SlideShare a Scribd company logo
1 of 7
Download to read offline
TELKOMNIKA, Vol.17, No.6, December 2019, pp.2968~2974
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v17i6.10488 ◼ 2968
Received July 3, 2018; Revised February 5, 2019; Accepted March 12, 2019
Evaluation of the quality of an image encrytion scheme
Osemwegie Omoruyi1
, Chinonso Okereke2
, Kennedy Okokpujie*3
,
Etinosa Noma-Osaghae4
, Obinna Okoyeigbo5
, Samuel John6
1,2,3,4,5
Deparment of Electrical and Information Engineering, Covenant University Ota, Ogun State, Nigeria
6
Deparment of Electrical and Electronic Engineering, Nigerian Defence Academy Kaduna, Nigeria
*Corresponding author, e-mail: osemwegie.omoruyi@covenantuniversity.edu.ng1
,
chinonso.okereke@covenantuniversity.edu.ng2
, kennedy.okokpujie@covenantuniversity.edu.ng3
,
etinosa.noma-osaghae@covenantuniversity.edu.ng4
, obinna.okoyeigbo@covenantuniversity.edu.ng5
,
samuel.john@nda.edu.ng6
Abstract
Encryption systems have been developed for image viewing applications using the Hill Cipher
algorithm. This study aims to evaluate the image encryption quality of the Hill Cipher algorithm. Several
traditional metrics are used to evaluate the quality of the encryption scheme. Three of such metrics have
been selected for this study. These include, the Colour Histogram, the Maximum Deviation (comparing
the original image) and the Entropy Analysis of the encrypted image. Encryption quality results from all three
schemes using a variety of images show that a plain Hill Cipher approach gives a good result for all kinds of
images but is more suited for colour dense images.
Keywords: colour histogram, encryption quality, entropy analysis, Hill Cipher, image encryption
Copyright © 2019 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
Encryption schemes [1-13] are only as good as the difficulty posed in attacking its results.
This difficulty is a function of various factors dependent on the encryption scheme or method
employed. With respect to images, the difficulty of retrieving an original image [14-16] from one
that is ciphered is the clear objective in evaluating an encryption scheme’s security and
performance. Evaluation also helps in ascertaining that a good visual result is obtained for a
variety of images whilst using an encryption scheme (encrypted images must leave nothing
exposed from an original image). Another purpose of evaluating an encryption scheme is to
improve the time performance of the encryption process whilst also ensuring that its result is not
susceptible to any security attack.
This study details the evaluation of the performance and security (quality) of an encryption
scheme implemented using the Hill Cipher algorithm. A number of studies have shown that a
visual inspection is insufficient to estimate correctly the quality of an encryption scheme [17]. A
number of novel tests and analyses have been introduced and these tests have been classified
into various categories. Notably, Li et al [18] classified objective evaluation into two namely:
reference and non-reference objective evaluation. Objective evaluation is done with the reference
or original image in use whilst a non-reference evaluation does not rely on the reference image.
All evaluation however, border on measuring the randomness introduced to an image by an
encryption scheme. It may also seek to show its vulnerability to security attacks. This study is
organized as follows; section two gives an overview of quality metrics and the various types of
tests and analyses that can be carried out on an encryption scheme. Section three discusses
the implementation of the encryption quality interface. Section four outlines the results obtained
for various image types. Section 5 concludes the study.
2. Overview of Encryption Quality Analysis
This section discusses some well-known quality metrics, it includes Colour Histograms,
Encryption Quality, Maximum Deviation, Entropy Analysis etc.
TELKOMNIKA ISSN: 1693-6930 ◼
Evaluation of the quality of an image encrytion scheme (Osemwegie Omoruyi)
2969
2.1. Colour Histogram
Colour histograms are a pictorial representation of the occurrence frequency of 8 bit pixel
values showing the Red-Green-Blue (RGB) component of an image. Colour histograms give an
idea of the dominant occurring shades represented in an image. Histogram is used to show
the confusion and diffusion properties of an image encryption scheme to resist any statistical
attacks [19]. Uniform or fairly even distribution of a colour histogram show strong diffusion
