We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11
REVIEW II
OPTIMIZATION , EFFIIENCY AND SECURITY
OF ENCRYPTION ALGORITHM BASED ON IMAGE PROCESSING DONE BY LOGKALITHIYAA V G KAYATHRI V SOWMIYA S BASE PAPER :Stable Image Encryption Algorithm Based on Expanded One-Dimensional Chaotic Jumping and Parallel Encoding Operation Grouping
AUTHOR:TIANSHUO ZHANG AND YIQUN MA
YEAR: 6 September 2023 ABSTRACT:The current algorithm of encrypting images uses low-dimensional chaotic systems with a limited key space and poor security, while high-dimensional chaotic systems are difficult to implement and inefficient. Additionally, if image encryption algorithms use fixed DNA encoding rules, they could be cracked; dynamic coding can easily deviate from optimal solutions, thus causing algorithm instability. Based on this, a novel technique for image encryption is presented in this article. It is possible to avoid linear correlation of the chaotic sequence by randomly jumping on two uncorrelated one-dimensional chaoses. Meanwhile, numerous encryption results are generated in parallel by randomly grouping DNA encoding groups and encoding operations, and the optimal solution is then selected based on the encryption results, thereby minimizing ciphertext image instability to some extent. According to the experimental results, this algorithm produces high-security, plaintext-sensitive, and non- cracking encrypted images. Furthermore, this algorithm produces excellent encryption results both on color and sized images, and is applicable to a wide variety of applications. LITERATURE PAPER 1:A Self-Adaptive Image Encryption Scheme Based on Chaos and Gravitation Model
AUTHOR: QIUXIA QIN , ZHONGYUE LIANG , SHUANG LIU , AND CHANGJUN ZHOU
YEAR: 21 April 2023
ABSTRACT: In order to improve the security of image transmission, this paper proposes a self-adaptive image encryption scheme based on chaos and gravitation model. The proposed scheme consists of three stages: key generation stage, double scrambling stage, and double diffusion stage. In the key generation stage, the plaintext-associated key generation mechanism (BPPAKG) based on the bit plane is used to obtain the key associated with the plaintext. Since the key ultimately depends on the plaintext image itself, this scheme has self- adaptability. The first stage of scrambling uses mixed chaotic transform and shift row transform to disturb pixel position, then changes the pixel value of the image based on the concept of gravitation to achieve the first stage of diffusion. To enhance the security performance of the scheme, the traditional encryption structure is extended, and the second stage of scrambling and diffusion is quickly realized by using diagonal scanning transform and XOR operation. Simulation and experimental results show that the scheme has good encryption and decryption performance and strong resistance to attack. In addition, compared with some latest proposed algorithms, it has better security. LITERATURE PAPER 2: Chaotic Image Encryption Using Piecewise-Logistic-Sine Map AUTHOR: SHANWU SHAO , JI LI1 , PING SHAO , AND GANG XU YEAR: 15 March 2023 ABSTRACT: The classical one-dimension chaotic maps are not adequately secure, and some improved maps usually have a high time complexity. To address these problems, this paper presents a new PiecewiseLogistic-Sine map (PLSM). The bifurcation diagrams, Lyapunov exponent, and running time of the proposed PLSM are analyzed, and the outcomes show that it has better chaotic behavior with low time complexity. Furthermore, diffusion by certain rules is vulnerable to attack, so a PLSM-based image encryption scheme with random exclusive OR diffusion is proposed. Using a 256-bit secret key, the initial value and parameters of PLSM are calculated by the key distribution method. Then four chaotic sequences are generated by PLSM, they are used in three rounds of random exclusive OR diffusion. This scheme can spread a small change in the original image to all pixels, and the performance evaluation shows the security of this image encryption scheme. LITERATURE PAPER 3: Color Image Encryption Through Chaos and KAA Map AUTHOR: WASSIM ALEXAN , (Senior Member, IEEE), MARWA ELKANDOZ , MAGGIE MASHALY , (Senior Member, IEEE), EMAN AZAB , (Senior Member, IEEE), AND AMR ABOSHOUSHA YEAR: 3 February 2023 ABSTRACT: The unprecedented growth in production and exchange of multimedia over unsecured channels is overwhelming mathematicians, scientists and engineers to realize secure and efficient cryptographic