CFP last date
01 July 2024
Call for Paper
August Edition
CAE solicits high quality original research papers for the upcoming August edition of the journal. The last date of research paper submission is 01 July 2024

Submit your paper
Know more
Reseach Article

An Extensive Survey on Image Security Research Trends

by Naveen M., G. N. K. Suresh Babu
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 7 - Number 13
Year of Publication: 2018
Authors: Naveen M., G. N. K. Suresh Babu

Naveen M., G. N. K. Suresh Babu . An Extensive Survey on Image Security Research Trends. Communications on Applied Electronics. 7, 13 ( Feb 2018), 21-26. DOI=10.5120/cae2018652751

@article{ 10.5120/cae2018652751,
author = { Naveen M., G. N. K. Suresh Babu },
title = { An Extensive Survey on Image Security Research Trends },
journal = { Communications on Applied Electronics },
issue_date = { Feb 2018 },
volume = { 7 },
number = { 13 },
month = { Feb },
year = { 2018 },
issn = { 2394-4714 },
pages = { 21-26 },
numpages = {9},
url = { },
doi = { 10.5120/cae2018652751 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2023-09-04T20:03:32.298213+05:30
%A Naveen M.
%A G. N. K. Suresh Babu
%T An Extensive Survey on Image Security Research Trends
%J Communications on Applied Electronics
%@ 2394-4714
%V 7
%N 13
%P 21-26
%D 2018
%I Foundation of Computer Science (FCS), NY, USA

The digital revolution of the world along with the fast communication system and the technical advancement of the digital images provide the easiest way to communicate data in the form of Images. There are many open threats and risk involves if these image data is compromised. This paper provides a theoretical study of existing methods for the image security. The archival works from IEEE, Elsevier, Springer and some other relevant articles are considered to do literature study of the problem formulation, algorithms and performance metrics. Various aspects of data integrity, privacy, and attacks are also discussed in this paper. The organized outcome is contributory to the researchers, industry, and academician who keep interest in image security domain.

