SlideShare a Scribd company logo
TELKOMNIKA, Vol.17, No.6, December 2019, pp.2968~2974
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v17i6.10488 ◼ 2968
Received July 3, 2018; Revised February 5, 2019; Accepted March 12, 2019
Evaluation of the quality of an image encrytion scheme
Osemwegie Omoruyi1
, Chinonso Okereke2
, Kennedy Okokpujie*3
,
Etinosa Noma-Osaghae4
, Obinna Okoyeigbo5
, Samuel John6
1,2,3,4,5
Deparment of Electrical and Information Engineering, Covenant University Ota, Ogun State, Nigeria
6
Deparment of Electrical and Electronic Engineering, Nigerian Defence Academy Kaduna, Nigeria
*Corresponding author, e-mail: osemwegie.omoruyi@covenantuniversity.edu.ng1
,
chinonso.okereke@covenantuniversity.edu.ng2
, kennedy.okokpujie@covenantuniversity.edu.ng3
,
etinosa.noma-osaghae@covenantuniversity.edu.ng4
, obinna.okoyeigbo@covenantuniversity.edu.ng5
,
samuel.john@nda.edu.ng6
Abstract
Encryption systems have been developed for image viewing applications using the Hill Cipher
algorithm. This study aims to evaluate the image encryption quality of the Hill Cipher algorithm. Several
traditional metrics are used to evaluate the quality of the encryption scheme. Three of such metrics have
been selected for this study. These include, the Colour Histogram, the Maximum Deviation (comparing
the original image) and the Entropy Analysis of the encrypted image. Encryption quality results from all three
schemes using a variety of images show that a plain Hill Cipher approach gives a good result for all kinds of
images but is more suited for colour dense images.
Keywords: colour histogram, encryption quality, entropy analysis, Hill Cipher, image encryption
Copyright © 2019 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
Encryption schemes [1-13] are only as good as the difficulty posed in attacking its results.
This difficulty is a function of various factors dependent on the encryption scheme or method
employed. With respect to images, the difficulty of retrieving an original image [14-16] from one
that is ciphered is the clear objective in evaluating an encryption scheme’s security and
performance. Evaluation also helps in ascertaining that a good visual result is obtained for a
variety of images whilst using an encryption scheme (encrypted images must leave nothing
exposed from an original image). Another purpose of evaluating an encryption scheme is to
improve the time performance of the encryption process whilst also ensuring that its result is not
susceptible to any security attack.
This study details the evaluation of the performance and security (quality) of an encryption
scheme implemented using the Hill Cipher algorithm. A number of studies have shown that a
visual inspection is insufficient to estimate correctly the quality of an encryption scheme [17]. A
number of novel tests and analyses have been introduced and these tests have been classified
into various categories. Notably, Li et al [18] classified objective evaluation into two namely:
reference and non-reference objective evaluation. Objective evaluation is done with the reference
or original image in use whilst a non-reference evaluation does not rely on the reference image.
All evaluation however, border on measuring the randomness introduced to an image by an
encryption scheme. It may also seek to show its vulnerability to security attacks. This study is
organized as follows; section two gives an overview of quality metrics and the various types of
tests and analyses that can be carried out on an encryption scheme. Section three discusses
the implementation of the encryption quality interface. Section four outlines the results obtained
for various image types. Section 5 concludes the study.
2. Overview of Encryption Quality Analysis
This section discusses some well-known quality metrics, it includes Colour Histograms,
Encryption Quality, Maximum Deviation, Entropy Analysis etc.
TELKOMNIKA ISSN: 1693-6930 ◼
Evaluation of the quality of an image encrytion scheme (Osemwegie Omoruyi)
2969
2.1. Colour Histogram
Colour histograms are a pictorial representation of the occurrence frequency of 8 bit pixel
values showing the Red-Green-Blue (RGB) component of an image. Colour histograms give an
idea of the dominant occurring shades represented in an image. Histogram is used to show
the confusion and diffusion properties of an image encryption scheme to resist any statistical
attacks [19]. Uniform or fairly even distribution of a colour histogram show strong diffusion
properties. Also, the distribution of an encrypted image should be significantly different from that
of the original image [20]. Figure 1 shows a flow chart for obtaining the Colour Histogram.
2.2. Maximum Deviation
Maximum Deviation is obtained by computing the difference between the cipher values
and the encrypted values of the images. A three-step process is documented by El-Fishawy
et al [21] for obtaining this metric namely:
− Get the frequency of image pixels of each grayscale value in the range from 0 to 255 and for
both original and ciphered images.
− Compute the absolute difference or deviation between the original and ciphered image
pixel frequency.
− From the absolute difference obtained, calculate the sum of deviations (D) and this represents
the Maximum Deviation. D is given by (1).
𝐷 =
ℎ0+ ℎ255
2
∑ ℎ𝑖
254
𝑖=1 (1)
𝑤ℎ𝑒𝑟𝑒 ℎ𝑖 = |ℎ 𝑝𝑖 − ℎ 𝑐𝑖|
where L is the total grayscale levels and hi is the value of the difference histogram obtained from
step 2 above i.e. the deviation or absolute difference between the grayscale values of the plain
hpi and cipher image hci respectively.
2.3. Entropy Analysis
Information or Shannon entropy is a measure of the information or uncertainty in any
random system or the quantity of information in a given source [22]. Shannon’s entropy is
given as:
𝐻(𝑋) = ∑ 𝑃(𝑥𝑖) 𝑙𝑜𝑔2
1
𝑃(𝑥 𝑖)
𝐿−1
0 (2)
an ideal random source entropy is equal to 8 but most information sources seldom generate
random messages, therefore their entropy value is much smaller than the ideal one.
2.4. Encryption Quality
