2] S.S.Maniccam, N.G. Bourbakis, “Lossless image compression and encryption using SCAN", Pattern Recognition 34 (2001), 1229-1245
[3] Chin-Chen Chang, Min-Shian Hwang, Tung-Shou Chen, “A new encription algorithm for image cryptosystems", The Journal of Systems and Software 58 (2001), 83-91
[4] Jiun-In Guo, Jui-Cheng Yen, “A new mirror-like image encryption algorithm and its VLSI architecture", Department of Electronics Engineering National Lien-Ho College of Technology and Commerce, Miaoli, Taiwan, Republic of China
[5] Jui-Cheng Yen, Jiun-In Guo, “A new chaotic image encryption algorithm“,Department of Electronics Engineering National Lien-Ho College of Technology and Commerce, Miaoli, Taiwan, Republic of China, E-mail: [email protected]
[6] Shuqun Zhang and Mohammed A. Karim, “Color image encryption using double random phase encoding", MICROWAVE AND OPTICAL TECHNOLOGY LETTERS / Vol. 21, No. 5, June 5 1999, 318-322
[7] Young-Chang Hou, “Visual cryptography for color images", Pattern Recognition 36 (2003), www.elsevier.com/locate/patcog, 1619-1629
[8] Amhmed Saffor, Kwan Hoong Ng, Abdul Rahman bin Ramli, David Dowsett, “A Comparison of JPEG and Wavelet Compression Applied to Computed Tomography Brain, Chest, and Abdomen Images", The Internet Journal of Medical Simulation and Technology, ISSN:1540- 2657, www.ispub.com