Abstract
Data plays an important role in modern life, and because more and more gadgets are connecting to the internet, the amount of data stored online is growing at an alarming rate, which raises the possibility that the information could be stolen and used unethically. The most vulnerable type of data is visual, as a large number of users today keep their personal photographs in online storage facilities such as Google Photos and Google Drive, among others. Data encryption, which can make use of either symmetric or asymmetric keys, is one of the many innovative methods that are being developed in order to improve security. This study explains various methods of encryption and decryption that are used today. In addition to that, it explains the tiniest possible implementation of an image encryption technique, which makes use of a method that is somewhat analogous to symmetric-key cryptography.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Lin C-C, Tsai W-H (2003) Visual cryptography for gray-level images by dithering techniques. Pattern Recogn Lett 24(1–3):349–358
Zhou Z, Arce GR (2006) Giovanni Di Crescenzo: Halftone visual cryptography. IEEE Trans Image Process 15(8):2441–2453
Rao UH, Nayak U (2014) Cryptography. In: The InfoSec Handbook, pp. 163–181. Apress, Berkeley, CA
Nahta R, Jain T, Narwaria A, Kumar H, Gupta RK (2020) Image encryption decryption using simple and modified version of AES. In: Somani AK, Shekhawat RS, Mundra A, Srivastava S, Verma VK (eds) Smart systems and IoT: Innovations in computing. smart innovation, systems and technologies, vol. 141. Springer, Singapore
Swarna Priya RM, Maddikunta PKR, Parimala M, Koppu S, Gadekallu TR, Chowdhary CL, Alazab M (2020) An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture. Comput. Commun. 160:139–149
Kaur M, Kumar V (2020) A Comprehensive review on image encryption techniques. Arch. Comput. Methods Eng. 27:15–43
P AK, G SS, Maddikunta PKR, Gadekallu TR, Al-Ahmari A, Abidi MH (2020) Location based business recommendation using spatial demand. Sustainability 12(10): 4124
Han Q, Wang L, Lee Y, Qin J (2020) Video encryption scheme using hybrid encryption technology. Int J Internet Protoc Technol 13(1):1–8
Chowdhary CL (2019) 3D object recognition system based on local shape descriptors and depth data analysis. Recent Patents Comput Sci 12(1): 18–24
Liu YiHe, Zhang S (2020) Information security and storage of Internet of Things based on block chains. Futur Gener Comput Syst 106:296–303
Tiwari D, Singh A, Prabhakar A (2020) Performance analysis of AES, RSA and hashing algorithm using web technology. In: Giri V, Verma N, Patel R, Singh V (eds) Computing algorithms with applications in engineering. algorithms for intelligent systems. Springer, Singapore
Mortajez S, Tahmasbi M, Zarei J, Jamshidnezhad A (2020) A novel chaotic encryption scheme based on efficient secret keys and confusion technique for confidential of DICOM images. Inform Med Unlocked 20:100396
Chowdhary CL, Muatjitjeja K, Jat DS (2015) Three-dimensional object recognition based intelligence system for identification. In: Proceedings of the 2015 International conference on emerging trends in networks and computer communications (ETNCC), pp 162–166. IEEE, Piscataway, NJ, USA
Jin X, Duan X, Jin H, Ma Y (2020) A novel hybrid secure image encryption based on the shuffle algorithm and the hidden attractor chaos system. Entropy 22(6):640
Hashim HR, Neamaa IA (2014) Image encryption and decryption in a modification of ElGamal cryptosystem in MATLAB. Int J Sci: Basic Appl Res (IJSBAR) 14(2):141–147
Chowdhary CL, Mittal MPK, Pattanaik PA, Marszalek Z (2020) An efficient segmentation and classification system in medical images using intuitionist possibilistic fuzzy C-mean clustering and fuzzy SVM algorithm. Sensors 20(14):3903
Hardi SM, Tarigan JT, Safrina N (2018) Hybrid cryptosystem for image file using elgamal and double Playfair cipher algorithm. In: Proceedings of the 2nd International conference on computing and applied informatics 2017, pp 012068. IOP Conference Series: Journal of Physics: Conference Series, Medan, Indonesia 978
Hamad S, Khalifa A, Elhadad A, Rida SZ (2013) A modified playfair cipher for encrypting digital images. J Commun Comput Eng 3(2): 1–9
Arab A, Rostami MJ, Ghavami B (2019) An image encryption method based on chaos system and AES algorithm. J Supercomput 75:6663–6682
Visu P, Sivakumar N, Kumaresan P, Yokesh Babu S, Ramesh PS (2020) Removing leaf petioles and auto locating apex-base points using straight line interpolation and bisection. Multimed Tools Appl 79: 5355–5369
Dawahdeh ZE, Yaakob SN (2018) Rozmie Razif bin Othman: A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher. J King Saud Univ-Comput Inf Sci 30(3):349–355
Anwar MN, Hasan M, Hasan MM, Loren JZ, Hossain ST (2019) Comparative study of cryptography algorithms and its’ applications. Int J Comput Netw Commun Secur 7(5):96–103
Srinivasan Nagaraj GSVP (2015) Raju: Image security using ECC approach. Indian J Sci Technol 8(26):1–5
Nita SL, Mihailescu M (2020) I: A Searchable encryption scheme based on elliptic curves. In: Barolli L, Amato F, Moscato F, Enokido T, Takizawa M (eds) Web, artificial intelligence and network applications, vol 1150. WAINA 2020, Advances in intelligent systems and computing. Springer, Cham, pp 810–821
Sharma A, Singh A, Kumar A (2022) Encryption and decryption of marker based 3- dimensional augmented reality image using modified hill cipher technique for secure transfer. In: 2022 IEEE 2nd International conference on computer communication and artificial intelligence (CCAI), pp 155–159. IEEE, Beijing, China
Rupa IS, Manideep K, Kamale NM, Suhasini S (2022) Information security using chaotic encryption and decryption of digital images. In: 2022 International conference on innovative computing, intelligent communication and smart electrical systems (ICSES), pp 1–7. IEEE, Chennai, India
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Singh, N.T., Dayal, R., Kanwal, D., Bhardwaj, A. (2023). Study on the Encryption and Decryption Capabilities of Hybrid Techniques for Images. In: Raj, J.S., Perikos, I., Balas, V.E. (eds) Intelligent Sustainable Systems. ICoISS 2023. Lecture Notes in Networks and Systems, vol 665. Springer, Singapore. https://doi.org/10.1007/978-981-99-1726-6_64
Download citation
DOI: https://doi.org/10.1007/978-981-99-1726-6_64
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-1725-9
Online ISBN: 978-981-99-1726-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)