Encryption quality is designed to measure the change rate of pixel values when
encryption is applied to an image. The encryption quality may be expressed as the deviation
between the original and encrypted image or as the total changes in pixels values between
the plain-image and the encrypted image [23]. This is shown in (3)
𝐸𝑄 =
∑ ℎ 𝑖
𝐿−1
𝑖=0
𝐿
(3)
the gray level pixel values are used and are computed with (4):
𝐺𝐿 = 0.299 ∗ (𝑅) + 0.587 ∗ (𝐺) + 0.114 ∗ (𝐵) (4)
2.5. Irregular Deviation
The Irregular deviation factor takes a similar path as the maximum deviation factor with
only extra computations needed. In a five-step process, here’s how its obtained: D is absolute
value gotten by subtracting the values of the image pixel after encryption (I) from the value of
the image pixel before encryption (J). This is shown in (5). Figure 2 shows a flow chart for
calculating Encryption Quality, Maximum and Irregular Deviation.
◼ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 6, December 2019: 2968-2974
2970
START
INPUT IMAGE
SAMPLE
GET 8 BIT VALUE OF
RGB COMPONENT OF
EACH PIXEL
FOR L = 0 TO L-1,
READ BIT VALUE P[I]
OF RGB COMPONENT
OF EACH PIXEL
IF J = P[I] ?
IS I LESS OR
EQUAL L-1?
END
GET LENGTH OF
IMAGE
IMAGE LENGTH L =
PIXEL HEIGHT x PIXEL
WIDTH
FOR J = 0 TO 255,
WHERE J IS EACH BIT
LEVEL IN HISTOGRAM
INCREMENT F[J] BY
1; WHERE F IS AN
ARRAY OF BIT LEVEL
OCCURRENCE
NO
YES
NO
YES
START
INPUT IMAGE
SAMPLE
GET LENGTH OF
IMAGE
IMAGE LENGTH L =
PIXEL HEIGHT x PIXEL
WIDTH
GET THE HISTOGRAM
VALUES OF THE
IMAGE
FOR I = 0 TO 255
SUM = SUM + F(I)
IF I =0 or I = 255
THEN?
RES = (F(0) + F(255))/
2
MD = SUM +RES
EQ = (F(0) + F(255) +
SUM)/256
END
YES
NO
Figure 1. Flowchart of obtaining
colour histogram
Figure 2. Flowchart for calculating
encryption quality, maximum
deviation and irregular deviation
TELKOMNIKA ISSN: 1693-6930 ◼
Evaluation of the quality of an image encrytion scheme (Osemwegie Omoruyi)
2971
𝐷 = | 𝐼 − 𝐽 | (5)
DC is calculated by averaging the deviations obtained in step 1 as shown in (6).
𝐷𝐶 =
∑ 𝐷 𝑖
255
𝑖=0
256
(6)
the Irregular deviation is obtained by summing the absolute value obtained by subtracting
the individual deviation from the average value.
𝐴𝐶(𝑖) = |𝐷(𝑖) − 𝐷𝐶| (7)
𝐼𝐷 = ∑ 𝐴𝐶(𝑖)255
𝑖=0 (8)
3. Design of Encryption Quality Interface
Based on the algorithms discussed in the previous section, an encryption quality analysis
interface has been created with all four of the methods discussed. The Encryption Quality
interface has been developed in a software application already described in a previous work [24].
The algorithm to obtain the frequency of occurrence of each bit value as used in the colour
histogram is shown in Figure 1.
Figure 2 shows the flowchart for calculating both the maximum deviation and irregular
deviation algorithm. Figure 2 also shows the flow chart for deriving the encryption quality and
Figure 1 shows the flowchart for obtaining the Colour histogram. The Graphical user interface is
retained for display of histogram values as shown in Figure 3.
Figure 3. Encryption quality interface
4. Implementation and Evaluation of Results
This section presents the analysis of the results of three images: lena.jpg, pepper.jpg and
watch.jpg.
4.1. Histogram Analysis
Results from histogram analysis are presented in Figures 3 and 4. The good uniformity
of the histograms produced in Figure 4 (a), Figure 4 (b) and Figure 4 (c) confirm the result obtained
◼ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 6, December 2019: 2968-2974
2972
in a previous work; Chinonso et al [24] noted that low valued images with grey level pixels closer
to maximum bound produced much better quality with the hill cipher encryption scheme. Image
results will therefore be less prone to statistical attacks.
4.2. Maximum and Irregular Deviation
Larger values of maximum deviation indicate better encryption quality while for irregular
deviation, the smaller the better. Based on these metrics, the pepper image performs least by
both metrics while the watch image performs best in the encryption scheme based on maximum
deviation. Lena image performs best based on irregular deviation. Lower values are required for
irregular deviation. Therefore, based on the tests, it is seen that Lena image performs best and
Pepper image still performs least by this metric.
(a)
(b)
(c)
Figure 4. (RGB colour histograms of original images and encrypt ed images);
(a) lena, (b) pepper, (c) watch
TELKOMNIKA ISSN: 1693-6930 ◼
Evaluation of the quality of an image encrytion scheme (Osemwegie Omoruyi)
2973
4.3. Encryption Quality
Encryption quality shows how deviated the encrypted image is from the original as shows
in Table 1. Based on this metric, Pepper image performs least. This means that it is least deviated
from the original. While on the other hand, watch image is encrypted significantly well and is
relatively highly deviated. This means that the encryption algorithm is most effective on
the Watch image.
Table 1. Encryption Quality Metrics Obtained from Analysis
Image Size
Time Taken
(ms)
Maximum
Deviation
Entropy Encryption Quality
Irregular
Deviation
Lena 400x225 1081 57596 7.24 224.98 36636.72
Pepper 259x194 632.4 47264 6.82 184.66 42933.61
Watch 400x400 1919.3 194889 4.25 929.92 371748.48
4.4. Entropy Analysis
Based on the entropy metric, all images perform lower than the ideal random source
entropy which is 8-bit. With watch image having the lowest entropy value and Lena image having
the highest entropy value. This means that information leakage in the watch image is most
possible and Lena image least possible. It is advised that other encryption algorithms be used for
the watch image and pepper image since the encryption algorithm used is prone to entropy attack.
4.5. Key Sensitivity Analysis
Zhang et al [25] showed using a key sensitivity test where values of the key used for
image encryption was analysed to see similarities in the encrypted images produced by these
keys. Table 2 shows the observation when various image keys where tested against the Lena
image for the corresponding results. The results show metrics for ID, EQ, MD and Entropy.