properties. Also, the distribution of an encrypted image should be significantly different from that
of the original image [20]. Figure 1 shows a flow chart for obtaining the Colour Histogram.
2.2. Maximum Deviation
Maximum Deviation is obtained by computing the difference between the cipher values
and the encrypted values of the images. A three-step process is documented by El-Fishawy
et al [21] for obtaining this metric namely:
− Get the frequency of image pixels of each grayscale value in the range from 0 to 255 and for
both original and ciphered images.
− Compute the absolute difference or deviation between the original and ciphered image
pixel frequency.
− From the absolute difference obtained, calculate the sum of deviations (D) and this represents
the Maximum Deviation. D is given by (1).
𝐷 =
ℎ0+ ℎ255
2
∑ ℎ𝑖
254
𝑖=1 (1)
𝑤ℎ𝑒𝑟𝑒 ℎ𝑖 = |ℎ 𝑝𝑖 − ℎ 𝑐𝑖|
where L is the total grayscale levels and hi is the value of the difference histogram obtained from
step 2 above i.e. the deviation or absolute difference between the grayscale values of the plain
hpi and cipher image hci respectively.
2.3. Entropy Analysis
Information or Shannon entropy is a measure of the information or uncertainty in any
random system or the quantity of information in a given source [22]. Shannon’s entropy is
given as:
𝐻(𝑋) = ∑ 𝑃(𝑥𝑖) 𝑙𝑜𝑔2
1
𝑃(𝑥 𝑖)
𝐿−1
0 (2)
an ideal random source entropy is equal to 8 but most information sources seldom generate
random messages, therefore their entropy value is much smaller than the ideal one.
2.4. Encryption Quality
Encryption quality is designed to measure the change rate of pixel values when
encryption is applied to an image. The encryption quality may be expressed as the deviation
between the original and encrypted image or as the total changes in pixels values between
the plain-image and the encrypted image [23]. This is shown in (3)
𝐸𝑄 =
∑ ℎ 𝑖
𝐿−1
𝑖=0
𝐿
(3)
the gray level pixel values are used and are computed with (4):
𝐺𝐿 = 0.299 ∗ (𝑅) + 0.587 ∗ (𝐺) + 0.114 ∗ (𝐵) (4)
2.5. Irregular Deviation
The Irregular deviation factor takes a similar path as the maximum deviation factor with
only extra computations needed. In a five-step process, here’s how its obtained: D is absolute
value gotten by subtracting the values of the image pixel after encryption (I) from the value of
the image pixel before encryption (J). This is shown in (5). Figure 2 shows a flow chart for
calculating Encryption Quality, Maximum and Irregular Deviation.
◼ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 6, December 2019: 2968-2974
2970
START
INPUT IMAGE
SAMPLE
GET 8 BIT VALUE OF
RGB COMPONENT OF
EACH PIXEL
FOR L = 0 TO L-1,
READ BIT VALUE P[I]
OF RGB COMPONENT
OF EACH PIXEL
IF J = P[I] ?
IS I LESS OR
EQUAL L-1?
END
GET LENGTH OF
IMAGE
IMAGE LENGTH L =
PIXEL HEIGHT x PIXEL
WIDTH
FOR J = 0 TO 255,
WHERE J IS EACH BIT
LEVEL IN HISTOGRAM
INCREMENT F[J] BY
1; WHERE F IS AN
ARRAY OF BIT LEVEL
OCCURRENCE
NO
YES
NO
YES
START
INPUT IMAGE
SAMPLE
GET LENGTH OF
IMAGE
IMAGE LENGTH L =
PIXEL HEIGHT x PIXEL
WIDTH
GET THE HISTOGRAM
VALUES OF THE
IMAGE
FOR I = 0 TO 255
SUM = SUM + F(I)
IF I =0 or I = 255
THEN?
RES = (F(0) + F(255))/
2
MD = SUM +RES
EQ = (F(0) + F(255) +
SUM)/256
END
YES
NO
Figure 1. Flowchart of obtaining
colour histogram
Figure 2. Flowchart for calculating
encryption quality, maximum
deviation and irregular deviation
TELKOMNIKA ISSN: 1693-6930 ◼
Evaluation of the quality of an image encrytion scheme (Osemwegie Omoruyi)
2971
𝐷 = | 𝐼 − 𝐽 | (5)
DC is calculated by averaging the deviations obtained in step 1 as shown in (6).
𝐷𝐶 =
∑ 𝐷 𝑖
255
𝑖=0
256
(6)
the Irregular deviation is obtained by summing the absolute value obtained by subtracting
the individual deviation from the average value.
𝐴𝐶(𝑖) = |𝐷(𝑖) − 𝐷𝐶| (7)
𝐼𝐷 = ∑ 𝐴𝐶(𝑖)255
𝑖=0 (8)
3. Design of Encryption Quality Interface
Based on the algorithms discussed in the previous section, an encryption quality analysis
interface has been created with all four of the methods discussed. The Encryption Quality
interface has been developed in a software application already described in a previous work [24].
The algorithm to obtain the frequency of occurrence of each bit value as used in the colour
histogram is shown in Figure 1.
Figure 2 shows the flowchart for calculating both the maximum deviation and irregular
deviation algorithm. Figure 2 also shows the flow chart for deriving the encryption quality and
Figure 1 shows the flowchart for obtaining the Colour histogram. The Graphical user interface is
retained for display of histogram values as shown in Figure 3.
Figure 3. Encryption quality interface
