Volume 66 | Issue 6 | Year 2020 | Article Id. IJMTT-V66I6P518 | DOI : https://doi.org/10.14445/22315373/IJMTT-V66I6P518
This paper gives us the idea that how the images are stored, accessed, and processed, and how the image encryption is implemented. Images are merely matrices of pixels and image encryption is just a technical „game‟ or mathematical „puzzle‟ that involves the matrix of pixels. A plain-image and its cipher-image of an image encryption system are two different matrices, but they have a hidden relationship. That mathematical relationship is the essence of that encryption algorithm. Not only the images, their encryption and decryption, and their security and performance analyses are also complex mathematical operations on the image matrices.
[1] Priyanka and Deepika Arora, “Survey and Analysis of Current Methods of Image Encryption Algorithm Based on DNA Sequencing”, IJCST, vol. 9, pp. 34-41, 2018.
[2] Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, and Muhammad Talha, ―Robust Encryption of Quantum Medical Images‖, IEEE Access, vol. 6, pp. 1073 – 1081, Feb. 2018.
[3] Ramya Princess Mary, P Eswaran, and K Shankar, ―Multi Secret Image Sharing Scheme Based on DNA Cryptography with XOR‖, Pure and Applied Mathematics, vol. 118, No. 7, pp. 393-398, Feb. 2018.
[4] Tian Tian Zhang, Shan Jun Yan, Cheng Yan Gu, Ran Ren, and Kai Xin Liao, ―Research on Image Encryption Based on DNA Sequence and Chaos Theory‖, Physics: Conf. Series, vol. 1004, pp. 1–6, 2018.
[5] Xing-Quan Fu, Bo-Cheng Liu, Yi-Yuan Xie, Wei Li, and Yong Liu, ―Image Encryption-Then-Transmission Using DNA Encryption Algorithm and The Double Chaos‖, IEEE Photonics, vol. 10, no. 3, June 2018.
[6] Osama S. Faragallah, Mohammed A. Alzain, Hala S. El-Sayed, Jehad F. Al-Amri, Walid El-Shafai, Ashraf Afifi, Ensherah A. Naeem, and Ben Soh, ―Block-Based Optical Color Image Encryption Based on Double Random Phase Encoding‖, IEEE Access, vol. 7, pp. 4184 - 4194, Jan. 2019.
[7] Xingbin Liu, Di Xiao, and Yanping Xiang, ―Quantum Image Encryption Using Intra and Inter Bit Permutation Based on Logistic Map‖, IEEE Access, vol. 7, pp. 6937 - 6946, Jan. 2019.
[8] Zhenjun Tang, Ye Yang, Shijie Xu, Chunqiang Yu, and Xianquan Zhang, “Image Encryption with Double Spiral Scans and Chaotic Maps”, Hindawi Sec. and Comm. Networks, vol. 2019, pp. 1-15, Jan. 2019.
[9] Xinsheng Li, Zhilong Xie, Jiang Wu, and Taiyong Li, ―Image Encryption Based on Dynamic Filtering and Bit Cuboid Operations‖, Hindawi Complexity, vol. 2019, pp. 1-16, Feb. 2019.
[10] Taiyong Li, Jiayi Shi, Xinsheng Li, Jiang Wu, and Fan Pan, ―Image Encryption Based on Pixel-Level Diffusion with Dynamic Filtering and DNA-Level Permutation with 3D Latin Cubes‖, Entropy, vol. 21, no. 319, pp. 1-21, 2019.
[11] Yuling Luo, Xue Ouyang, Junxiu Liu, and Lvchen Cao, ―An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems‖, IEEE Access, vol. 7, pp. 38507–38522, Mar. 2019.
[12] Fazal Noorbasha, S. Mohit Srinath, SK. Khadir Bhasha, P. Jagadish, and K Hari Kishore, “FPGA Based DNA Cryptography System for Medical Image Data Analysis Process”, Innovative Technology and Exploring Engineering, vol. 8, No. 6S, pp. 128-131, Apr. 2019.