algorithms. In this paper, a color image encryption algorithm combining the KAA map with multiple chaotic maps is proposed. The proposed algorithm makes full use of Shannon’s ideas of security, such that image encryption is carried out through bit confusion and diffusion. Confusion is carried out through employing 2 encryption keys. The first key is generated from the 2D Logistic Sine map and a Linear Congruential Generator, while the second key is generated from the Tent map and the Bernoulli map. Diffusion is attained through the use of the KAA map. An elaborate mathematical analysis is carried out to showcase the robustness and efficiency of the proposed algorithm, as well as its resistance to visual, statistical, differential and brute-force attacks. Moreover, the proposed image encryption algorithm is also shown to successfully pass all the tests of the NIST SP 800 suite. LITERATURE PAPER 4: Secure and Efficient Image Compression-Encryption Scheme Using New Chaotic Structure and Compressive Sensing AUTHOR: Yongli Tang Mingjie Zhao and Lixiang Li YEAR:29 December 2020 ABSTRACT:The rapid development of the Internet leads to a surge in the amount of information transmission and brings many security problems. For multimedia information transmission, especially digital images, it is necessary to compress and encrypt at the same time. +e emergence of compressive sensing solves this problem. Compressive sensing can compress and encrypt at the same time, which can not only reduce the transmission bandwidth of the network but also improve the security of the system. However, when using compressive sensing encryption, the whole measurement matrix needs to be stored, and the compressive sensing can be combined with a chaotic system, so only the generation parameters of the matrix need to be stored, and the security of the system can be further improved by using the sensitivity of the chaotic system. +is paper introduces a secure and efficient image compression-encryption scheme using a new chaotic structure and compressive sensing. +e chaotic map used in the scheme is generated by our new and universal chaotic structure, which not only expands the chaotic range of the chaotic system but also improves the performance of the chaotic system. After analyzing the performance comparison of traditional one-dimensional chaotic maps and some existing methods, the image compression-encryption scheme based on a new chaotic structure and compressive sensing has a good encryption effect and large keyspace, which can resist brute force attack and statistical attack. LITERATURE PAPER 5:Securing Medical Images Using Chaotic Map Encryption and LSB Steganography AUTHOR:Abbas Zamil Hussain , Maisa’a Abid Ali Khodher YEAR:29 February 2024 ABSTRACT:Secure image transfer is a difficult topic in the age of communication technology because millions of people utilize and share images online for personal and professional reasons. Encryption algorithms, such as cipher images, help achieve secure transfer through networks. Despite attackers having decryption keys, they cannot retrieve the original image. To ensure integrity assurance, prevent changes to medical images that could lead to a misdiagnosis, transmit patient medical records in a private and secure manner, and prevent falling victim to cyberattacks, a high-performance, effective method of encrypting medical images must be developed. Encrypting medical images is common in telemedicine, making secure image transfer essential. The medical dataset includes personal data about the health of a patient. All essential information, including medical images, is now kept on picture and communication servers because of the growing interest in inpatient records across the world. In this study, we presented a unique approach to medical picture encryption that combines the Triple data encryption algorithm (3DES) and advanced encryption standard (AES) methods with three chaotic maps (Logistic, Arnold CAT, and Baker). The BAT optimization algorithm is also used to accomplish the task of key generation. Finally, the Least Significant Bit (LBS) is used to hide encrypted medical images before sending them to the server by TCP/IP protocol. The experiments yielded promising results in entropy of 5.92, PSNR of 0.99, and MSE 0.0001. LITERATURE PAPER 6:Chaos-Based Image Encryption: Review, Application, and Challenges AUTHOR:Bowen Zhang and Lingfeng Liu YEAR:5 June 2023 ABSTRACT:Chaos has been one of the most effective cryptographic sources since it was first used in