4. Implementation and Evaluation of Results
This section presents the analysis of the results of three images: lena.jpg, pepper.jpg and
watch.jpg.
4.1. Histogram Analysis
Results from histogram analysis are presented in Figures 3 and 4. The good uniformity
of the histograms produced in Figure 4 (a), Figure 4 (b) and Figure 4 (c) confirm the result obtained
◼ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 6, December 2019: 2968-2974
2972
in a previous work; Chinonso et al [24] noted that low valued images with grey level pixels closer
to maximum bound produced much better quality with the hill cipher encryption scheme. Image
results will therefore be less prone to statistical attacks.
4.2. Maximum and Irregular Deviation
Larger values of maximum deviation indicate better encryption quality while for irregular
deviation, the smaller the better. Based on these metrics, the pepper image performs least by
both metrics while the watch image performs best in the encryption scheme based on maximum
deviation. Lena image performs best based on irregular deviation. Lower values are required for
irregular deviation. Therefore, based on the tests, it is seen that Lena image performs best and
Pepper image still performs least by this metric.
(a)
(b)
(c)
Figure 4. (RGB colour histograms of original images and encrypt ed images);
(a) lena, (b) pepper, (c) watch
TELKOMNIKA ISSN: 1693-6930 ◼
Evaluation of the quality of an image encrytion scheme (Osemwegie Omoruyi)
2973
4.3. Encryption Quality
Encryption quality shows how deviated the encrypted image is from the original as shows
in Table 1. Based on this metric, Pepper image performs least. This means that it is least deviated
from the original. While on the other hand, watch image is encrypted significantly well and is
relatively highly deviated. This means that the encryption algorithm is most effective on
the Watch image.
Table 1. Encryption Quality Metrics Obtained from Analysis
Image Size
Time Taken
(ms)
Maximum
Deviation
Entropy Encryption Quality
Irregular
Deviation
Lena 400x225 1081 57596 7.24 224.98 36636.72
Pepper 259x194 632.4 47264 6.82 184.66 42933.61
Watch 400x400 1919.3 194889 4.25 929.92 371748.48
4.4. Entropy Analysis
Based on the entropy metric, all images perform lower than the ideal random source
entropy which is 8-bit. With watch image having the lowest entropy value and Lena image having
the highest entropy value. This means that information leakage in the watch image is most
possible and Lena image least possible. It is advised that other encryption algorithms be used for
the watch image and pepper image since the encryption algorithm used is prone to entropy attack.
4.5. Key Sensitivity Analysis
Zhang et al [25] showed using a key sensitivity test where values of the key used for
image encryption was analysed to see similarities in the encrypted images produced by these
keys. Table 2 shows the observation when various image keys where tested against the Lena
image for the corresponding results. The results show metrics for ID, EQ, MD and Entropy.
The entropy remains the same for all three keys showing a similar strength. It can be seen that
keys with higher absolute determinant give better maximum deviation. However, Maximum and
irregular deviation values look significant.
Table 2. Testing with Various Keys using the Lena Image
Key
Time Taken
(ms)
Maximum
Deviation
Entropy
Encryption
Quality
Irregular
Deviation
[
11 49
187 53
] 1069.7 57816 7.24 225.84 38123.5
[
34 139
69 113
] 1078.7 57432 7.24 224.34 35882.69
[
212 187
143 25
] 1039.2 58462 7.24 228.37 37090.94
5. Acknowledgement
We acknowledge the support of Covenant University in conducting this research and
the cost of publication.
6. Conclusion
Image Encrytion schemes experience a variety of security attacks. Although these attacks
are known, the susceptibility of encryption schemes have to be effectively investigated. This study
suggests an approach to investigating the risk of image encryption schemes to some of this attack.
The hill cipher scheme shows a lot of weakness to a number of attacks as the results from
the previous section suggests. This study hopes to further evaluate using a variety of other
encryption quality metrics and the effectiveness of hill cipher approach against other algorithms
for image encryption.
References
[1] John S, Anele C, Olajide F, Kennedy CG. Real-time Fraud Detection in The Banking Sector Using Data
Mining Techniques/Algorithm. International Conference on Computational Science and Computational
Intelligence (CSCI). Las Vegas, NV, USA. 2016
