Arapidlyevolvingtechnologicalworldhasrevolutionizedhumanlives,onesuchimportantpartofthisamazingworldistheinternetwithalmost330millionterabytesofdatagenerated each day. Most of the images generated are multispectralimages and these images contains sensitive information which canbe related to military, medical, research, agricultural etc. domains.So,whentheseimagesaretransmittedoverthenetwork,thereisriskof attacks such as Adversarial attacks which can compromise theaccuracyofimageanalysis,anotherisspatialattackswherealteringthespatialstructureofmultispectralimagescandisrupttherelationshipsbetweendifferentspectralbands,leadingtoinaccuracies infeature extractionandanalysis, Noise injection,watermarkingattacksetcaresomeoftheattacksnormallyencountered.Hence,toprovideoverallsecuritytosuchmultispectralimagesisimportant.Thispaperproposesvarioussecurityapproacheswhichcanprovideconfidentiality,Integrityandauthenticitytotheimages.
Introduction
The paper reviews methods to secure multispectral images—which contain sensitive information—through encryption and authentication, addressing challenges traditional encryption methods face due to images’ large size, redundancy, and high correlation. Chaos-based encryption systems, leveraging chaotic maps, offer enhanced security by producing highly sensitive and complex encryption patterns.
Encryption Techniques:
Various studies propose chaos-based encryption methods combined with other techniques like fingerprint keys, joint encryption-compression, block ciphers, Arnold transforms, and RC4 stream cipher.
These methods aim to enhance encryption efficiency, security against statistical and plaintext attacks, and reduce computational complexity.
Some techniques integrate compressive sensing and chaotic systems for improved performance.
Trade-offs include complexity, hardware requirements, vulnerability to certain attacks, and computational costs.
Watermarking Techniques:
Digital watermarking methods (using DWT, DCT, SVD, etc.) are surveyed for protecting image copyrights, ensuring robustness against attacks, and embedding watermarks invisibly.
Research highlights different applications including medical, broadcasting, and software protection.
Challenges include robustness against cropping, scaling, and attacks, and balancing imperceptibility with security.
Hashing Techniques:
Hashing algorithms, particularly perceptual hashing and cryptographic hashes like SHA, are explored for image authentication and data integrity.
Advanced methods combine deep learning and hashing for efficient large-scale image retrieval.
Security concerns and computational overhead are noted, especially for traditional hashing algorithms in modern applications.
The paper also includes a detailed comparative table summarizing methodologies, advantages, and disadvantages of key referenced works in encryption, watermarking, and hashing.
Conclusion
In summary, this survey article explores the combination ofhashing, watermarking, and encryption methods for safe picturetransfer. The wide range of techniques, such as neural networkapplications,AESvs.RSA,andchaoticcryptography,highlightsthevarietyofwaystoimproveimagesecurity.Strongsecurityproceduresareimportantwhilemanagingimage data because of the needs for confidentiality, integrity,authentication,andprotectionagainstdifferentthreatsthathavebeen identified. The classification diagram helped to select thebestapproachesforparticularneedsbyprovidinganadequatesummaryofthesurveyedmethodologies.Thissurveyaddressescurrentissueswithdataprivacy,integrity,andownershipinourdigitallyconnectedsociety,greatlyincreasingsecureimagetransmissiontechniques.Thecombinationof3D-DWT, SHA-256, and chaotic maps appears tobe a strongfoundation for secure transmission of images. The proposedsystemprovidesConfidentialityusingaChaoticmapsEncryption algorithm, Authentication using SHA-256 alongwith 3-D DWT as a watermarking technique thus enhancingsecuritywhile multispectralimage transmission
References
[1] Abdullah,HamsaA.,andHikmatN.Abdullah,” Secureimagetransmission based on a proposed chaotic map.” Multimedia SecurityUsingChaoticMaps:PrinciplesandMethodologies(2020):81-109.
[2] Agarwal,Shafal,” Secure image transmissionusingfractaland2D-chaoticmap.”JournalofImaging4.1(2018):17.
[3] Sathishkumar,G.A.,and Dr N. Sriraam,” Image encryption based on diffusion and multiplechaotic maps.”arXivpreprintarXiv:1103.3792 (2011).
[4] Bremnavas,I.,B.Poorna,andI.RajaMohamed,” Securedmedicalimagetransmissionusingchaoticmap.”ElixirComp.Sci.Eng54(2013):2472-2478.
[5] Feng, Wei, Jing Zhang, and Zhentao Qin,” A secure and efficient imagetransmission scheme based on two chaoticmaps.” Complexity 2021(2021):1-19.