image- encryption algorithms. This paper closely examines the development process of chaos-based image-encryption algorithms from various angles, including symmetric and asymmetric algorithms, block ciphers and stream ciphers, and integration with other technologies. The unique attributes of chaos, such as sensitivity to initial conditions, topological transitivity, and pseudo-randomness, are conducive to cross-referencing with other disciplines and improving image-encryption methods. Additionally, this paper covers practical application scenarios and current challenges of chaotic image encryption, thereby encouraging researchers to continue developing and complementing existing situations, and may also serve as a basis of future development prospects for chaos-based image encryption. LITERATURE PAPER 7:Image Encryption Using Chaotic Based Artificial Neural Network AUTHOR:Minal Chauhan , Rashmin Prajapati YEAR:6, June-2014 ABSTRACT:Cryptography is the science to transform the information in secure way. Encryption is best alternative to convert the data to be transferred to cipher data which is an unintelligible image or data which cannot be understood by any third person. Images are form of the multimedia data. There are many image encryption schemes already have been proposed, each one of them has its own potency and limitation. This paper presents a new algorithm for the image encryption/decryption scheme which has been proposed using chaotic neural network. Chaotic system produces the same results if the given inputs are same, it is unpredictable in the sense that it cannot be predicted in what way the system's behavior will change for any little change in the input to the system. The objective is to investigate the use of ANNs in the field of chaotic Cryptography. The weights of neural network are achieved based on chaotic sequence. The chaotic sequence generated and forwarded to ANN and weighs of ANN are updated which influence the generation of the key in the encryption algorithm. The algorithm has been implemented in the software tool MATLAB and results have been studied. To compare the relative performance peak signal to noise ratio (PSNR) and mean square error (MSE) are used. LITERATURE PAPER 8:Computer Graphic Study of Advanced Manufacturing Technology with Chaos Characteristic Analysis AUTHOR:Yanling Sun , and Ning Chen YEAR:1 January,2024 ABSTRACT:This paper uses the characteristics of computer graphics to study advanced production technology and carry out chaotic characteristics. AMT applied to the scope of the whole manufacturing process, especially the goals and effects achieved. All reflect that this is a practical technology that is applied to manufacturing and plays a major role in the development of manufacturing and national economy. With the rapid development of computer technology, the research progress of advanced manufacturing technology is also very fast. Chaos is being combined with many disciplines, resulting in new edge disciplines. Scholars gradually use the graphical characteristics of computers to analyze the chaotic characteristics. This paper further researches and uses the computer's imaging features to analyze the chaotic characteristics of advanced manufacturing technology. LITERATURE PAPER 9:Securing Images Using High Dimensional Chaotic Maps and DNA Encoding Techniques AUTHOR:MOHAMMED ES-SABRY , NABIL EL AKKAD, MOSTAFA MERRAS , KHALID SATORI , WALID EL-SHAFAI , (Senior Member, IEEE), TORKI ALTAMEEM5 , AND MOSTAFA M. FOUDA , (Senior Member, IEEE) YEAR:14 September 2023 ABSTRACT:With the growing need for secure multimedia data transmission, image encryption has become an important research area. Traditional encryption algorithms like RSA are not well-suited for this purpose, leading researchers to explore new approaches such as chaotic maps. The present study introduces a new image encryption algorithm that utilizes an improved Rossler system as a keystream generator. The improved Rossler system is an enhanced version of the original Rossler system, which has been optimized for better chaotic behavior and improved security. For the confusion part, we combine DNA encoding techniques with Baker maps to ensure high levels of security. Various performance metrics, including NPCR, UACI, correlation coefficient, histogram analysis, and key sensitivity analysis, were used to evaluate the proposed scheme. The results showed that the proposed method surpassed several existing image encryption methods in terms of both security and efficiency.