◼ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 6, December 2019: 2968-2974
2974
[2] Awodele O, Okesola OJ, Okokpujie KO, Damilola F, Kuyoro A, Adebiyi A. Cryptography and
the Improvement of Security in Wireless Sensor Networks. 2018.
[3] Jiang N, Dong X, Hu H, Ji Z, Zhang W. Quantum Image Encryption Based on Henon Mapping.
International Journal of Theoretical Physics. 2019; 58(3): 979-991.
[4] Luo Y, Yu J, Lai W, Liu L. A novel chaotic image encryption algorithm based on improved baker map
and logistic map. Multimedia Tools and Applications. 2019: 1-21.
[5] Chai X, Gan Z, Yuan K, Chen Y, Liu X. A novel image encryption scheme based on DNA sequence
operations and chaotic systems. Neural Computing and Applications. 2019; 31(1): 219-237.
[6] Piao ML, Piao YL, Kim N, editors. 3D image encryption based on computer-generated hologram in
the fractional Fourier domain. Practical Holography XXXIII: Displays, Materials, and Applications.
International Society for Optics and Photonics. 2019.
[7] Gong L, Qiu K, Deng C, Zhou N. An image compression and encryption algorithm based on chaotic
system and compressive sensing. Optics & Laser Technology. 2019; 115: 257-267.
[8] Liansheng S, Xiao Z, Chongtian H, Ailing T, Asundi AK. Silhouette-free interference-based
multiple-image encryption using cascaded fractional Fourier transforms. Optics and Lasers in
Engineering. 2019; 113: 29-37.
[9] Mani P, Rajan R, Shanmugam L, Joo YH. Adaptive control for fractional order induced chaotic fuzzy
cellular neural networks and its application to image encryption. Information Sciences. 2019; 491:
74-89.
[10] Cheng Z, Haitao X, Meiqin W, Qianwen C, editors. Compressive Optical Encryption of
Three-dimensional Image. Digital Holography and Three-Dimensional Imaging. Optical Society of
America. 2019.
[11] Khan JS, Ahmad J. Chaos based efficient selective image encryption. Multidimensional Systems and
Signal Processing. 2019; 30(2): 943-961.
[12] Nardo LG, Nepomuceno EG, Arias-Garcia J, Butusov DN. Image encryption using finite-precision error.
Chaos, Solitons & Fractals. 2019; 123: 69-78.
[13] Aslam MN, Belazi A, Kharbech S, Talha M, Xiang W. Fourth Order MCA and Chaos-based Image
Encryption Scheme. IEEE Access. 2019; 7: 66395-66409.
[14] El Fishawy NF, Zaid OMA. Quality of encryption measurement of bitmap images with RC6, MRC6, and
Rijndael block cipher algorithms. IJ Network Security. 2007; 5(3): 241-251.
[15] AlQaisi A, AlTarawneh M, Alqadi ZA, Sharadqah AA. Analysis of color image features extraction using
texture methods. TELKOMNIKA Telecommunication Computing Electronics and Control. 2019; 17(3):
1220-1225.
[16] AbdelWahab OF, Hussein AI, Hamed HF, Kelash HM, Khalaf AA, Ali HM. Hiding data in images using
steganography techniques with compression algorithms. TELKOMNIKA Telecommunication
Computing Electronics and Control. 2019; 17(3): 1168-1175.
[17] Azeta J, Okokpujie IP, Okokpujie KO, Salawu EY. Analytical Study of a Road Traffic Conflict at the
T-Junction of University of Benin Main Gate. International Journal of Civil Engineering and Technology
(IJCIET). 2018; 9(8): 1048-1061.
[18] Li S, Sun W. Image encryption performance evaluation based on poker test. Advances in Multimedia.
2016.
[19] Hamid A, Ragab M, Alla OSF, Noaman AY. Encryption quality analysis of the rcbc block cipher
compared with rc6 and rc5 algorithms. 2014.
[20] Ismail IA, Amin M, Diab H. A digital image encryption algorithm based a composition of two chaotic
logistic maps. IJ Network Security. 2010; 11(1): 1-10.
[21] AL-Mousa MR, Al-salameen F, Al-Qawasmi K. Using Encryption Square Keywith One-dimensional
Matrix for Enhancing RGB Color Image Encryption-Decryption. Indonesian Journal of Electrical
Engineering and Computer Science. 2018; 9(3): 771-777
[22] Gamido HV, Sison AM, Medina RP. Implementation of Modified AES as Image Encryption Scheme.
Indonesian Journal of Electrical Engineering and Informatics (IJEEI). 2018; 6(3): 301-308.
[23] Ali-Pacha H, Hadj-Said N, Ali-Pacha A. Encryption System based on a Structured Matrix:
Vandermonde Matrix. Proceeding of the Electrical Engineering Computer Science and Informatics.
2017; 4: 503-506.
[24] Chinonso O, Omoruyi O, Okokpujie K, John S. Development of an Encrypting System for an Image
Viewer based on Hill Cipher Algorithm. Covenant Journal of Engineering Technology. 2017; 1(2):
65-73.
[25] Zhang J, Wang J, editors. A Chaos-Based Digital Image Cryptosystem with an Improved Diffusion
Strategy. Springer, Proceedings of the 9th
International Symposium on Linear Drives for Industry
Applications. 2014; 1.

