0% found this document useful (0 votes)
2 views

REVIEW 2

Uploaded by

davidtellez12185
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

REVIEW 2

Uploaded by

davidtellez12185
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

REVIEW II

OPTIMIZATION , EFFIIENCY AND SECURITY


OF ENCRYPTION ALGORITHM BASED ON
IMAGE PROCESSING
DONE BY
LOGKALITHIYAA V G
KAYATHRI V
SOWMIYA S
BASE PAPER :Stable Image Encryption Algorithm Based on Expanded One-Dimensional Chaotic Jumping
and Parallel Encoding Operation Grouping

AUTHOR:TIANSHUO ZHANG AND YIQUN MA


YEAR: 6 September 2023
ABSTRACT:The current algorithm of encrypting images uses low-dimensional chaotic systems with a limited
key space and poor security, while high-dimensional chaotic systems are difficult to implement and inefficient.
Additionally, if image encryption algorithms use fixed DNA encoding rules, they could be cracked; dynamic coding
can easily deviate from optimal solutions, thus causing algorithm instability. Based on this, a novel technique for
image encryption is presented in this article. It is possible to avoid linear correlation of the chaotic sequence by
randomly jumping on two uncorrelated one-dimensional chaoses. Meanwhile, numerous encryption results are
generated in parallel by randomly grouping DNA encoding groups and encoding operations, and the optimal
solution is then selected based on the encryption results, thereby minimizing ciphertext image instability to some
extent. According to the experimental results, this algorithm produces high-security, plaintext-sensitive, and non-
cracking encrypted images. Furthermore, this algorithm produces excellent encryption results both on color and
sized images, and is applicable to a wide variety of applications.
LITERATURE PAPER 1:A Self-Adaptive Image Encryption Scheme Based on Chaos and Gravitation
Model

