Main Menu

My Account
Online Free Samples
   Free sample   Encryption assignment image encryption techniques and terminology

Encryption Assignment: Image Encryption Techniques And Terminology


Task: Write a paper on encryption assignment critically discussing about Image encryption techniques and their terminologies.


Abstract 2
Encryption is a kind of security technique explored within the encryption assignment which is capable to enhance the privacy of data by converting into a systematic code using private keys. In this modern era, security is a biggest problem faced by the businesses where the hackers transfer unauthorized networks and produce security vulnerabilities that lead security threats and data breach concerns. Image encryption is an effective technique that can be used to convert images into a secured system by which the level of security can be enhanced easily. This encryption assignment focuses on the security concerns and describes image encryption techniques along with their terminologies. Numerous kinds of methodologies are used including inductive approach, qualitative design, data gathering and data analysis approaches. A systematic literature is used for obtaining significant information about image encryption technique and managing the research gaps linked with the recent papers. A descriptive analysis is adopted that helped to review the gathered data and manage the research questions effectively. It is found that PRISM is an effective technique that can be used as a security approach by which the personal data and images can be protected from the security vulnerabilities and attacks effectively. This paper shows that the presence of image encryption techniques can help the companies to address the unauthorized activities and lead the level of security. This paper highlighted complete information in regards to the image encryption techniques and evaluated the security vulnerabilities associated with the personal information. The future research will evaluate the benefits and challenges of integrating image encryption techniques and conduct a close ended survey for obtaining fresh information in the research.

Encryption is a kind of process which is mainly utilized to encode a signal into a code so that it can be secured from the criminals and protected from the cyber-crimes. Image encryption is an effective technique that has the ability to protect digital images from hackers effectively [14]. There are numerous kinds of image encryption techniques used in companies such as position permutation-based, value transformation-based and position substitution based. The major concept behind encryption technique is to convert the information into code through public or private keys and help the consumers to secure sensitive data effectively [1].

For decoding the converted images, the hackers require private keys which are difficult to obtain and help to enhance the level of security. In this generation, the rate of cyber-crime is growing quickly for which it is significant for the companies to protect data from the attackers [15]. Image encryption provides a way to enhance the privacy of the images. The major topic of the research is “image encryption techniques and terminologies” [16]. PRISM is an effective technique that can be adopted in the image encryption that has the capability to detect and evaluate the unwanted signals from the systems effectively [2]. It is reported that the utilization of PRISM safety may be utilized for preventing the illegal utilization of image information. The primary step will be manipulated with the pixels that will help to convert image into a code by which the users can significantly secure personal information [17].

The purpose of the research is to identify the significance of image encryption technique and review various terminologies associated with the image encryption [3]. It is reported that data security is a major research problem that will be addressed in this research by evaluating effective encryption based system [18]. Encryption technique helps to reduce and address unauthorized activities from the communication channels and enhance the level of privacy [4]. So, this encryption assignment will address the security concerns associated with the private details and encrypt images effectively [19]. Moreover, the investigation will provide a way to enhance skills in regards to the data vulnerabilities and risks associated with sensitive data effectively. The major research question raised on this encryption assignment for the investigation is “how can multiple layers of the encryption technique enhance the security of sensitive data”?

For addressing this question numerous research methods will be included such as qualitative design, inductive approach, secondary data gathering and data analysis [5]. In which qualitative design will help to obtain theoretical information about encryption technique and manage the research gaps [20]. The inductive approach will be adopted by the writer due to the subjective nature of the investigation where it will help to provide the depth information and implement effective research [6].

For gathering data, secondary methods will be included that will help to obtain theoretical information in the research. A literature review will be added to obtain effective data in regards to the image encryption techniques [7]. Moreover, numerous resources will be added for obtaining secondary data such as peer-reviewed papers, online websites, books and many more. The data analysis is a major part of the methodology that has the ability to evaluate and analyze the obtained data [8].

Numerous kinds of techniques involved in the data analysis such as content and statistical methods [9]. In this investigation, descriptive content analysis will be included due to their ability to provide effective outcomes in the investigation. Moreover, such a methodology will help to address research concerns and provide reliable findings by which the appropriate conclusions can be highlighted in the research [10]. Excel tool will be included that will help to represent the obtained data into graphical and tabular forms and enhance the research quality. Therefore, all these are effective techniques and research approaches used herein encryption assignment that will deliver a way to complete the research with better outcomes and achieve the proposed goals and objectives in an appropriate manner [11].