More Related Content

What's hot

Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm
IJECEIAES
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
ZiadAlqady
 
Speech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal andSpeech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal and
ZiadAlqady
 

What's hot (13)

Copyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A ReviewCopyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A Review
 
Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
 
Speech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal andSpeech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal and
 
F045033440
F045033440F045033440
F045033440
 
Analysis of color image features extraction using texture methods
Analysis of color image features extraction using texture methodsAnalysis of color image features extraction using texture methods
Analysis of color image features extraction using texture methods
 
A Study on Fire Detection System using Statistic Color Model
A Study on Fire Detection System using Statistic Color ModelA Study on Fire Detection System using Statistic Color Model
A Study on Fire Detection System using Statistic Color Model
 
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
 
Phase one image steganography_batu
Phase one image steganography_batuPhase one image steganography_batu
Phase one image steganography_batu
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
E017443136
E017443136E017443136
E017443136
 

Similar to Evaluation of the quality of an image encrytion scheme

Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
ZiadAlqady
 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
ZiadAlqady
 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
ZiadAlqady
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
eSAT Journals
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
ZiadAlqady
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
ZiadAlqady
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
ZiadAlqady
 

Similar to Evaluation of the quality of an image encrytion scheme (20)

The quality of image encryption techniques by reasoned logic
The quality of image encryption techniques by reasoned logicThe quality of image encryption techniques by reasoned logic
The quality of image encryption techniques by reasoned logic
 
N017327985
N017327985N017327985
N017327985
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
 
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel ShufflingA Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
 
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
 
B017640811
B017640811B017640811
B017640811
 
Security analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digitalSecurity analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digital
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
 
Different Steganography Methods and Performance Analysis
Different Steganography Methods and Performance AnalysisDifferent Steganography Methods and Performance Analysis
Different Steganography Methods and Performance Analysis
 
New Technique for Image Encryption Based on Choas and Change of MSB
New Technique for Image Encryption Based on Choas and Change of MSBNew Technique for Image Encryption Based on Choas and Change of MSB
New Technique for Image Encryption Based on Choas and Change of MSB
 
Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA
 
Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
TELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
TELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
TELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdf
Kamal Acharya
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
drjose256
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
BalamuruganV28
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
rahulmanepalli02
 
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
Madan Karki
 

Recently uploaded (20)

NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
 
Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfSoftware Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdf
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, Functions
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 
Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdf
 
The Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptxThe Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptx
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdf
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
 
Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AI
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
 
