Evaluation of the quality of an image encrytion scheme (original) (raw)
Related papers
A Study on Statistical Analysis and Security Evaluation Parameters in Image Encryption
In recent years, a significant improvement in multimedia technologies has been observed and therefore, transmission of these data over the network is very common. The network (mainly internet) is not a secure channel and it has a number of security related problems. To achieve security of multimedia data over an insecure channel, a number of encryption methods have been developed. This paper gives a study on different methodology to evaluate image encryption techniques proposed in the literature. Only the visual inspection is not enough and therefore a number of parameters like, correlation coefficient, NPCR. UACI, information entropy, compression friendliness, PSNR, histogram analysis etc., are used, to judge the quality of encrypted images.
How to Evaluate the Security and Performance of an Image Encryption System
International Journal of Scientific Research in Science, Engineering and Technology, 2020
Almost all technical people know about images and image encryption, but some of them are not aware of the security and performance of the encryption systems. All image encryption systems are capable of encrypting the images, but some are not so secure. However, the question is how to evaluate the encryption systems. This paper gives you what are the analyses that are possible for evaluating the security and performance of the encryption systems. We hope this paper gives you an insight into Images, Image encryption, Security attacks, Noise and information loss, Evaluation Criteria, Analysis, Resistance, Key, Speed, Complexity, and other parameters.
A Benchmark for Performance Evaluation and Security Assessment of Image Encryption Schemes
I. J. Computer Network and Information Security, 2016
Digital images have become part of everyday life by demonstrating its usability in a variety of fields from education to space research. Confidentiality and security of digital images have grown significantly with increasing trend of information interchange over the public channel. Cryptography can be used as a successful technique to prevent image data from unauthorized access. Keeping the nature of image data in mind, several encryption techniques are presented specifically for digital images, in literature during past few years. These cryptographic algorithms lack a benchmark for evaluation of their performance, cryptographic security and quality analysis of recovered images. In this study, we have designed and developed a benchmark based on all the parameters necessary for a good image encryption scheme. Extensive studies have been made to categories all the parameters used by different researchers to evaluate their algorithms and an optimum benchmark for evaluation is formulated. This benchmark is used to evaluate three image encryption schemes. The results of evaluation have highlighted the specific application areas for these image encryption schemes.
In the competitive modern world, the entire transactions and communications are converted into electrically. Off course all transactions are being done with in a period of time to decrease the man power process. One important and hectic thing is needed here to enhance the perfect transaction is called as " security ". Recent day's security assumes an essential part for whole electrical exchanges. For, most of the online business, interaction between websites and servers uses cryptography concepts to maintain their secrets in secured manner. In cryptography, lot algorithms were designed for working with text, image as well as video. These types of cryptographic encryption algorithms are entirely working against hacker's knowledge. Encryption techniques are considered by two varieties that are, public and private. The main difference between public and private algorithm is, in public system, need 3000 bit key to achieve the same level of security of a 128 bit private system. Asymmetric algorithms are incredibly slow and it is impractical to us them to encrypt large amounts of data. Symmetric algorithms are about 1000 times faster than Asymmetric ones. This article shows the collection of encryption techniques particularly for image and evaluates these techniques based on the performance metrics.
The quality of image encryption techniques by reasoned logic
TELKOMNIKA Telecommunication Computing Electronics and Control, 2020
One form of data is digital images, because of their widespread of frequent exchange over the internet it is necessary to preserve the security and privacy of the images transmitted.There are many image encryption techniques that have different security levels and there are many standards and protocols fortesting the quality of encryption security. The cipher images can be evaluated using various quality measuring criteria, these measures quantify certain features of the image. If there are many methods that can be applied to secure images; the question is what is the most powerful scheme that can be use damong these methods? This research try to answer this question by taking three different encryption methods (rivest cipher 5 (RC5), chaotic and permutation) and measure their quality using the peek signal to noise ratio (PSNR),correlation, entropy, number of pixels changes rate (NPCR) and unified average changing intensity (UACI), the results of these criteria were input to a fuzzy logic system that was used to find the best one among them.
Efficiency and security of some image encryption algorithms
2008
This paper describes the results of efficient measuring methods whereby the encryption capability of four algorithms are evaluated. Specifically this work focuses on measuring the encryption quality, the memory requirement and the execution time of the encryption as an indicator to the usage of the software and the hardware. Also, the security analysis of these schemes is investigated from cryptographic viewpoint; statistical and differential attacks. A number of requirements are therefore identified upon which the algorithms are evaluated. The results of the efficient measuring methods show that each algorithm has its own strengths and weaknesses and no single encryption mechanism is able to get the maximum security with minimum execution time. The paper proposes that it may be possible to develop new algorithms providing adequate means of efficiency with acceptable security.
