Open Access   Article Go Back

Survey Paper on Quaternion-Based Encryption

Garima Mathur1 , Anjana Pandey2

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 978-990, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.978990

Online published on Apr 30, 2019

Copyright © Garima Mathur, Anjana Pandey . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Garima Mathur, Anjana Pandey, “Survey Paper on Quaternion-Based Encryption,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.978-990, 2019.

MLA Style Citation: Garima Mathur, Anjana Pandey "Survey Paper on Quaternion-Based Encryption." International Journal of Computer Sciences and Engineering 7.4 (2019): 978-990.

APA Style Citation: Garima Mathur, Anjana Pandey, (2019). Survey Paper on Quaternion-Based Encryption. International Journal of Computer Sciences and Engineering, 7(4), 978-990.

BibTex Style Citation:
@article{Mathur_2019,
author = {Garima Mathur, Anjana Pandey},
title = {Survey Paper on Quaternion-Based Encryption},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {978-990},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4154},
doi = {https://doi.org/10.26438/ijcse/v7i4.978990}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.978990}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4154
TI - Survey Paper on Quaternion-Based Encryption
T2 - International Journal of Computer Sciences and Engineering
AU - Garima Mathur, Anjana Pandey
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 978-990
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
315 256 downloads 139 downloads
  
  
           

Abstract

Nowadays, delivering sensitive digital multimedia contents confidentially over vulnerable public networks is a matter of high importance and encryption is a technique which is widely used for secure communication. An improved and extended version of a lossless encryption technique used for digital images is quaternion based encryption. The quaternion based encryption scheme, significantly improves speed of images encryption in comparison with those originally embedded advanced encryption standard (AES) and triple data encryption standard (3-DES) algorithms. It utilizes extraordinarily properties of quaternion’s to perform rotations of information in 3D space for each of the cipher rounds. In this paper it has been surveyed about existing works on quaternion based encryption technique for both gray toned and color images as well as its application for secure transmission of medical images.

Key-Words / Index Term

Quaternion rotation, lossless scheme, security, DICOM, image processing, key sensitivity.

References

[1] T. Nagase, R. Koide, T. Araki, Y. Hasegawa, A new Quadripartite Public-Key Cryptosystem", in Proc. Int. Symp. Commun. lnfom. Technol. ISCIT 2004, Sapporo, Japan, 2004, pp. 74-79.
[2] Jongchan Baek, Hayeong Jeon, Gwangjin Kim, And Soohee Han, “Visualizing Quaternion Multiplication,” IEEE Access, Volume 5, 2017
[3] M. Dzwonkowski, and R. Rykaczewski, “Secure Quaternion Feistel Cipher for DICOM Images,” IEEE Trans. Image Process., vol. 28, no.1, Jan. 2019.
[4] M. Dzwonkowski, M. Papaj, and R. Rykaczewski, “A new quaternion based encryption method for DICOM images,” IEEE Trans. Image Process., vol. 24, no. 11, pp. 4614–4622, Nov. 2015.
[5] T. Nagase, M. Komata, and T. Araki, “Secure signals transmission based on quaternion encryption scheme,” in Proc. IEEE Adv. Inf. Netw. Appl. (AINA), vol. 2, Mar. 2004, pp. 35–38.
[6] B. Czaplewski, M. Dzwonkowski, and R. Rykaczewski, “Digital fingerprinting based on quaternion encryption scheme for gray-tone images,” J. Telecommun. Inf. Technol., vol. 2, pp. 3–11, Jul. 2014.
[7] M. Dzwonkowski and R. Rykaczewski, “Quaternion feistel cipher with an infinite key space based on quaternion Julia sets,” J. Telecommun. Inf. Technol., vol. 4, pp. 15–21, Dec. 2015.
[8] B. Czaplewski, M. Dzwonkowski, and R. Rykaczewski, “Digital fingerprinting for color images based on the quaternion encryption scheme,” Pattern Recognit. Lett., vol. 46, pp. 11–19, Sep. 2014.
[9] B. Czaplewski, “Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining,” J. Vis. Commun. Image Represent., vol. 40, pp. 1–13, Oct. 2016.
[10] H. Liu, Z. Zhu, H. Jiang, and B. Wang, “A novel image encryption algorithm based on improved 3D chaotic cat map,” in Proc. Young Comput. Sci. (ICYCS), Nov. 2008, pp. 3016–3021.
[11] M. Dzwonkowski and R. Rykaczewski , “Quaternion encryption methods for multimedia transmission, a survey of existing approaches,” Telecommun. Rev. Telecommun. News, vol. 7, pp. 668–671, Jul. 2016.
[12] F. Zhang, “Quaternions and matrices of quaternions,” in Linear Algebra and Its Applications. New York, NY, USA: Elsevier, 1997, pp. 21–57.