21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 

Evaluation of the quality of an image encrytion scheme

  • 1. TELKOMNIKA, Vol.17, No.6, December 2019, pp.2968~2974 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v17i6.10488 ◼ 2968 Received July 3, 2018; Revised February 5, 2019; Accepted March 12, 2019 Evaluation of the quality of an image encrytion scheme Osemwegie Omoruyi1 , Chinonso Okereke2 , Kennedy Okokpujie*3 , Etinosa Noma-Osaghae4 , Obinna Okoyeigbo5 , Samuel John6 1,2,3,4,5 Deparment of Electrical and Information Engineering, Covenant University Ota, Ogun State, Nigeria 6 Deparment of Electrical and Electronic Engineering, Nigerian Defence Academy Kaduna, Nigeria *Corresponding author, e-mail: osemwegie.omoruyi@covenantuniversity.edu.ng1 , chinonso.okereke@covenantuniversity.edu.ng2 , kennedy.okokpujie@covenantuniversity.edu.ng3 , etinosa.noma-osaghae@covenantuniversity.edu.ng4 , obinna.okoyeigbo@covenantuniversity.edu.ng5 , samuel.john@nda.edu.ng6 Abstract Encryption systems have been developed for image viewing applications using the Hill Cipher algorithm. This study aims to evaluate the image encryption quality of the Hill Cipher algorithm. Several traditional metrics are used to evaluate the quality of the encryption scheme. Three of such metrics have been selected for this study. These include, the Colour Histogram, the Maximum Deviation (comparing the original image) and the Entropy Analysis of the encrypted image. Encryption quality results from all three schemes using a variety of images show that a plain Hill Cipher approach gives a good result for all kinds of images but is more suited for colour dense images. Keywords: colour histogram, encryption quality, entropy analysis, Hill Cipher, image encryption Copyright © 2019 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction Encryption schemes [1-13] are only as good as the difficulty posed in attacking its results. This difficulty is a function of various factors dependent on the encryption scheme or method employed. With respect to images, the difficulty of retrieving an original image [14-16] from one that is ciphered is the clear objective in evaluating an encryption scheme’s security and performance. Evaluation also helps in ascertaining that a good visual result is obtained for a variety of images whilst using an encryption scheme (encrypted images must leave nothing exposed from an original image). Another purpose of evaluating an encryption scheme is to improve the time performance of the encryption process whilst also ensuring that its result is not susceptible to any security attack. This study details the evaluation of the performance and security (quality) of an encryption scheme implemented using the Hill Cipher algorithm. A number of studies have shown that a visual inspection is insufficient to estimate correctly the quality of an encryption scheme [17]. A number of novel tests and analyses have been introduced and these tests have been classified into various categories. Notably, Li et al [18] classified objective evaluation into two namely: reference and non-reference objective evaluation. Objective evaluation is done with the reference or original image in use whilst a non-reference evaluation does not rely on the reference image. All evaluation however, border on measuring the randomness introduced to an image by an encryption scheme. It may also seek to show its vulnerability to security attacks. This study is organized as follows; section two gives an overview of quality metrics and the various types of tests and analyses that can be carried out on an encryption scheme. Section three discusses the implementation of the encryption quality interface. Section four outlines the results obtained for various image types. Section 5 concludes the study. 2. Overview of Encryption Quality Analysis This section discusses some well-known quality metrics, it includes Colour Histograms, Encryption Quality, Maximum Deviation, Entropy Analysis etc.
  • 2. TELKOMNIKA ISSN: 1693-6930 ◼ Evaluation of the quality of an image encrytion scheme (Osemwegie Omoruyi) 2969 2.1. Colour Histogram Colour histograms are a pictorial representation of the occurrence frequency of 8 bit pixel values showing the Red-Green-Blue (RGB) component of an image. Colour histograms give an idea of the dominant occurring shades represented in an image. Histogram is used to show the confusion and diffusion properties of an image encryption scheme to resist any statistical attacks [19]. Uniform or fairly even distribution of a colour histogram show strong diffusion properties. Also, the distribution of an encrypted image should be significantly different from that of the original image [20]. Figure 1 shows a flow chart for obtaining the Colour Histogram. 2.2. Maximum Deviation Maximum Deviation is obtained by computing the difference between the cipher values and the encrypted values of the images. A three-step process is documented by El-Fishawy et al [21] for obtaining this metric namely: − Get the frequency of image pixels of each grayscale value in the range from 0 to 255 and for both original and ciphered images. − Compute the absolute difference or deviation between the original and ciphered image pixel frequency. − From the absolute difference obtained, calculate the sum of deviations (D) and this represents the Maximum Deviation. D is given by (1). 𝐷 = ℎ0+ ℎ255 2 ∑ ℎ𝑖 254 𝑖=1 (1) 𝑤ℎ𝑒𝑟𝑒 ℎ𝑖 = |ℎ 𝑝𝑖 − ℎ 𝑐𝑖| where L is the total grayscale levels and hi is the value of the difference histogram obtained from step 2 above i.e. the deviation or absolute difference between the grayscale values of the plain hpi and cipher image hci respectively. 