International Journal of Engineering Research and Advanced Technology (IJERAT) E-ISSN : 2454-6135 DOI: 10.31695/IJERAT.2021.3734 Volume.7, No. 9 September -2021 www.ijerat.com Page 1 Subject Review: Image Encryption Based on Multi Techniques Zainab Mohammed Essa, Doaa Mohsin Abd Ali Afraji, Donia Fadhil Chalob, Sahar Hasan Hashim, and Ziad M. Abood * Department of Computer Science Collage of Education, Mustansiyiah University Iraq _______________________________________________________________________________________ ABSTRACT The enormous advancements in communication network, particularly the internet networks, that employed to allow numerous individuals to exchange various forms of data, Security of data has become a big issue. As a result, the usage of cipherment and decipherment ways is becoming more popular. Sundry cipherment means have been created to ensure data security, the chaos encryption system being one of the most widely employed in recent years. In this research, a review of diverse image cipherment algorithms have been reviewed, which researchers can gain insight into the most efficient techniques to employ. Keywords: Cryptography, Decryption, Encryption, Image Encryption, Key Space. ________________________________________________________________________________________________________ 1. INTRODUCTION Information security is a must-have for everyone nowadays. People need to protect their resources and information, especially their private photographs, from unauthorized access, which necessitates the use of image encryption in our daily lives. Image encryption can be defined as the process of transforming an original image into a cipher image via employing certain techniques or methods [1]. Image cipherment is employed to safeguard the content of an image, authenticate images and hide data. [2]. The Image cipherment employs standard encryption methods like DES, AES and RSA algorithms. However, when used these algorithms in a cryptosystem that ciphers a huge number of images or videos, the standard encryption technique is less efficient. In the field of information ciphering, the chaos system has better features. It is sensitive to initial conditions, unpredictable and has a complex bifurcation. Chaos has a number of unique qualities that aid in the development of more secure and reliable encryption schemes [3,4]. Henon map, Arnold Cat map, Logistic map, Lorenz system and extra chaotic models are examples. The features of various cipherment methods related to perfect cipher, like diffusion, assessment and avalanche, reflect the complicated nature of chaos mapping. [2, 3] An growing variety of image cipherment techniques are proposed for use in cryptography applications in the previous two eras. Image encryption algorithms have been examined in depth in this study. The remainder of this work is prepared as follows: The literature review of some papers proposed in the last decade is presented in Section Two. The inferences are found in Section 3. 2. LITERATURE SURVEY There are numerous image cryptography methods are investigated during the previous decade. Some of these studies are discussed in this section. Taqi and Hameed [5] employed chaotic maps to check that the security cipher characteristics of confusion and diffusion are met. A mixture of 1-D logistic and Sine chaos map is employed to construct the key sequence for encrypting an image. Three chaotic sequences are constructed to generate a key sequence to encrypt an image. The binary representation of sx, sy and sz is created. The original image is divided into three bands. The resulting sequences are subjected to an XOR procedure. The collected outcomes are then translated to decimal form in order to create an encrypted image. El-Latif and Xiau Niu [6] proposed a cyclic elliptic curve and a chaotic system, developing an effective hybrid image encryption approach. In a feedback approach, The suggested approach uses a chaos system and a 256-bit external secret key to generate an initial key stream. Key sequences obtained from cyclic elliptic curve points are then combined with the resulting