[13] Akram Belazi, Muhammad Talha, Sofiane Kharbech, and Wei Xiang, “Novel Medical Image Encryption Scheme Based on Chaos and DNA Encoding”, IEEE Access, vol. 7, pp. 36667–36681, Mar. 2019.
[14] Hui Liu, Bo Zhao, and Linquan Huang, “A Remote-Sensing Image Encryption Scheme Using DNA Bases Probability and Two-Dimensional Logistic Map”, IEEE Access, vol. 7, pp. 65450–65459, May 2019.
[15] Shikha Jaryal and Chetan Marwaha, “Comparative Analysis of Various İmage Encryption Techniques”, Computational Intelligence Research, vol. 13, No. 2, pp. 273-284, 2017.
[16] Bin Wang, Yingjie Xie, Shihua Zhou, Xuedong Zheng, and Changjun Zhou, "Correcting Errors in Image Encryption Based on DNA Coding", Molecules, vol. 23, pp. 1-13, 2018.
[17] Chunhu Li, Guangchun Luo, and Chunbao Li, “An Image Encryption Scheme Based on The Three-dimensional Chaotic Logistic Map”, Network Security, vol.21, No.1, PP.22-29, 2019.
[18] Omar Farook Mohammad, Mohd Shafry Mohd Rahim, Subhi Rafeeq Mohammed Zeebaree and Falah Y.H. Ahmed, “A Survey and Analysis of the Image Encryption Methods”, Applied Engineering Research, vol. 12, no. 23, pp.13265-13280, 2017.
[19] Zhijuan Deng and Shaojun Zhong, “A digital image encryption algorithm based on chaotic mapping”, Algorithms Computational Technology, vol. 13, pp. 1 – 11, 2019.
[20] Xingyuan Wang, Suo Gao, Longjiao Yu, Yuming Sun, and Huaihuai Sun, “Chaotic Image Encryption Algorithm Based on Bit-Combination Scrambling in Decimal System and Dynamic Diffusion”, IEEE Access, vol. 7, pp. 103662-103677, 2019.
[21] Ratheesh Kumar R and Jabin Mathew, “Image Encryption: Traditional Methods vs Alternative Methods”, IEEE, Proceedings of the Fourth International Conference on Computing Methodologies and Communication (ICCMC 2020), pp. 619-625, March 2020.
[22] Shuqin Zhu, Congxu Zhu, and Wenhong Wang, “A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256”, Entropy, Sep 2018, 20, 716, pp. 1-18.
[23] Anupam Kumar, Aman Kumar, Sahil Jain, P Kiranmai, “Performance Comparison of Cryptanalysis Techniques over DES”, IJRASET, May 2016, vol. 4, pp. 1-13.
[24] Xiaoqiang Di, Jinqing Li, Hui Qi, Ligang Cong, and Huamin Yang: “A semi-symmetric image encryption scheme based on the function projective synchronization of two hyperchaotic systems”, PLOS ONE, Sep 14, 2017, pp 1-29.
[25] K W Wong, W S Yap, B M Goi, and Denis C K Wong: “Differential Cryptanalysis on Chaotic Based Image Encryption Scheme”, IOP Conf. Series, 2019, vol. 495 (2019) 012041, pp.1-11.
[26] A. ChandraSekhar, D. Chaya Kumari, S. Ashok Kumar, "Symmetric Key Cryptosystem for Multiple Encryptions", International Journal of Mathematics Trends and Technology (IJMTT). V29(2):140-144 January 2016. ISSN:2231-5373.
[27] Meena Bairola, Dr.A.S.Uniyal, "Application of Advanced Cryptographic System", International Journal of Mathematics Trends and Technology (IJMTT). V55(4):311-316, March 2018. ISSN:2231-5373.
Ratheesh Kumar R, Jabin Mathew, "A Mathematical Interpretation of Images and Image Encryption," International Journal of Mathematics Trends and Technology (IJMTT), vol. 66, no. 6, pp. 190-194, 2020. Crossref, https://doi.org/10.14445/22315373/IJMTT-V66I6P518