2.3. Entropy Analysis Information or Shannon entropy is a measure of the information or uncertainty in any random system or the quantity of information in a given source [22]. Shannon’s entropy is given as: 𝐻(𝑋) = ∑ 𝑃(𝑥𝑖) 𝑙𝑜𝑔2 1 𝑃(𝑥 𝑖) 𝐿−1 0 (2) an ideal random source entropy is equal to 8 but most information sources seldom generate random messages, therefore their entropy value is much smaller than the ideal one. 2.4. Encryption Quality Encryption quality is designed to measure the change rate of pixel values when encryption is applied to an image. The encryption quality may be expressed as the deviation between the original and encrypted image or as the total changes in pixels values between the plain-image and the encrypted image [23]. This is shown in (3) 𝐸𝑄 = ∑ ℎ 𝑖 𝐿−1 𝑖=0 𝐿 (3) the gray level pixel values are used and are computed with (4): 𝐺𝐿 = 0.299 ∗ (𝑅) + 0.587 ∗ (𝐺) + 0.114 ∗ (𝐵) (4) 2.5. Irregular Deviation The Irregular deviation factor takes a similar path as the maximum deviation factor with only extra computations needed. In a five-step process, here’s how its obtained: D is absolute value gotten by subtracting the values of the image pixel after encryption (I) from the value of the image pixel before encryption (J). This is shown in (5). Figure 2 shows a flow chart for calculating Encryption Quality, Maximum and Irregular Deviation.
  • 3. ◼ ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 6, December 2019: 2968-2974 2970 START INPUT IMAGE SAMPLE GET 8 BIT VALUE OF RGB COMPONENT OF EACH PIXEL FOR L = 0 TO L-1, READ BIT VALUE P[I] OF RGB COMPONENT OF EACH PIXEL IF J = P[I] ? IS I LESS OR EQUAL L-1? END GET LENGTH OF IMAGE IMAGE LENGTH L = PIXEL HEIGHT x PIXEL WIDTH FOR J = 0 TO 255, WHERE J IS EACH BIT LEVEL IN HISTOGRAM INCREMENT F[J] BY 1; WHERE F IS AN ARRAY OF BIT LEVEL OCCURRENCE NO YES NO YES START INPUT IMAGE SAMPLE GET LENGTH OF IMAGE IMAGE LENGTH L = PIXEL HEIGHT x PIXEL WIDTH GET THE HISTOGRAM VALUES OF THE IMAGE FOR I = 0 TO 255 SUM = SUM + F(I) IF I =0 or I = 255 THEN? RES = (F(0) + F(255))/ 2 MD = SUM +RES EQ = (F(0) + F(255) + SUM)/256 END YES NO Figure 1. Flowchart of obtaining colour histogram Figure 2. Flowchart for calculating encryption quality, maximum deviation and irregular deviation
  • 4. TELKOMNIKA ISSN: 1693-6930 ◼ Evaluation of the quality of an image encrytion scheme (Osemwegie Omoruyi) 2971 𝐷 = | 𝐼 − 𝐽 | (5) DC is calculated by averaging the deviations obtained in step 1 as shown in (6). 𝐷𝐶 = ∑ 𝐷 𝑖 255 𝑖=0 256 (6) the Irregular deviation is obtained by summing the absolute value obtained by subtracting the individual deviation from the average value. 𝐴𝐶(𝑖) = |𝐷(𝑖) − 𝐷𝐶| (7) 𝐼𝐷 = ∑ 𝐴𝐶(𝑖)255 𝑖=0 (8) 3. Design of Encryption Quality Interface Based on the algorithms discussed in the previous section, an encryption quality analysis interface has been created with all four of the methods discussed. The Encryption Quality interface has been developed in a software application already described in a previous work [24]. The algorithm to obtain the frequency of occurrence of each bit value as used in the colour histogram is shown in Figure 1. Figure 2 shows the flowchart for calculating both the maximum deviation and irregular deviation algorithm. Figure 2 also shows the flow chart for deriving the encryption quality and Figure 1 shows the flowchart for obtaining the Colour histogram. The Graphical user interface is retained for display of histogram values as shown in Figure 3. Figure 3. Encryption quality interface 4. Implementation and Evaluation of Results This section presents the analysis of the results of three images: lena.jpg, pepper.jpg and watch.jpg. 4.1. Histogram Analysis Results from histogram analysis are presented in Figures 3 and 4. The good uniformity of the histograms produced in Figure 4 (a), Figure 4 (b) and Figure 4 (c) confirm the result obtained
  • 5. ◼ ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 6, December 2019: 2968-2974 2972 in a previous work; Chinonso et al [24] noted that low valued images with grey level pixels closer to maximum bound produced much better quality with the hill cipher encryption scheme. Image results will therefore be less prone to statistical attacks. 4.2. Maximum and Irregular Deviation Larger values of maximum deviation indicate better encryption quality while for irregular deviation, the smaller the better. Based on these metrics, the pepper image performs least by both metrics while the watch image performs best in the encryption scheme based on maximum deviation. Lena image performs best based on irregular deviation. Lower values are required for irregular deviation. Therefore, based on the tests, it is seen that Lena image performs best and Pepper image still performs least by this metric. (a) (b) (c) Figure 4. (RGB colour histograms of original images and encrypt ed images); (a) lena, (b) pepper, (c) watch
  • 6. TELKOMNIKA ISSN: 1693-6930 ◼ Evaluation of the quality of an image encrytion scheme (Osemwegie Omoruyi) 2973 4.3. Encryption Quality Encryption quality shows how deviated the encrypted image is from the original as shows in Table 1. Based on this metric, Pepper image performs least. This means that it is least deviated from the original. While on the other hand, watch image is encrypted significantly well and is relatively highly deviated. This means that the encryption algorithm is most effective on the Watch image. Table 1. Encryption Quality Metrics Obtained from Analysis Image Size Time Taken (ms) Maximum Deviation Entropy Encryption Quality Irregular Deviation Lena 400x225 1081 57596 7.24 224.98 36636.72 Pepper 259x194 632.4 47264 6.82 184.66 42933.61 Watch 400x400 1919.3 194889 4.25 929.92 371748.48 4.4. Entropy Analysis Based on the entropy metric, all images perform lower than the ideal random source entropy which is 8-bit. With watch image having the lowest entropy value and Lena image having the highest entropy value. This means that information leakage in the watch image is most possible and Lena image least possible. It is advised that other encryption algorithms be used for the watch image and pepper image since the encryption algorithm used is prone to entropy attack. 