The entropy remains the same for all three keys showing a similar strength. It can be seen that
keys with higher absolute determinant give better maximum deviation. However, Maximum and
irregular deviation values look significant.
Table 2. Testing with Various Keys using the Lena Image
Key
Time Taken
(ms)
Maximum
Deviation
Entropy
Encryption
Quality
Irregular
Deviation
[
11 49
187 53
] 1069.7 57816 7.24 225.84 38123.5
[
34 139
69 113
] 1078.7 57432 7.24 224.34 35882.69
[
212 187
143 25
] 1039.2 58462 7.24 228.37 37090.94
5. Acknowledgement
We acknowledge the support of Covenant University in conducting this research and
the cost of publication.
6. Conclusion
Image Encrytion schemes experience a variety of security attacks. Although these attacks
are known, the susceptibility of encryption schemes have to be effectively investigated. This study
suggests an approach to investigating the risk of image encryption schemes to some of this attack.
The hill cipher scheme shows a lot of weakness to a number of attacks as the results from
the previous section suggests. This study hopes to further evaluate using a variety of other
encryption quality metrics and the effectiveness of hill cipher approach against other algorithms
for image encryption.
References
[1] John S, Anele C, Olajide F, Kennedy CG. Real-time Fraud Detection in The Banking Sector Using Data
Mining Techniques/Algorithm. International Conference on Computational Science and Computational
Intelligence (CSCI). Las Vegas, NV, USA. 2016
◼ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 6, December 2019: 2968-2974
2974
[2] Awodele O, Okesola OJ, Okokpujie KO, Damilola F, Kuyoro A, Adebiyi A. Cryptography and
the Improvement of Security in Wireless Sensor Networks. 2018.
[3] Jiang N, Dong X, Hu H, Ji Z, Zhang W. Quantum Image Encryption Based on Henon Mapping.
International Journal of Theoretical Physics. 2019; 58(3): 979-991.
[4] Luo Y, Yu J, Lai W, Liu L. A novel chaotic image encryption algorithm based on improved baker map
and logistic map. Multimedia Tools and Applications. 2019: 1-21.
[5] Chai X, Gan Z, Yuan K, Chen Y, Liu X. A novel image encryption scheme based on DNA sequence
operations and chaotic systems. Neural Computing and Applications. 2019; 31(1): 219-237.
[6] Piao ML, Piao YL, Kim N, editors. 3D image encryption based on computer-generated hologram in
the fractional Fourier domain. Practical Holography XXXIII: Displays, Materials, and Applications.
International Society for Optics and Photonics. 2019.
[7] Gong L, Qiu K, Deng C, Zhou N. An image compression and encryption algorithm based on chaotic
system and compressive sensing. Optics & Laser Technology. 2019; 115: 257-267.
[8] Liansheng S, Xiao Z, Chongtian H, Ailing T, Asundi AK. Silhouette-free interference-based
multiple-image encryption using cascaded fractional Fourier transforms. Optics and Lasers in
Engineering. 2019; 113: 29-37.
[9] Mani P, Rajan R, Shanmugam L, Joo YH. Adaptive control for fractional order induced chaotic fuzzy
cellular neural networks and its application to image encryption. Information Sciences. 2019; 491:
74-89.
[10] Cheng Z, Haitao X, Meiqin W, Qianwen C, editors. Compressive Optical Encryption of
Three-dimensional Image. Digital Holography and Three-Dimensional Imaging. Optical Society of
America. 2019.
[11] Khan JS, Ahmad J. Chaos based efficient selective image encryption. Multidimensional Systems and
Signal Processing. 2019; 30(2): 943-961.
[12] Nardo LG, Nepomuceno EG, Arias-Garcia J, Butusov DN. Image encryption using finite-precision error.
Chaos, Solitons & Fractals. 2019; 123: 69-78.
[13] Aslam MN, Belazi A, Kharbech S, Talha M, Xiang W. Fourth Order MCA and Chaos-based Image
Encryption Scheme. IEEE Access. 2019; 7: 66395-66409.
[14] El Fishawy NF, Zaid OMA. Quality of encryption measurement of bitmap images with RC6, MRC6, and
Rijndael block cipher algorithms. IJ Network Security. 2007; 5(3): 241-251.
[15] AlQaisi A, AlTarawneh M, Alqadi ZA, Sharadqah AA. Analysis of color image features extraction using
texture methods. TELKOMNIKA Telecommunication Computing Electronics and Control. 2019; 17(3):
1220-1225.
[16] AbdelWahab OF, Hussein AI, Hamed HF, Kelash HM, Khalaf AA, Ali HM. Hiding data in images using
steganography techniques with compression algorithms. TELKOMNIKA Telecommunication
Computing Electronics and Control. 2019; 17(3): 1168-1175.
[17] Azeta J, Okokpujie IP, Okokpujie KO, Salawu EY. Analytical Study of a Road Traffic Conflict at the
T-Junction of University of Benin Main Gate. International Journal of Civil Engineering and Technology
(IJCIET). 2018; 9(8): 1048-1061.
[18] Li S, Sun W. Image encryption performance evaluation based on poker test. Advances in Multimedia.
2016.
[19] Hamid A, Ragab M, Alla OSF, Noaman AY. Encryption quality analysis of the rcbc block cipher
compared with rc6 and rc5 algorithms. 2014.
[20] Ismail IA, Amin M, Diab H. A digital image encryption algorithm based a composition of two chaotic
logistic maps. IJ Network Security. 2010; 11(1): 1-10.
[21] AL-Mousa MR, Al-salameen F, Al-Qawasmi K. Using Encryption Square Keywith One-dimensional
Matrix for Enhancing RGB Color Image Encryption-Decryption. Indonesian Journal of Electrical
Engineering and Computer Science. 2018; 9(3): 771-777
[22] Gamido HV, Sison AM, Medina RP. Implementation of Modified AES as Image Encryption Scheme.
Indonesian Journal of Electrical Engineering and Informatics (IJEEI). 2018; 6(3): 301-308.
[23] Ali-Pacha H, Hadj-Said N, Ali-Pacha A. Encryption System based on a Structured Matrix:
Vandermonde Matrix. Proceeding of the Electrical Engineering Computer Science and Informatics.
2017; 4: 503-506.
[24] Chinonso O, Omoruyi O, Okokpujie K, John S. Development of an Encrypting System for an Image
Viewer based on Hill Cipher Algorithm. Covenant Journal of Engineering Technology. 2017; 1(2):
65-73.
[25] Zhang J, Wang J, editors. A Chaos-Based Digital Image Cryptosystem with an Improved Diffusion
Strategy. Springer, Proceedings of the 9th
International Symposium on Linear Drives for Industry
Applications. 2014; 1.

