tailieunhanh - A survey on security of permutation for only image encryption schemes

This paper discusses the survey on the encryption techniques with the permutation and also briefly discusses the encryption for image and studies carried on the only image encryption (OIE) schemes. The paper provides the future study requirement for the secure image transmission. | ISSN:2249-5789 Aparna N et al, International Journal of Computer Science & Communication Networks,Vol 6(2),49-53 A Survey on Security of Permutation for only Image Encryption Schemes Aparna N Mrs. Kavyashree M. Tech Student, Dept. of CSE, RGIT, Bangalore, India Asst Prof.: Dept. of Computer Science and Engg RGIT, Bangalore, India Abstract— The improved technology has provided a facility for multimedia transmission (like images, data, videos) over the open internet network but there are more chances of insecurity in this process, thus there is need of secure mode of transmission. Although, there are many methods has been presented for the secure image transmission like encryption, which helps in protection against unauthorized access. But some Encryption algorithms are only can be used for text data not for image data; hence, permutations are used in multimedia encryption algorithms to provide enhanced secure image transmission. This paper discusses the survey on the encryption techniques with the permutation and also briefly discusses the encryption for image and studies carried on the only image encryption (OIE) schemes. The paper provides the future study requirement for the secure image transmission. Keywords: Cryptanalysis, Image Encryption, Plain attack, Permutation. I. INTRODUCTION The growing technology in the field of mobile and their applications in multimedia is facing many issues over the internet. The multimedia data sharing in military, government, hospitals, business sectors, etc., are facing security issues for their confidential data like image, video, etc. [1]. Nowadays these data are collecting and storing in an electronic device, and then it can be transmitted to another device. During this process, the protection of confidential images like patients scanning reports, geographical records, military data may get hacked, and it may lead to loss of data; hence, the protection of these things is must [2]. Image security in .