AUTHOR: QIUXIA QIN , ZHONGYUE LIANG , SHUANG LIU , AND CHANGJUN ZHOU

YEAR: 21 April 2023


ABSTRACT: In order to improve the security of image transmission, this paper proposes a self-adaptive
image encryption scheme based on chaos and gravitation model. The proposed scheme consists of three stages:
key generation stage, double scrambling stage, and double diffusion stage. In the key generation stage, the
plaintext-associated key generation mechanism (BPPAKG) based on the bit plane is used to obtain the key
associated with the plaintext. Since the key ultimately depends on the plaintext image itself, this scheme has self-
adaptability. The first stage of scrambling uses mixed chaotic transform and shift row transform to disturb pixel
position, then changes the pixel value of the image based on the concept of gravitation to achieve the first stage
of diffusion. To enhance the security performance of the scheme, the traditional encryption structure is
extended, and the second stage of scrambling and diffusion is quickly realized by using diagonal scanning
transform and XOR operation. Simulation and experimental results show that the scheme has good encryption
and decryption performance and strong resistance to attack. In addition, compared with some latest proposed
algorithms, it has better security.
LITERATURE PAPER 2: Chaotic Image Encryption Using Piecewise-Logistic-Sine Map
AUTHOR: SHANWU SHAO , JI LI1 , PING SHAO , AND GANG XU
YEAR: 15 March 2023
ABSTRACT: The classical one-dimension chaotic maps are not adequately secure, and some improved
maps usually have a high time complexity. To address these problems, this paper presents a new
PiecewiseLogistic-Sine map (PLSM). The bifurcation diagrams, Lyapunov exponent, and running time of the
proposed PLSM are analyzed, and the outcomes show that it has better chaotic behavior with low time
complexity. Furthermore, diffusion by certain rules is vulnerable to attack, so a PLSM-based image encryption
scheme with random exclusive OR diffusion is proposed. Using a 256-bit secret key, the initial value and
parameters of PLSM are calculated by the key distribution method. Then four chaotic sequences are generated by
PLSM, they are used in three rounds of random exclusive OR diffusion. This scheme can spread a small change in
the original image to all pixels, and the performance evaluation shows the security of this image encryption
scheme.
LITERATURE PAPER 3: Color Image Encryption Through Chaos and KAA Map
AUTHOR: WASSIM ALEXAN , (Senior Member, IEEE), MARWA ELKANDOZ , MAGGIE MASHALY , (Senior
Member, IEEE), EMAN AZAB , (Senior Member, IEEE), AND AMR ABOSHOUSHA
YEAR: 3 February 2023
ABSTRACT: The unprecedented growth in production and exchange of multimedia over unsecured
channels is overwhelming mathematicians, scientists and engineers to realize secure and efficient cryptographic
algorithms. In this paper, a color image encryption algorithm combining the KAA map with multiple chaotic maps
is proposed. The proposed algorithm makes full use of Shannon’s ideas of security, such that image encryption is
carried out through bit confusion and diffusion. Confusion is carried out through employing 2 encryption keys.
The first key is generated from the 2D Logistic Sine map and a Linear Congruential Generator, while the second
key is generated from the Tent map and the Bernoulli map. Diffusion is attained through the use of the KAA map.
An elaborate mathematical analysis is carried out to showcase the robustness and efficiency of the proposed
algorithm, as well as its resistance to visual, statistical, differential and brute-force attacks. Moreover, the
proposed image encryption algorithm is also shown to successfully pass all the tests of the NIST SP 800 suite.
LITERATURE PAPER 4: Secure and Efficient Image Compression-Encryption Scheme Using New
Chaotic Structure and Compressive Sensing
AUTHOR: Yongli Tang Mingjie Zhao and Lixiang Li
YEAR:29 December 2020
ABSTRACT:The rapid development of the Internet leads to a surge in the amount of information
transmission and brings many security problems. For multimedia information transmission, especially digital
images, it is necessary to compress and encrypt at the same time. +e emergence of compressive sensing solves this
problem. Compressive sensing can compress and encrypt at the same time, which can not only reduce the
transmission bandwidth of the network but also improve the security of the system. However, when using
compressive sensing encryption, the whole measurement matrix needs to be stored, and the compressive sensing
can be combined with a chaotic system, so only the generation parameters of the matrix need to be stored, and the
security of the system can be further improved by using the sensitivity of the chaotic system. +is paper introduces
a secure and efficient image compression-encryption scheme using a new chaotic structure and compressive
sensing. +e chaotic map used in the scheme is generated by our new and universal chaotic structure, which not
only expands the chaotic range of the chaotic system but also improves the performance of the chaotic system.
After analyzing the performance comparison of traditional one-dimensional chaotic maps and some existing
methods, the image compression-encryption scheme based on a new chaotic structure and compressive sensing
has a good encryption effect and large keyspace, which can resist brute force attack and statistical attack.
LITERATURE PAPER 5:Securing Medical Images Using Chaotic Map Encryption and LSB
Steganography
AUTHOR:Abbas Zamil Hussain , Maisa’a Abid Ali Khodher
YEAR:29 February 2024
ABSTRACT:Secure image transfer is a difficult topic in the age of communication technology because
millions of people utilize and share images online for personal and professional reasons. Encryption algorithms,
such as cipher images, help achieve secure transfer through networks. Despite attackers having decryption keys,