  1. E.M. Perse, and J. A. Courtright, “Normative images of communication media mass and interpersonal channels in the new media environment," Human communication research, vol. 19(4), pp.485-503, 1993
  2. I. Ozturk and I. Sogukpinar, “Analysis and comparison of image encryption algorithm," Journal of transactions on engineering, computing and technology, pp.38, 2004
  3. S. Charbathia and S. Sharma, “A Comparative Study of Rivest Cipher Algorithms," International Journal of Information & Computation Technology. ISSN 0974-2239, vol. 4, pp. 1831-1838, Retrieved on 22nd Jan 2018
  4. A.P. Parameshwaran, W-Z.Song, "Encryption Algorithms for Color Images: A Brief Review of Recent Trends," International Journal of Advanced Computer Science and Applications, vol. 7, no. 10, 2016
  5. K. Xu, Y. Guo, L. Guo, Y. Fang and X. Li, "Control of photo sharing over Online Social Networks," 2014 IEEE Global Communications Conference, Austin, TX, 2014, pp. 704-709.
  6. K. Liang, J. K. Liu, R. Lu, and D. S. Wong, "Privacy Concerns for Photo Sharing in Online Social Networks," in IEEE Internet Computing, vol. 19, no. 2, pp. 58-63, Mar.-Apr. 2015.
  7. K. Xu, Y. Guo, L. Guo, Y. Fang and X. Li, "My Privacy My Decision: Control of Photo Sharing on Online Social Networks," in IEEE Transactions on Dependable and Secure Computing, vol. 14, no. 2, pp. 199-210, March-April 1 2017.
  8. J. Yu, D. Joshi and J. Luo, "Connecting people in photo-sharing sites by photo content and user annotations," IEEE International Conference on Multimedia and Expo, New York, NY, pp. 1464-1467, 2009
  9. R. S. Kunwar and P. Sharma, "Social media: A new vector for cyber attack," International Conference on Advances in Computing, Communication, & Automation (ACCA) (Spring), Dehradun, 2016, pp. 1-5.
  10. D.W. Hill and J.T. Lynn, “Adaptive system and method for responding to computer network security attacks," U.S. Patent No. 6,088,804. 11 Jul. 2000.
  11. C. Kaufman, R. Perlman, and M. Speciner, “Network security: private communication in a public world," Prentice Hall Press, 2002.
  12. D.G. Amalarethinam and J. S. Geetha, “Image encryption and decryption in public key cryptography based on MR," In Computing and Communications Technologies (ICCCT), 2015 International Conference on, pp. 133-138. IEEE, 2015.
  13. N. Khanna, J. Nath, J. James, S. Chakraborty, A. Chakrabarti and A. Nath, "New Symmetric Key Cryptographic Algorithm Using Combined Bit Manipulation and MSA Encryption Algorithm: NJJSAA Symmetric Key Algorithm," 2011 International Conference on Communication Systems and Network Technologies, Katra, Jammu, 2011, pp. 125-130.
  14. K. H. Chang, Y. C. Chen, C. C. Hsieh, C. W. Huang and C. J. Chang, "Embedded a low area 32-bit AES for image encryption/decryption application," 2009 IEEE International Symposium on Circuits and Systems, Taipei, 2009, pp. 1922-1925.
  15. D. Anggraini and F. Kazhimi, “Encryption on Grayscale Image For Digital Image Confidentiality Using Shamir Secret Sharing Scheme," In Journal of Physics: Conference Series, vol. 710, no. 1, p. 012034. IOP Publishing, 2016.
  16. S. Anandakumar, “Image Cryptography Using RSA Algorithm in Network Security," International Journal of Computer Science & Engineering Technology 5, no. 9, 2015
  17. R. Tao, X. Y. Meng and Y. Wang, "Image Encryption With the Multi order of Fractional Fourier Transforms," in IEEE Transactions on Information Forensics and Security, vol. 5, no. 4, pp. 734-738, Dec. 2010
  18. X. Zhang, "Lossy Compression and Iterative Reconstruction for Encrypted Image," in IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 53-58, March 2011
  19. X. Zhang, "Reversible Data Hiding in Encrypted Image," in IEEE Signal Processing Letters, vol. 18, no. 4, pp. 255-258, April 2011
  20. W. Hong, T. S. Chen and H. Y. Wu, "An Improved Reversible Data Hiding in Encrypted Images Using Side Match," in IEEE Signal Processing Letters, vol. 19, no. 4, pp. 199-202, April 2012.doi: 10.1109/LSP.2012.2187334
  21. A. M. Elshamy et al., "Optical Image Encryption Based on Chaotic Baker Map and Double Random Phase Encoding," in Journal of Lightwave Technology, vol. 31, no. 15, pp. 2533-2539, Aug.1, 2013
  22. J. Li and H. Liu, "Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map," in IET Information Security, vol. 7, no. 4, pp. 265-270, December 2013
  23. S. K. Abd-El-Hafiz, A. G. Radwan, S. H. Abdel Haleem and M. L. Barakat, "A fractal-based image encryption system," in IET Image Processing, vol. 8, no. 12, pp. 742-752, 12 2014
  24. S. M. Wadi and N. Zainal, "Decomposition by binary codes-based speedy image encryption algorithm for multiple applications," in IET Image Processing, vol. 9, no. 5, pp. 413-423, 5 2015
  25. G. Ye and X. Huang, "An Image Encryption Algorithm Based on Autoblocking and Electrocardiography," in IEEE MultiMedia, vol. 23, no. 2, pp. 64-71, Apr.-June 2016.doi: 10.1109/MMUL.2015.72
  26. X. Li et al., "Multiple-Image Encryption Based on Compressive Ghost Imaging and Coordinate Sampling," in IEEE Photonics Journal, vol. 8, no. 4, pp. 1-11, Aug. 2016
  27. L. Liu, S. Miao, H. Hu and M. Cheng, "N-phase logistic chaotic sequence and its application for image encryption," in IET Signal Processing, vol. 10, no. 9, pp. 1096-1104, 12 2016
  28. L. Bao, S. Yi and Y. Zhou, "Combination of Sharing Matrix and Image Encryption for Lossless $(k,n)$ -Secret Image Sharing," in IEEE Transactions on Image Processing, vol. 26, no. 12, pp. 5618-5631, Dec. 2017
  29. X. Wu, B. Zhu, Y. Hu and Y. Ran, "A Novel Color Image Encryption Scheme Using Rectangular Transform-Enhanced Chaotic Tent Maps," in IEEE Access, vol. 5, pp. 6429-6436, 2017
  30. H. Huang and S. Yang, "Colour image encryption based on logistic mapping and double random-phase encoding," in IET Image Processing, vol. 11, no. 4, pp. 211-216, 4 2017.
  31. R. Jiang, H. Zhou, W. Zhang and N. Yu, "Reversible Data Hiding in Encrypted Three-Dimensional Mesh Models," in IEEE Transactions on Multimedia, vol. 20, no. 1, pp. 55-67, Jan. 2018
Index Terms

Computer Science
Information Sciences


Image Security Image Encryptions Image Attacks.