[6] Hamdi,Mohamed,andNoureddineBoudriga,” Fourdimensionalchaoticciphersforsecureimagetransmission.”2008IEEEInternationalConferenceonMultimediaand Expo.IEEE, 2008.
[7] Abdelfatah, Roayat Ismail,” Secure image transmission using chaotic-enhanced elliptic curve cryptography.” IEEE Access 8 (2019): 3875-3890.
[8] Yadav, Kanchan, and Trushita Chaware,” Review of joint encoding andencryptionforimagetransmissionusingchaoticmap,ldpcandaesencryption.” 2021 6th International Conference on Signal Processing,ComputingandControl (ISPCC).IEEE,2021.
[9] Sankpal, Priya R., and P. A. Vijaya,” Image encryption using chaoticmaps: a survey.” 2014 fifth international conference on signal and imageprocessing.IEEE,2014.
[10] Fridrich, Jiri,” Image encryption based on chaotic maps.” 1997 IEEEinternationalconferenceonsystems,man,andcybernetics.Computationalcyberneticsandsimulation.Vol.2.IEEE,1997.
[11] G. Goth, “Steganalysis gets past the hype,” IEEE Distributed SystemsOnline,vol.6,no.4,p.2,2005.
[12] I.Cox,M.Miller,J.Bloom,J.Fridrich,andT.Kalker,Digitalwatermarking and steganography.MorganKaufmann,2007.
[13] A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital imagesteganography:Surveyandanalysisofcurrentmethods,”Signalprocessing,vol.90,no.3,pp.727–752,2010.
[14] F.YaghmaeeandM.Jamzad,“Estimatingwatermarkingcapacityingrayscaleimagesbasedonimagecomplexity,”EURASIPJournalonAdvancesinSignal Processing,vol.2010,no.1,p.851920,2010.
[15] A. A. Tamimi, A. M. Abdalla, and O. Al-Allaf, “Hiding an image insideanother image using variable-rate steganography,” International Journalof Advanced Computer Science and Applications (IJACSA), vol. 4, no.10,2013.
[16] T.Pevny,T.Filler,andP.Bas,“Usinghigh-dimensionalimagemodlestoperformhighlyundetectablesteganography,”inInternationalWorkshopon Information Hiding.Springer,2010,pp.161–177.
[17] G.C.KesslerandC.Hosmer,“Anoverviewofsteganography,”AdvancesinComputers,vol.83,no.1,pp.51–107,2011.
[18] V.Patidar,N.K.Parreek,G.Purohit,K.K.Sud,\"Modifiedsubstitutiondiffusion image cipher using chaotic standard and logisticsmaps\", Communication in Nonlinear Science and Numerical Simulation2010;15(10);pp2755-2765.
[19] LiuXiangdong,ZhangJunxing,ZhangJinhai,HeXiqin,\"Imagescrambling algorithm based on chaos theory and sorting transformation\",International journal of computer science and network security, Vo1.8No.1,January2008.
[20] EI-Alfy E.S and Al-Utaibi K. An Encryption Schemefor Color ImagesBasedonChaoticMapsandGeneticOperators.,2011.URL:http://www.thinkmind.orglindex.php?view=artic1eartic1eid=icns 20 11 51010212,VisitedonAugust18,2012.
[21] LA.lsmail,MohammedaminandHossamDiab\"AnEfficientImageEncryption Scheme Based Chaotic Logistic Map \", International JournalofSoftComputing,285-291,2007.
[22] Wang XV, Yu Q., \"A block encryption algorithm based on dynamic sequences of multiple chaotic system\", Communications in Nonlinear Science and Numerical Simulation 2009; 14(2):574-8 1.
[23] Yu, S. S., Zhou, N. R., Gong, L. H., Nie, Z. (2020). Optical image encryption algorithm based on phase-truncated short-time fractional
[24] Fourier transform and hyper-chaotic system. Optics and Lasers in Engineering, 124, 105816.
[25] Yang, Y. G., Guan, B. W., Li, J., Li, D., Zhou, Y. H., Shi, W. M. (2019). Image compression-encryption scheme based on fractional order hyper-chaotic systems combined with 2D compressed sensing and DNA encoding. Optics Laser Technology, 119, 1.
[26] Ansari, S.; Gupta, N.; Agrawal, S. An image encryption approach using chaotic maps in frequency domain. Int. J. Emerg. Technol. Adv. Eng. 2012,2,287-29.