More Related Content

What's hot

Copyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A ReviewCopyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A Review
iosrjce
 
Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm
IJECEIAES
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
ZiadAlqady
 
Speech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal andSpeech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal and
ZiadAlqady
 
F045033440
F045033440F045033440
F045033440
IJERA Editor
 
Analysis of color image features extraction using texture methods
Analysis of color image features extraction using texture methodsAnalysis of color image features extraction using texture methods
Analysis of color image features extraction using texture methods
TELKOMNIKA JOURNAL
 
A Study on Fire Detection System using Statistic Color Model
A Study on Fire Detection System using Statistic Color ModelA Study on Fire Detection System using Statistic Color Model
A Study on Fire Detection System using Statistic Color Model
IOSR Journals
 
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...
IJNSA Journal
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
ijait
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
IJARIIT
 
Phase one image steganography_batu
Phase one image steganography_batuPhase one image steganography_batu
Phase one image steganography_batu
ABHIJEET KHIRE
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ijcsit
 
E017443136
E017443136E017443136
E017443136
IOSR Journals
 

What's hot (13)

Copyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A ReviewCopyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A Review
 
Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
 
Speech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal andSpeech signal encryption decryption using noise signal and
Speech signal encryption decryption using noise signal and
 
F045033440
F045033440F045033440
F045033440
 
Analysis of color image features extraction using texture methods
Analysis of color image features extraction using texture methodsAnalysis of color image features extraction using texture methods
Analysis of color image features extraction using texture methods
 
A Study on Fire Detection System using Statistic Color Model
A Study on Fire Detection System using Statistic Color ModelA Study on Fire Detection System using Statistic Color Model
A Study on Fire Detection System using Statistic Color Model
 
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...
Digital Watermarking through Embedding of Encrypted and Arithmetically Compre...
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
 
Phase one image steganography_batu
Phase one image steganography_batuPhase one image steganography_batu
Phase one image steganography_batu
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
E017443136
E017443136E017443136
E017443136
 

Similar to Evaluation of the quality of an image encrytion scheme

The quality of image encryption techniques by reasoned logic
The quality of image encryption techniques by reasoned logicThe quality of image encryption techniques by reasoned logic
The quality of image encryption techniques by reasoned logic
TELKOMNIKA JOURNAL
 
