Full Paper View Go Back
A Survey on Efficiency of an Image Encryption Techniques
S. Heyshanthinipandiya Kumari1
Section:Survey Paper, Product Type: Journal-Paper
Vol.5 ,
Issue.8 , pp.198-200, Aug-2019
Online published on Aug 31, 2019
Copyright © S. Heyshanthinipandiya Kumari . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: S. Heyshanthinipandiya Kumari, “A Survey on Efficiency of an Image Encryption Techniques,” International Journal of Scientific Research in Multidisciplinary Studies , Vol.5, Issue.8, pp.198-200, 2019.
MLA Style Citation: S. Heyshanthinipandiya Kumari "A Survey on Efficiency of an Image Encryption Techniques." International Journal of Scientific Research in Multidisciplinary Studies 5.8 (2019): 198-200.
APA Style Citation: S. Heyshanthinipandiya Kumari, (2019). A Survey on Efficiency of an Image Encryption Techniques. International Journal of Scientific Research in Multidisciplinary Studies , 5(8), 198-200.
BibTex Style Citation:
@article{Kumari_2019,
author = {S. Heyshanthinipandiya Kumari},
title = {A Survey on Efficiency of an Image Encryption Techniques},
journal = {International Journal of Scientific Research in Multidisciplinary Studies },
issue_date = {8 2019},
volume = {5},
Issue = {8},
month = {8},
year = {2019},
issn = {2347-2693},
pages = {198-200},
url = {https://www.isroset.org/journal/IJSRMS/full_paper_view.php?paper_id=1474},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRMS/full_paper_view.php?paper_id=1474
TI - A Survey on Efficiency of an Image Encryption Techniques
T2 - International Journal of Scientific Research in Multidisciplinary Studies
AU - S. Heyshanthinipandiya Kumari
PY - 2019
DA - 2019/08/31
PB - IJCSE, Indore, INDIA
SP - 198-200
IS - 8
VL - 5
SN - 2347-2693
ER -
Abstract :
Data confidentiality through encryption is playing a significant role to reduce cybercrime. There were several encryption techniques proposed for secure data/image transfer. AES is the most commonly used encryption algorithm for textual data among the existing algorithms. It can be used to encrypt image to provide a highly secured image. The AES encryption scheme opted for computationally expensive images. These images would consume more power, not suitable for low-end devices such as mobile phones. A comparison between RUBIK’s CUBE based image encryption technique and AES encryption technique has made in this paper. A comparison between both the algorithms is analyzed, the efficiency of the algorithms recorded. As a result of the comparison, the AES algorithm consumes very low space, requires more time. In contrast, Rubik’s Cube algorithm ensuring less time complexity but require more space. Hence, both are key requirements of any hand-held devices to perform encryption with low computational complexities. Through integrating the features of both the algorithms, computationally efficient novel image encryption technique can be developed which for any hand-held devices.
Key-Words / Index Term :
Encryption, Rubik’s cube, Zeta function, AES, complexity
References :
[1] Zaheer Abbas Balouch, Muhammad Imran Aslam and Irfan Ahmed, “Energy Efficient Image Encryption Algorithm”, IEEE, DOI: 10.1109/ICIEECT.2017.7916541
[2] M.Parameswari, S.Sakthivel, S.Heyshanthinipandiyakumari and S.Poornima, “Improving the Lucidity of Image Restoration using Sparse Representation”, Indian Journal of Science, 35 (156): 7-12, 2015
[3] X. Chai, Y. Chen, and L. Broyde, “A novel chaos-based image encryption algorithm using dna sequence operations,” Optics and Lasers in Engineering, vol. 88, pp. 197–213, 2017.
[4] X. Chai, “An image encryption algorithm based on bit level Brownian motion and new chaotic systems,” Multimedia Tools and Applications, vol. 76, no. 1, pp. 1159–1175, 2017.
[5] W. Wang, H. Tan, Y. Pang, Z. Li, P. Ran, and J. Wu, “A novel encryption algorithm based on dwt and multichaos mapping,” Journal of Sensors, vol. 2016, 2016.
[6] G. Ye, H. Zhao, and H. Chai, “Chaotic image encryption algorithm using wave-line permutation and block diffusion,” Nonlinear Dynamics, vol. 83, no. 4, pp. 2067–2077, 2016.
[7] A. Jain and N. Rajpal, “A robust image encryption algorithm resistant to attacks using dna and chaotic logistic maps,” Multimedia Tools and Applications, vol. 75, no. 10, pp. 5455–5472, 2016.
[8] Y. Liu, J. Wang, J. Fan, and L. Gong, “Image encryption algorithm based on chaotic system and dynamic s-boxes composed of dna sequences,” Multimedia Tools and Applications, vol. 75, no. 8, pp. 4363–4382, 2016.
[9] W. Liu, K. Sun, and C. Zhu, “A fast image encryption algorithm based on chaotic map,” Optics and Lasers in Engineering, vol. 84, pp. 26–36, 2016.
[10] Shanon, C. E. Bell. Syst. Tech. J. 1949, 28, 656–715.
[11] Priya Deshmukh, “An image encryption and decryption using AES algorithm”, International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February-2016.
[12] William Stallings, “Advance Encryption Standard,” in Cryptography and Network Security, 4th Ed., India:PEARSON,pp. 134–165.
[13] Yong Zhang, “Test and Verification of AES Used for Image Encryption”, Springer, Jan 2018
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.