The potential outcomes of this encryption assignment show the importance of image encryption technique in the area of security [12]. The conducted research on encryption assignment helps to enhance skills about security vulnerabilities and manage security concerns. It is reported that security is a major problem that can be managed through an image encryption technique that has the ability to address unauthorized signals from the servers and enhance the level of security [13]. The adopted methodologies and approaches are effective that helped to address the research concerns and enhance research quality.


  • Agarwal, S., 2017. Image encryption techniques using fractal function: a review. International Journal of Computer Science & Information Technology (IJCSIT), 9(2), pp.53-68.
  • Avasare, M.G. and Kelkar, V.V., 2015, January. Image encryption using chaos theory. Encryption assignment In 2015 International Conference on Communication, Information & Computing Technology (ICCICT)(pp. 1-6). IEEE.
  • Ding, X. and Chen, G., 2014. Optical color image encryption using position multiplexing technique based on phase truncation operation. Optics & Laser Technology, 57, pp.110-118.
  • Guesmi, R., Farah, M.A.B., Kachouri, A. and Samet, M., 2016. Hash key-based image encryption using crossover operator and chaos. Multimedia tools and applications, 75(8), pp.4753-4769.
  • Jain, A. and Rajpal, N., 2016. A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps. Multimedia Tools and Applications, 75(10), pp.5455-5472.
  • Khan, M. and Shah, T., 2014. A literature review on image encryption techniques. 3D Research, 5(4), p.29.
  • Kumar, M., Aggarwal, A. and Garg, A., 2014. A review on various digital image encryption techniques and security criteria. Encryption assignment International Journal of Computer Applications, 96(13).
  • Liu, S., Guo, C. and Sheridan, J.T., 2014. A review of optical image encryption techniques. Optics & Laser Technology, 57, pp.327-342.
  • Liu, Y., Tang, J. and Xie, T., 2014. Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map. Optics & Laser Technology, 60, pp.111-115.
  • Luo, Y., Du, M. and Liu, J., 2015. A symmetrical image encryption scheme in wavelet and time domain. Communications in Nonlinear Science and Numerical Simulation, 20(2), pp.447-460.
  • Oad, A., Yadav, H. and Jain, A., 2014. A review: Image encryption techniques and its terminologies. International Journal of Engineering and Advanced Technology (IJEAT) ISSN, pp.2249-8958.
  • Sankpal, P.R. and Vijaya, P.A., 2014, January. Image encryption using chaotic maps: a survey. In 2014 fifth international conference on signal and image processing(pp. 102-107). IEEE.
  • Shankar, K. and Eswaran, P., 2016. An efficient image encryption technique based on optimized key generation in ECC using genetic algorithm. Encryption assignment In Artificial Intelligence and Evolutionary Computations in Engineering Systems(pp. 705-714). Springer, New Delhi.
  • Wang, X. and Xu, D., 2014. A novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear dynamics, 75(1-2), pp.345-353.
  • Wang, Y., Zhao, Y., Zhou, Q. and Lin, Z., 2018. Image encryption using partitioned cellular automata. Neurocomputing, 275, pp.1318-1332.
  • Wu, J., Xie, Z., Liu, Z., Liu, W., Zhang, Y. and Liu, S., 2016. Multiple-image encryption based on computational ghost imaging. Optics Communications, 359, pp.38-43.
  • Xu, Y., Wang, H., Li, Y. and Pei, B., 2014. Image encryption based on synchronization of fractional chaotic systems. Communications in Nonlinear Science and Numerical Simulation, 19(10), pp.3735-3744.
  • Zhang, Y., Wen, W., Su, M. and Li, M., 2014. Cryptanalyzing a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik, 125(4), pp.1562-1564.
  • Zhou, N., Pan, S., Cheng, S. and Zhou, Z., 2016. Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing. Encryption assignment Optics & Laser Technology, 82, pp.121-133.
  • Zhou, Y., Cao, W. and Chen, C.P., 2014. Image encryption using binary bitplane. Signal Processing, 100, pp.197-207.

Related Samples

Question Bank

Looking for Your Assignment?

Search Assignment
Plagiarism free Assignment









9/1 Pacific Highway, North Sydney, NSW, 2060
1 Vista Montana, San Jose, CA, 95134