N017327985
N017327985N017327985
N017327985
IOSR Journals
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET Journal
 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
ZiadAlqady
 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
ZiadAlqady
 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
ZiadAlqady
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
ijcseit
 
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel ShufflingA Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
IJMTST Journal
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
eSAT Journals
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
ZiadAlqady
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
ZiadAlqady
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
ZiadAlqady
 
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
iosrjce
 
B017640811
B017640811B017640811
B017640811
IOSR Journals
 
Security analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digitalSecurity analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digital
eSAT Publishing House
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
ijsrd.com
 
Different Steganography Methods and Performance Analysis
Different Steganography Methods and Performance AnalysisDifferent Steganography Methods and Performance Analysis
Different Steganography Methods and Performance Analysis
International Journal of Engineering Inventions www.ijeijournal.com
 
New Technique for Image Encryption Based on Choas and Change of MSB
New Technique for Image Encryption Based on Choas and Change of MSBNew Technique for Image Encryption Based on Choas and Change of MSB
New Technique for Image Encryption Based on Choas and Change of MSB
Editor IJCATR
 
Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA
IOSR Journals
 
C010111519
C010111519C010111519
C010111519
IOSR Journals
 

Similar to Evaluation of the quality of an image encrytion scheme (20)

The quality of image encryption techniques by reasoned logic
The quality of image encryption techniques by reasoned logicThe quality of image encryption techniques by reasoned logic
The quality of image encryption techniques by reasoned logic
 
N017327985
N017327985N017327985
N017327985
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
 
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel ShufflingA Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
 
A survey of rgb color image
A survey of rgb color imageA survey of rgb color image
A survey of rgb color image
 
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and...
 
B017640811
B017640811B017640811
B017640811
 
Security analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digitalSecurity analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digital
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
 
Different Steganography Methods and Performance Analysis
Different Steganography Methods and Performance AnalysisDifferent Steganography Methods and Performance Analysis
Different Steganography Methods and Performance Analysis
 
New Technique for Image Encryption Based on Choas and Change of MSB
New Technique for Image Encryption Based on Choas and Change of MSBNew Technique for Image Encryption Based on Choas and Change of MSB
New Technique for Image Encryption Based on Choas and Change of MSB
 
Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA
 
C010111519
C010111519C010111519
C010111519
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
TELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
TELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
TELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
TELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
TELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
TELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
TELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
TELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
TELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
edwin408357
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
PIMR BHOPAL
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
PKavitha10
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
bijceesjournal
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
Prakhyath Rai
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
Gas agency management system project report.pdf
Gas agency management system project report.pdfGas agency management system project report.pdf
Gas agency management system project report.pdf
Kamal Acharya
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 

Recently uploaded (20)

Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
Gas agency management system project report.pdf
Gas agency management system project report.pdfGas agency management system project report.pdf
Gas agency management system project report.pdf
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 

