Survey of Various Image Encryption Methods and Evaluation Matrices

International Journal of Computer Science and Engineering
© 2015 by SSRG - IJCSE Journal
Volume 2 Issue 7
Year of Publication : 2015
Authors : Divya Aarushi, Sunil Ahuja

How to Cite?

Divya Aarushi, Sunil Ahuja, "Survey of Various Image Encryption Methods and Evaluation Matrices," SSRG International Journal of Computer Science and Engineering , vol. 2,  no. 7, pp. 40-45, 2015. Crossref,


In present years, there has been momentous progress in multimedia technologies. Transmission of multimedia data such as audio, video and pictures above the Internet is nowadays extremely common. Though internet is extremely insecure channel and this poses a number of protection issues. To accomplish confidentiality and protection of multimedia data above an insecure channel like the Internet, a number of encryption schemes have been proposed. The existence of multimedia technology in this era has promoted digital images to play a more important role than the traditional texts, which demand serious protection of users' privacy for all applications. However, with the help of various types of networks digital images are exchanged. Sometimes, it is true that a large part of this data is either confidential or private. So, preferred technique for protecting the transmitted data is encryption. There are many systems to encrypt and decrypt image data for security. This paper surveys some of Image Encryption methods and evaluation Metrics.


Image Encryption, RSA Encryption, Chaotic Map.


[1]. Bagheri, M.; Taheri, M.; Mohammadi, K.; Mosavi, M.R.,"Evolution of mapping functions for image encryption using Evolvable Hardware",IEEE,Telecommunications (IST), 2010 5th International Symposium on,2010 
[2]. Metzler, R.E.L.; Agaian, S.S.,"Selective region encryption using a fast shape adaptive transform",IEEE,Systems Man and Cybernetics (SMC), 2010 IEEE International Conference on,2010 
[3]. Seyedzadeh, S.M.; Moosavi, S.M.S.; Mirzakuchaki, S.,"Using self-adaptive coupled piecewise nonlinear chaotic map for color image encryption scheme",IEEE,Electrical Engineering (ICEE), 2011 19th Iranian Conference on,2011 
[4]. Dan-hua Liu; Guang-ming Shi; Da-hua Gao; Min Gao,"A robust image encryption scheme over wireless channels",IEEE,Wireless Communications & Signal Processing, 2009. WCSP 2009. International Conference on,2009 
[5]. Nini, B.,"Projection based permutation of color images",IEEE,Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), 2012 6th International Conference on,2012 
[6]. Sajasi, S.; Eftekhari-Moghadam, A.-M.,"A high quality image hiding scheme based upon noise visibility function and an optimal chaotic based encryption method",IEEE,AI & Robotics and 5th RoboCup Iran Open International Symposium (RIOS), 2013 3rd Joint Conference of,2013 
[7]. Shang-Lin Hsieh; Hsuan-Chieh Huang; I-Ju Tsai,"A Copyright Protection Scheme for Gray-Level Images Using Human Fingerprint",IEEE,Information Technology: New Generations, 2006. ITNG 2006. Third International Conference on,2006 
[8]. Junling Ren,"Information hiding algorithm for palette images based on HVS",IEEE,Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on,2010 
[9]. Lukac, R.; Plataniotis, K.N.,"Digital image indexing using secret sharing schemes: a unified framework for single-sensor consumer electronics",IEEE,Consumer Electronics, IEEE Transactions on,2005. 
[10]. Saini, J.K.; Verma, H.K.,"A hybrid approach for image security by combining encryption and steganography",IEEE,Image Information Processing (ICIIP), 2013 IEEE Second International Conference on,2013. 
[11]. ZuYing Wang; Ping Luo; Xiaobo Li,"Experiments on Partial Encryption Performance for Image Sets",IEEE,Signal Processing and Information Technology, 2006 IEEE International Symposium on,2006