they cannot retrieve the original image. To ensure integrity assurance, prevent changes to medical images that
could lead to a misdiagnosis, transmit patient medical records in a private and secure manner, and prevent falling
victim to cyberattacks, a high-performance, effective method of encrypting medical images must be developed.
Encrypting medical images is common in telemedicine, making secure image transfer essential. The medical
dataset includes personal data about the health of a patient. All essential information, including medical images, is
now kept on picture and communication servers because of the growing interest in inpatient records across the
world. In this study, we presented a unique approach to medical picture encryption that combines the Triple data
encryption algorithm (3DES) and advanced encryption standard (AES) methods with three chaotic maps (Logistic,
Arnold CAT, and Baker). The BAT optimization algorithm is also used to accomplish the task of key generation.
Finally, the Least Significant Bit (LBS) is used to hide encrypted medical images before sending them to the
server by TCP/IP protocol. The experiments yielded promising results in entropy of 5.92, PSNR of 0.99, and MSE
0.0001.
LITERATURE PAPER 6:Chaos-Based Image Encryption: Review, Application, and Challenges
AUTHOR:Bowen Zhang and Lingfeng Liu
YEAR:5 June 2023
ABSTRACT:Chaos has been one of the most effective cryptographic sources since it was first used in image-
encryption algorithms. This paper closely examines the development process of chaos-based image-encryption
algorithms from various angles, including symmetric and asymmetric algorithms, block ciphers and stream
ciphers, and integration with other technologies. The unique attributes of chaos, such as sensitivity to initial
conditions, topological transitivity, and pseudo-randomness, are conducive to cross-referencing with other
disciplines and improving image-encryption methods. Additionally, this paper covers practical application
scenarios and current challenges of chaotic image encryption, thereby encouraging researchers to continue
developing and complementing existing situations, and may also serve as a basis of future development prospects
for chaos-based image encryption.
LITERATURE PAPER 7:Image Encryption Using Chaotic Based Artificial Neural Network
AUTHOR:Minal Chauhan , Rashmin Prajapati
YEAR:6, June-2014
ABSTRACT:Cryptography is the science to transform the information in secure way. Encryption is best
alternative to convert the data to be transferred to cipher data which is an unintelligible image or data which
cannot be understood by any third person. Images are form of the multimedia data. There are many image
encryption schemes already have been proposed, each one of them has its own potency and limitation. This paper
presents a new algorithm for the image encryption/decryption scheme which has been proposed using chaotic
neural network. Chaotic system produces the same results if the given inputs are same, it is unpredictable in the
sense that it cannot be predicted in what way the system's behavior will change for any little change in the input to
the system. The objective is to investigate the use of ANNs in the field of chaotic Cryptography. The weights of
neural network are achieved based on chaotic sequence. The chaotic sequence generated and forwarded to ANN
and weighs of ANN are updated which influence the generation of the key in the encryption algorithm. The
algorithm has been implemented in the software tool MATLAB and results have been studied. To compare the
relative performance peak signal to noise ratio (PSNR) and mean square error (MSE) are used.
LITERATURE PAPER 8:Computer Graphic Study of Advanced Manufacturing Technology with
Chaos Characteristic Analysis
AUTHOR:Yanling Sun , and Ning Chen
YEAR:1 January,2024
ABSTRACT:This paper uses the characteristics of computer graphics to study advanced production
technology and carry out chaotic characteristics. AMT applied to the scope of the whole manufacturing process,
especially the goals and effects achieved. All reflect that this is a practical technology that is applied to
manufacturing and plays a major role in the development of manufacturing and national economy. With the rapid
development of computer technology, the research progress of advanced manufacturing technology is also very
fast. Chaos is being combined with many disciplines, resulting in new edge disciplines. Scholars gradually use the
graphical characteristics of computers to analyze the chaotic characteristics. This paper further researches and uses
the computer's imaging features to analyze the chaotic characteristics of advanced manufacturing technology.
LITERATURE PAPER 9:Securing Images Using High Dimensional Chaotic Maps and DNA Encoding
Techniques
AUTHOR:MOHAMMED ES-SABRY , NABIL EL AKKAD, MOSTAFA MERRAS , KHALID SATORI ,
WALID EL-SHAFAI , (Senior Member, IEEE), TORKI ALTAMEEM5 , AND MOSTAFA M. FOUDA , (Senior
Member, IEEE)
YEAR:14 September 2023
ABSTRACT:With the growing need for secure multimedia data transmission, image encryption has become
an important research area. Traditional encryption algorithms like RSA are not well-suited for this purpose,
leading researchers to explore new approaches such as chaotic maps. The present study introduces a new image
encryption algorithm that utilizes an improved Rossler system as a keystream generator. The improved Rossler
system is an enhanced version of the original Rossler system, which has been optimized for better chaotic
behavior and improved security. For the confusion part, we combine DNA encoding techniques with Baker maps
to ensure high levels of security. Various performance metrics, including NPCR, UACI, correlation coefficient,
histogram analysis, and key sensitivity analysis, were used to evaluate the proposed scheme. The results showed
that the proposed method surpassed several existing image encryption methods in terms of both security and
efficiency.

You might also like