Evaluation of the quality of an image encrytion scheme

  • 1. TELKOMNIKA, Vol.17, No.6, December 2019, pp.2968~2974 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v17i6.10488 ◼ 2968 Received July 3, 2018; Revised February 5, 2019; Accepted March 12, 2019 Evaluation of the quality of an image encrytion scheme Osemwegie Omoruyi1 , Chinonso Okereke2 , Kennedy Okokpujie*3 , Etinosa Noma-Osaghae4 , Obinna Okoyeigbo5 , Samuel John6 1,2,3,4,5 Deparment of Electrical and Information Engineering, Covenant University Ota, Ogun State, Nigeria 6 Deparment of Electrical and Electronic Engineering, Nigerian Defence Academy Kaduna, Nigeria *Corresponding author, e-mail: osemwegie.omoruyi@covenantuniversity.edu.ng1 , chinonso.okereke@covenantuniversity.edu.ng2 , kennedy.okokpujie@covenantuniversity.edu.ng3 , etinosa.noma-osaghae@covenantuniversity.edu.ng4 , obinna.okoyeigbo@covenantuniversity.edu.ng5 , samuel.john@nda.edu.ng6 Abstract Encryption systems have been developed for image viewing applications using the Hill Cipher algorithm. This study aims to evaluate the image encryption quality of the Hill Cipher algorithm. Several traditional metrics are used to evaluate the quality of the encryption scheme. Three of such metrics have been selected for this study. These include, the Colour Histogram, the Maximum Deviation (comparing the original image) and the Entropy Analysis of the encrypted image. Encryption quality results from all three schemes using a variety of images show that a plain Hill Cipher approach gives a good result for all kinds of images but is more suited for colour dense images. Keywords: colour histogram, encryption quality, entropy analysis, Hill Cipher, image encryption Copyright © 2019 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction Encryption schemes [1-13] are only as good as the difficulty posed in attacking its results. This difficulty is a function of various factors dependent on the encryption scheme or method employed. With respect to images, the difficulty of retrieving an original image [14-16] from one that is ciphered is the clear objective in evaluating an encryption scheme’s security and performance. Evaluation also helps in ascertaining that a good visual result is obtained for a variety of images whilst using an encryption scheme (encrypted images must leave nothing exposed from an original image). Another purpose of evaluating an encryption scheme is to improve the time performance of the encryption process whilst also ensuring that its result is not susceptible to any security attack. This study details the evaluation of the performance and security (quality) of an encryption scheme implemented using the Hill Cipher algorithm. A number of studies have shown that a visual inspection is insufficient to estimate correctly the quality of an encryption scheme [17]. A number of novel tests and analyses have been introduced and these tests have been classified into various categories. Notably, Li et al [18] classified objective evaluation into two namely: reference and non-reference objective evaluation. Objective evaluation is done with the reference or original image in use whilst a non-reference evaluation does not rely on the reference image. All evaluation however, border on measuring the randomness introduced to an image by an encryption scheme. It may also seek to show its vulnerability to security attacks. This study is organized as follows; section two gives an overview of quality metrics and the various types of tests and analyses that can be carried out on an encryption scheme. Section three discusses the implementation of the encryption quality interface. Section four outlines the results obtained for various image types. Section 5 concludes the study. 2. Overview of Encryption Quality Analysis This section discusses some well-known quality metrics, it includes Colour Histograms, Encryption Quality, Maximum Deviation, Entropy Analysis etc.
  • 2. TELKOMNIKA ISSN: 1693-6930 ◼ Evaluation of the quality of an image encrytion scheme (Osemwegie Omoruyi) 2969 2.1. Colour Histogram Colour histograms are a pictorial representation of the occurrence frequency of 8 bit pixel values showing the Red-Green-Blue (RGB) component of an image. Colour histograms give an idea of the dominant occurring shades represented in an image. Histogram is used to show the confusion and diffusion properties of an image encryption scheme to resist any statistical attacks [19]. Uniform or fairly even distribution of a colour histogram show strong diffusion properties. Also, the distribution of an encrypted image should be significantly different from that of the original image [20]. Figure 1 shows a flow chart for obtaining the Colour Histogram. 2.2. Maximum Deviation Maximum Deviation is obtained by computing the difference between the cipher values and the encrypted values of the images. A three-step process is documented by El-Fishawy et al [21] for obtaining this metric namely: − Get the frequency of image pixels of each grayscale value in the range from 0 to 255 and for both original and ciphered images. − Compute the absolute difference or deviation between the original and ciphered image pixel frequency. − From the absolute difference obtained, calculate the sum of deviations (D) and this represents the Maximum Deviation. D is given by (1). 𝐷 = ℎ0+ ℎ255 2 ∑ ℎ𝑖 254 𝑖=1 (1) 𝑤ℎ𝑒𝑟𝑒 ℎ𝑖 = |ℎ 𝑝𝑖 − ℎ 𝑐𝑖| where L is the total grayscale levels and hi is the value of the difference histogram obtained from step 2 above i.e. the deviation or absolute difference between the grayscale values of the plain hpi and cipher image hci respectively. 