4.5. Key Sensitivity Analysis Zhang et al [25] showed using a key sensitivity test where values of the key used for image encryption was analysed to see similarities in the encrypted images produced by these keys. Table 2 shows the observation when various image keys where tested against the Lena image for the corresponding results. The results show metrics for ID, EQ, MD and Entropy. The entropy remains the same for all three keys showing a similar strength. It can be seen that keys with higher absolute determinant give better maximum deviation. However, Maximum and irregular deviation values look significant. Table 2. Testing with Various Keys using the Lena Image Key Time Taken (ms) Maximum Deviation Entropy Encryption Quality Irregular Deviation [ 11 49 187 53 ] 1069.7 57816 7.24 225.84 38123.5 [ 34 139 69 113 ] 1078.7 57432 7.24 224.34 35882.69 [ 212 187 143 25 ] 1039.2 58462 7.24 228.37 37090.94 5. Acknowledgement We acknowledge the support of Covenant University in conducting this research and the cost of publication. 6. Conclusion Image Encrytion schemes experience a variety of security attacks. Although these attacks are known, the susceptibility of encryption schemes have to be effectively investigated. This study suggests an approach to investigating the risk of image encryption schemes to some of this attack. The hill cipher scheme shows a lot of weakness to a number of attacks as the results from the previous section suggests. This study hopes to further evaluate using a variety of other encryption quality metrics and the effectiveness of hill cipher approach against other algorithms for image encryption. References [1] John S, Anele C, Olajide F, Kennedy CG. Real-time Fraud Detection in The Banking Sector Using Data Mining Techniques/Algorithm. International Conference on Computational Science and Computational Intelligence (CSCI). Las Vegas, NV, USA. 2016
  • 7. ◼ ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 6, December 2019: 2968-2974 2974 [2] Awodele O, Okesola OJ, Okokpujie KO, Damilola F, Kuyoro A, Adebiyi A. Cryptography and the Improvement of Security in Wireless Sensor Networks. 2018. [3] Jiang N, Dong X, Hu H, Ji Z, Zhang W. Quantum Image Encryption Based on Henon Mapping. International Journal of Theoretical Physics. 2019; 58(3): 979-991. [4] Luo Y, Yu J, Lai W, Liu L. A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimedia Tools and Applications. 2019: 1-21. [5] Chai X, Gan Z, Yuan K, Chen Y, Liu X. A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Computing and Applications. 2019; 31(1): 219-237. [6] Piao ML, Piao YL, Kim N, editors. 3D image encryption based on computer-generated hologram in the fractional Fourier domain. Practical Holography XXXIII: Displays, Materials, and Applications. International Society for Optics and Photonics. 2019. [7] Gong L, Qiu K, Deng C, Zhou N. An image compression and encryption algorithm based on chaotic system and compressive sensing. Optics & Laser Technology. 2019; 115: 257-267. [8] Liansheng S, Xiao Z, Chongtian H, Ailing T, Asundi AK. Silhouette-free interference-based multiple-image encryption using cascaded fractional Fourier transforms. Optics and Lasers in Engineering. 2019; 113: 29-37. [9] Mani P, Rajan R, Shanmugam L, Joo YH. Adaptive control for fractional order induced chaotic fuzzy cellular neural networks and its application to image encryption. Information Sciences. 2019; 491: 74-89. [10] Cheng Z, Haitao X, Meiqin W, Qianwen C, editors. Compressive Optical Encryption of Three-dimensional Image. Digital Holography and Three-Dimensional Imaging. Optical Society of America. 2019. [11] Khan JS, Ahmad J. Chaos based efficient selective image encryption. Multidimensional Systems and Signal Processing. 2019; 30(2): 943-961. [12] Nardo LG, Nepomuceno EG, Arias-Garcia J, Butusov DN. Image encryption using finite-precision error. Chaos, Solitons & Fractals. 2019; 123: 69-78. [13] Aslam MN, Belazi A, Kharbech S, Talha M, Xiang W. Fourth Order MCA and Chaos-based Image Encryption Scheme. IEEE Access. 2019; 7: 66395-66409. [14] El Fishawy NF, Zaid OMA. Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms. IJ Network Security. 2007; 5(3): 241-251. [15] AlQaisi A, AlTarawneh M, Alqadi ZA, Sharadqah AA. Analysis of color image features extraction using texture methods. TELKOMNIKA Telecommunication Computing Electronics and Control. 2019; 17(3): 1220-1225. [16] AbdelWahab OF, Hussein AI, Hamed HF, Kelash HM, Khalaf AA, Ali HM. Hiding data in images using steganography techniques with compression algorithms. TELKOMNIKA Telecommunication Computing Electronics and Control. 2019; 17(3): 1168-1175. [17] Azeta J, Okokpujie IP, Okokpujie KO, Salawu EY. Analytical Study of a Road Traffic Conflict at the T-Junction of University of Benin Main Gate. International Journal of Civil Engineering and Technology (IJCIET). 2018; 9(8): 1048-1061. [18] Li S, Sun W. Image encryption performance evaluation based on poker test. Advances in Multimedia. 2016. [19] Hamid A, Ragab M, Alla OSF, Noaman AY. Encryption quality analysis of the rcbc block cipher compared with rc6 and rc5 algorithms. 2014. [20] Ismail IA, Amin M, Diab H. A digital image encryption algorithm based a composition of two chaotic logistic maps. IJ Network Security. 2010; 11(1): 1-10. [21] AL-Mousa MR, Al-salameen F, Al-Qawasmi K. Using Encryption Square Keywith One-dimensional Matrix for Enhancing RGB Color Image Encryption-Decryption. Indonesian Journal of Electrical Engineering and Computer Science. 2018; 9(3): 771-777 [22] Gamido HV, Sison AM, Medina RP. Implementation of Modified AES as Image Encryption Scheme. Indonesian Journal of Electrical Engineering and Informatics (IJEEI). 2018; 6(3): 301-308. [23] Ali-Pacha H, Hadj-Said N, Ali-Pacha A. Encryption System based on a Structured Matrix: Vandermonde Matrix. Proceeding of the Electrical Engineering Computer Science and Informatics. 2017; 4: 503-506. [24] Chinonso O, Omoruyi O, Okokpujie K, John S. Development of an Encrypting System for an Image Viewer based on Hill Cipher Algorithm. Covenant Journal of Engineering Technology. 2017; 1(2): 65-73. [25] Zhang J, Wang J, editors. A Chaos-Based Digital Image Cryptosystem with an Improved Diffusion Strategy. Springer, Proceedings of the 9th International Symposium on Linear Drives for Industry Applications. 2014; 1.