Article Preview
TopLiterature Review
Several encryption algorithms (Maniccam & Bourbakis, 2001; Jiun-In & Cheng, n.d.; Gu & Han, 2006; Seyedzade et al., 2010; Zhou et al., 2014; Younes & Jantan, 2008; Sinha & Singh, 2003; Zeghid et al., 2007; Xiao & Zhang, 2006; Alsafasfeh & Arfoa, 2011) have been proposed including Lossless image compression and encryption using SCAN by S.S.Maniccam, N.G. Bourbakis (Maniccam & Bourbakis, 2001), Mirror-like image encryption algorithm by Jiun-In Guo, Jui-Cheng Yen (Jiun-In & Cheng, n.d), Image encryption based on hash function by Seyed Mohammad Seyedzade, Reza Ebrahimi Atani and Sattar Mirzakuchak (Seyedzade et al., 2010) and Image encryption using Block-Based Transformation Algorithm by Mohammad Ali, Bani Younes and Aman Jantan (Younes & Jantan, 2008), but Chaos-based encryption techniques (Gu & Han, 2006; Zhou et al., 2014; Alsafasfeh & Arfoa, 2011) are considered good for practical use as these techniques provide a good combination of speed, high security, complexity and computational power etc. Consequently, the traditional ciphers like AES, DES, and RSA etc. are not suitable for real time image encryption as these ciphers require a large computational time and high computing power. For real time image encryption, only those ciphers are preferable which take lesser amount of time and at the same time without compromising security.