2.3. Entropy Analysis Information or Shannon entropy is a measure of the information or uncertainty in any random system or the quantity of information in a given source [22]. Shannon’s entropy is given as: 𝐻(𝑋) = ∑ 𝑃(𝑥𝑖) 𝑙𝑜𝑔2 1 𝑃(𝑥 𝑖) 𝐿−1 0 (2) an ideal random source entropy is equal to 8 but most information sources seldom generate random messages, therefore their entropy value is much smaller than the ideal one. 2.4. Encryption Quality Encryption quality is designed to measure the change rate of pixel values when encryption is applied to an image. The encryption quality may be expressed as the deviation between the original and encrypted image or as the total changes in pixels values between the plain-image and the encrypted image [23]. This is shown in (3) 𝐸𝑄 = ∑ ℎ 𝑖 𝐿−1 𝑖=0 𝐿 (3) the gray level pixel values are used and are computed with (4): 𝐺𝐿 = 0.299 ∗ (𝑅) + 0.587 ∗ (𝐺) + 0.114 ∗ (𝐵) (4) 2.5. Irregular Deviation The Irregular deviation factor takes a similar path as the maximum deviation factor with only extra computations needed. In a five-step process, here’s how its obtained: D is absolute value gotten by subtracting the values of the image pixel after encryption (I) from the value of the image pixel before encryption (J). This is shown in (5). Figure 2 shows a flow chart for calculating Encryption Quality, Maximum and Irregular Deviation.
  • 3. ◼ ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 6, December 2019: 2968-2974 2970 START INPUT IMAGE SAMPLE GET 8 BIT VALUE OF RGB COMPONENT OF EACH PIXEL FOR L = 0 TO L-1, READ BIT VALUE P[I] OF RGB COMPONENT OF EACH PIXEL IF J = P[I] ? IS I LESS OR EQUAL L-1? END GET LENGTH OF IMAGE IMAGE LENGTH L = PIXEL HEIGHT x PIXEL WIDTH FOR J = 0 TO 255, WHERE J IS EACH BIT LEVEL IN HISTOGRAM INCREMENT F[J] BY 1; WHERE F IS AN ARRAY OF BIT LEVEL OCCURRENCE NO YES NO YES START INPUT IMAGE SAMPLE GET LENGTH OF IMAGE IMAGE LENGTH L = PIXEL HEIGHT x PIXEL WIDTH GET THE HISTOGRAM VALUES OF THE IMAGE FOR I = 0 TO 255 SUM = SUM + F(I) IF I =0 or I = 255 THEN? RES = (F(0) + F(255))/ 2 MD = SUM +RES EQ = (F(0) + F(255) + SUM)/256 END YES NO Figure 1. Flowchart of obtaining colour histogram Figure 2. Flowchart for calculating encryption quality, maximum deviation and irregular deviation
  • 4. TELKOMNIKA ISSN: 1693-6930 ◼ Evaluation of the quality of an image encrytion scheme (Osemwegie Omoruyi) 2971 𝐷 = | 𝐼 − 𝐽 | (5) DC is calculated by averaging the deviations obtained in step 1 as shown in (6). 𝐷𝐶 = ∑ 𝐷 𝑖 255 𝑖=0 256 (6) the Irregular deviation is obtained by summing the absolute value obtained by subtracting the individual deviation from the average value. 𝐴𝐶(𝑖) = |𝐷(𝑖) − 𝐷𝐶| (7) 𝐼𝐷 = ∑ 𝐴𝐶(𝑖)255 𝑖=0 (8) 3. Design of Encryption Quality Interface Based on the algorithms discussed in the previous section, an encryption quality analysis interface has been created with all four of the methods discussed. The Encryption Quality interface has been developed in a software application already described in a previous work [24]. The algorithm to obtain the frequency of occurrence of each bit value as used in the colour histogram is shown in Figure 1. Figure 2 shows the flowchart for calculating both the maximum deviation and irregular deviation algorithm. Figure 2 also shows the flow chart for deriving the encryption quality and Figure 1 shows the flowchart for obtaining the Colour histogram. The Graphical user interface is retained for display of histogram values as shown in Figure 3. Figure 3. Encryption quality interface 4. Implementation and Evaluation of Results This section presents the analysis of the results of three images: lena.jpg, pepper.jpg and watch.jpg. 4.1. Histogram Analysis Results from histogram analysis are presented in Figures 3 and 4. The good uniformity of the histograms produced in Figure 4 (a), Figure 4 (b) and Figure 4 (c) confirm the result obtained
  • 5. ◼ ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 6, December 2019: 2968-2974 2972 in a previous work; Chinonso et al [24] noted that low valued images with grey level pixels closer to maximum bound produced much better quality with the hill cipher encryption scheme. Image results will therefore be less prone to statistical attacks. 4.2. Maximum and Irregular Deviation Larger values of maximum deviation indicate better encryption quality while for irregular deviation, the smaller the better. Based on these metrics, the pepper image performs least by both metrics while the watch image performs best in the encryption scheme based on maximum deviation. Lena image performs best based on irregular deviation. Lower values are required for irregular deviation. Therefore, based on the tests, it is seen that Lena image performs best and Pepper image still performs least by this metric. (a) (b) (c) Figure 4. (RGB colour histograms of original images and encrypt ed images); (a) lena, (b) pepper, (c) watch
  • 6. TELKOMNIKA ISSN: 1693-6930 ◼ Evaluation of the quality of an image encrytion scheme (Osemwegie Omoruyi) 2973 4.3. Encryption Quality Encryption quality shows how deviated the encrypted image is from the original as shows in Table 1. Based on this metric, Pepper image performs least. This means that it is least deviated from the original. While on the other hand, watch image is encrypted significantly well and is relatively highly deviated. This means that the encryption algorithm is most effective on the Watch image. Table 1. Encryption Quality Metrics Obtained from Analysis Image Size Time Taken (ms) Maximum Deviation Entropy Encryption Quality Irregular Deviation Lena 400x225 1081 57596 7.24 224.98 36636.72 Pepper 259x194 632.4 47264 6.82 184.66 42933.61 Watch 400x400 1919.3 194889 4.25 929.92 371748.48 4.4. Entropy Analysis Based on the entropy metric, all images perform lower than the ideal random source entropy which is 8-bit. With watch image having the lowest entropy value and Lena image having the highest entropy value. This means that information leakage in the watch image is most possible and Lena image least possible. It is advised that other encryption algorithms be used for the watch image and pepper image since the encryption algorithm used is prone to entropy attack. 