SN Computer Science
The explosive generation of data in the digital era directs to the requirements of effective approaches to transmit and store the data. The necessities of security and limited resources have led to the development of image encryption and compression approaches, respectively. The digital contents are transmitted over the internet which may subject to security threats. To overcome these limitations, image encryption approaches are developed. The image compression approaches result in the efficient usage of available transmission bandwidth and storage area. Image encryption and compression approach play an important role in the multimedia application that authenticates and secures the digital information. This paper covers the various approaches of image encryption and compression. To validate the performance of the approaches, evaluation metrics are projected and its significance is also discussed.
Systematic Survey on Visually Meaningful Image Encryption Techniques
IEEE Access
Due to advancements in technology, digital images are widely used in various applications like medical field, military communication, remote sensing, etc. These images may contain sensitive and confidential information. Therefore, images are required to be protected from unauthorized access. Many image protection techniques have been proposed in past years. The most common technique to protect the images is encryption. In this technique, a secret key and an encryption algorithm are used to change the plain image into an encrypted image. The encrypted image looks like a noisy image and can easily attract the attacker's attention. If an image gets captured and stacked, sensitive information can be revealed. In this regard, Visually Meaningful Encrypted Image (VMEI) technique is developed, which initially encrypts the original image and then hides it into a reference image. The final encrypted image looks like a normal image. Hence, the VMEI technique provides more security as compared to simple image encryption techniques. Therefore, a systematic survey of existing VMEI techniques is presented in this paper. The VMEI techniques are divided into different categories based on their characteristics. Moreover, this paper elaborates and investigates the improvements and analyses performed on VMEI techniques based on various evaluation parameters. These evaluation parameters are divided into different categories such as security attacks, encryption key attacks, quality analysis, and noise attacks. Finally, this paper discusses the potential applications and future challenges of VMEI techniques. INDEX TERMS Embedding, encryption, information security, visually meaningful image encryption, attacker, attacks. I. INTRODUCTION 19 Nowadays, online information storage and transmission facil-20 ities are provided by many vendors to organizations, busi-21 nesses, and other consumers. It is a better alternative to tradi-22 tional information storage and transmission methods because 23 of fast access time, easy sharing, and many other advantages. 24 Information may be in the form of a text document, digital 25 image, audio, and video [1]. Information security is essential 26 to keep it secure from unauthorized access, release, disclo-27 The associate editor coordinating the review of this manuscript and approving it for publication was Yang Liu. sure, alteration, copy, or damage, as it is an asset for any 28 organization or business [2]. 29 research opportunities are presented in the realm of this 190 survey. 191 The remaining sections of the paper are as follows: the 192 various existing VMEI techniques are presented in Section 2. 193 In Section 3, the performance measures of VMEI are 194 explained. The applications of VMEI are presented in 195 Section 4. The future research challenges and conclud-196 ing remarks are presented in Section and Section 6, 197 respectively.
2007
RC6, MRC6, and Rijndael are three block cipher algorithms. Different types of Bitmap images are encrypted with each of the three encryption algorithms. Visual inspection is not enough on judging the quality of encrypted images. So, other measuring factors are considered based on: measuring the maximum deviation between the original and the encrypted images, measuring the correlation coefficient between the encrypted and the original images, the difference between the pixel value of the original image and its corresponding pixel value of the encrypted one, the encryption time and the throughput. These measuring factors are applied on the three encryption algorithms to evaluate images containing many high frequency components and others containing very large areas of single colors as an example of binary images. The results of the nominal electronic code book are not enthusiastic, so the Cipher Block Chaining and the output feed back modes are implemented and the results are compared.
Performance Evaluation of a New AES Based Image Encryption Technique
2013
In the era of computer and internet technology, multimedia protection is becoming increasingly jeopardized. Therefore numerous ways of protecting information are being utilized by individuals, businesses and governments. This paper mainly focuses on a new AES a based image encryption technique using binary code which is expected to provide safety of images travelling over the internet. In order to evaluate the performance, the proposed image encryption technique was measured through a series of tests. These tests included a histogram analysis, information entropy, correlation analysis and differential analysis. Experimental results showed that the proposed encryption technique has satisfactory security and is more efficient than using the AES algorithm alone which makes it a good technique for the encryption of multimedia data. The results showed that the histogram of an encrypted image produced a uniform distribution, which is very different from the histogram of the plain image, a...