Content area
Full Text
ABSTRACT
Due to the rapid growth of digital communication and multimedia application, security becomes an important issue of communication and storage of images. As the use digital techniques for transmitting and storing images are increasing, it becomes an important issue that how to protect the confidentiality, integrity and authenticity of images. There are various algorithm which are discovered from time to time to encrypt the images to make images more secure. In this paper we survey on exiting work. Which is used different algorithm for image encryption It additionally focuses on the functionality of Image encryption algorithm.
Keywords: Asymmetric key cryptography, Decryption, Encryption, Image encryption, Symmetric key cryptography.AES,DES,RC4
I. Introduction
Image encryption techniques try to convert original image to another image that is hard to imderstand; to keep the image confidential between users, in other word, it is essential that nobody could get to know the content without a key for decryption. Image encryption, video encryption, chaos based encryption have applications in many fields including the internet communication, transmission, medical imaging. Tele-medicine and military Communication, etc. Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption does not of itself prevent interception, but denies the message content to the interceptor. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating cipher text that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. Encryption is also used to protect data in transit, for example data being transferred via networks (e.g. the Internet, ecommerce), mobiles, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. There have been numerous reports of data in transit being intercepted in recent years. Color images are being transmitted and stored in large amount over the Internet and wireless networks, which take advantage of rapid development in multimedia and network Technologies. In recent years, plenty of color image encryption approaches have been proposed. Until now, various data encryption algorithms have been proposed and widely used, such as AES, RSA, or IDEAmost of which are used in text or binary data. It is difficult to...