4.5. Key Sensitivity Analysis Zhang et al [25] showed using a key sensitivity test where values of the key used for image encryption was analysed to see similarities in the encrypted images produced by these keys. Table 2 shows the observation when various image keys where tested against the Lena image for the corresponding results. The results show metrics for ID, EQ, MD and Entropy. The entropy remains the same for all three keys showing a similar strength. It can be seen that keys with higher absolute determinant give better maximum deviation. However, Maximum and irregular deviation values look significant. Table 2. Testing with Various Keys using the Lena Image Key Time Taken (ms) Maximum Deviation Entropy Encryption Quality Irregular Deviation [ 11 49 187 53 ] 1069.7 57816 7.24 225.84 38123.5 [ 34 139 69 113 ] 1078.7 57432 7.24 224.34 35882.69 [ 212 187 143 25 ] 1039.2 58462 7.24 228.37 37090.94 5. Acknowledgement We acknowledge the support of Covenant University in conducting this research and the cost of publication. 6. Conclusion Image Encrytion schemes experience a variety of security attacks. Although these attacks are known, the susceptibility of encryption schemes have to be effectively investigated. This study suggests an approach to investigating the risk of image encryption schemes to some of this attack. The hill cipher scheme shows a lot of weakness to a number of attacks as the results from the previous section suggests. This study hopes to further evaluate using a variety of other encryption quality metrics and the effectiveness of hill cipher approach against other algorithms for image encryption. References [1] John S, Anele C, Olajide F, Kennedy CG. Real-time Fraud Detection in The Banking Sector Using Data Mining Techniques/Algorithm. International Conference on Computational Science and Computational Intelligence (CSCI). Las Vegas, NV, USA. 2016
  • 7. ◼ ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 6, December 2019: 2968-2974 2974 [2] Awodele O, Okesola OJ, Okokpujie KO, Damilola F, Kuyoro A, Adebiyi A. Cryptography and the Improvement of Security in Wireless Sensor Networks. 2018. [3] Jiang N, Dong X, Hu H, Ji Z, Zhang W. Quantum Image Encryption Based on Henon Mapping. International Journal of Theoretical Physics. 2019; 58(3): 979-991. [4] Luo Y, Yu J, Lai W, Liu L. A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimedia Tools and Applications. 2019: 1-21. [5] Chai X, Gan Z, Yuan K, Chen Y, Liu X. A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Computing and Applications. 2019; 31(1): 219-237. [6] Piao ML, Piao YL, Kim N, editors. 3D image encryption based on computer-generated hologram in the fractional Fourier domain. Practical Holography XXXIII: Displays, Materials, and Applications. International Society for Optics and Photonics. 2019. [7] Gong L, Qiu K, Deng C, Zhou N. An image compression and encryption algorithm based on chaotic system and compressive sensing. Optics & Laser Technology. 2019; 115: 257-267. [8] Liansheng S, Xiao Z, Chongtian H, Ailing T, Asundi AK. Silhouette-free interference-based multiple-image encryption using cascaded fractional Fourier transforms. Optics and Lasers in Engineering. 2019; 113: 29-37. [9] Mani P, Rajan R, Shanmugam L, Joo YH. Adaptive control for fractional order induced chaotic fuzzy cellular neural networks and its application to image encryption. Information Sciences. 2019; 491: 74-89. [10] Cheng Z, Haitao X, Meiqin W, Qianwen C, editors. Compressive Optical Encryption of Three-dimensional Image. Digital Holography and Three-Dimensional Imaging. Optical Society of America. 2019. [11] Khan JS, Ahmad J. Chaos based efficient selective image encryption. Multidimensional Systems and Signal Processing. 2019; 30(2): 943-961. [12] Nardo LG, Nepomuceno EG, Arias-Garcia J, Butusov DN. Image encryption using finite-precision error. Chaos, Solitons & Fractals. 2019; 123: 69-78. [13] Aslam MN, Belazi A, Kharbech S, Talha M, Xiang W. Fourth Order MCA and Chaos-based Image Encryption Scheme. IEEE Access. 2019; 7: 66395-66409. [14] El Fishawy NF, Zaid OMA. Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms. IJ Network Security. 2007; 5(3): 241-251. [15] AlQaisi A, AlTarawneh M, Alqadi ZA, Sharadqah AA. Analysis of color image features extraction using texture methods. TELKOMNIKA Telecommunication Computing Electronics and Control. 2019; 17(3): 1220-1225. [16] AbdelWahab OF, Hussein AI, Hamed HF, Kelash HM, Khalaf AA, Ali HM. Hiding data in images using steganography techniques with compression algorithms. TELKOMNIKA Telecommunication Computing Electronics and Control. 2019; 17(3): 1168-1175. [17] Azeta J, Okokpujie IP, Okokpujie KO, Salawu EY. Analytical Study of a Road Traffic Conflict at the T-Junction of University of Benin Main Gate. International Journal of Civil Engineering and Technology (IJCIET). 2018; 9(8): 1048-1061. [18] Li S, Sun W. Image encryption performance evaluation based on poker test. Advances in Multimedia. 2016. [19] Hamid A, Ragab M, Alla OSF, Noaman AY. Encryption quality analysis of the rcbc block cipher compared with rc6 and rc5 algorithms. 2014. [20] Ismail IA, Amin M, Diab H. A digital image encryption algorithm based a composition of two chaotic logistic maps. IJ Network Security. 2010; 11(1): 1-10. [21] AL-Mousa MR, Al-salameen F, Al-Qawasmi K. Using Encryption Square Keywith One-dimensional Matrix for Enhancing RGB Color Image Encryption-Decryption. Indonesian Journal of Electrical Engineering and Computer Science. 2018; 9(3): 771-777 [22] Gamido HV, Sison AM, Medina RP. Implementation of Modified AES as Image Encryption Scheme. Indonesian Journal of Electrical Engineering and Informatics (IJEEI). 2018; 6(3): 301-308. [23] Ali-Pacha H, Hadj-Said N, Ali-Pacha A. Encryption System based on a Structured Matrix: Vandermonde Matrix. Proceeding of the Electrical Engineering Computer Science and Informatics. 2017; 4: 503-506. [24] Chinonso O, Omoruyi O, Okokpujie K, John S. Development of an Encrypting System for an Image Viewer based on Hill Cipher Algorithm. Covenant Journal of Engineering Technology. 2017; 1(2): 65-73. [25] Zhang J, Wang J, editors. A Chaos-Based Digital Image Cryptosystem with an Improved Diffusion Strategy. Springer, Proceedings of the 9th International Symposium on Linear Drives for Industry Applications. 2014; 1.