SlideShare a Scribd company logo
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 6, December 2020, pp. 2992~2998
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i6.14340  2992
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
The quality of image encryption techniques by reasoned logic
Marwah Kamil Hussein1
, Kareem Radhi Hassan2
, Haider M. Al-Mashhadi3
1,3
Department of Information Systems, University of Basra, Iraq
2
Department of Computer Science, University of Basra, Iraq
Article Info ABSTRACT
Article history:
Received Oct 17, 2019
Revised Mar 17, 2020
Accepted Mar 27, 2020
One form of data is digital images, because of their widespread of frequent
exchange over the Internet it is necessary to preserve the security and privacy
of the images transmitted. There are many image encryption techniques that
have different security levels and there are many standards and protocols for
testing the quality of encryption security. The cipher images can be evaluated
using various quality measuring criteria, these measures quantify certain
features of the image. If there are many methods that can be applied to secure
images; the question is what is the most powerful scheme that can be used
among these methods? This research try to answer this question by taking three
different encryption methods (rivest cipher 5 (RC5), chaotic and permutation)
and measure their quality using the peek signal to noise ratio (PSNR),
correlation, entropy, number of pixels changes rate (NPCR) and unified
average changing intensity (UACI), the results of these criteria were input to
a fuzzy logic system that was used to find the best one among them.
Keywords:
Correlation
Encryption
Entropy
Fuzzy logic
NPCR
This is an open access article under the CC BY-SA license.
Corresponding Author:
Haider M. Al-Mashhadi,
Department of Information Systems, College of Computer Science and Information Technology,
University of Basra,
Garmat Ali, Basra, Iraq.
Email: mashhad01@gmail.com
1. INTRODUCTION
The quality assessment is a very important tool in order to check the efficiency and effectiveness of
the cryptographic algorithms. There are several methods in order to assess the cryptography techniques i.e.
depending on the key length, the block or word length, number of the rounds, the execution time and so on.
Techniques of the image encryption are widely used to ensure that the secure transmission for the image. Image
quality assessment (IQA) can be divided into two types; the first is subjective method, which depends on human
beings that assess the quality of the image. While the second method of IQA is the objective methods which
can be assess a quality of the image automatically by using several criteria [1-10]. These criteria are widely
used in order to evaluate the image quality. The major idea behind this paper can be dividing into three stages:
- Stage 1: select the image in order to encrypt it by using three encryption techniques which are (rivest cipher
5 (RC5) [11], chaotic [12] and permutation [13]).
- Stage 2: Using the following metrics of the image encryption quality: peek signal to noise ratio (PSNR)
[14], correlation [15], entropy [16], number of pixels changes rate (NPCR) and unified average changing
intensity (UACI) [17, 18]. To measure the encrypted image quality which results from stage 1; the result
was fifteen values, five values for each encryption method.
- Stage 3: finally, using the five values of quality resulted from stage 2 as input to the fuzzy logic system
(FLS), in order to assess a quality of each encryption techniques. The low result of FLS refers to the best
TELKOMNIKA Telecommun Comput El Control 
The quality of image encryption techniques by reasoned logic (Marwah Kamil Hussein)
2993
encryption method. By far, no such work in the field of quality assessment for image encryption techniques
by using the fuzzy logic system.
Figure 1 shows the proposed method structure, the image is entered to the encryption method like
(RC5) in order to produce a cipher image, after that, the cipher image will input to the quality analysis metrics
to evaluate the method efficiency, results of the quality analysis are entering to the FLS to produce the value
from FLS depending on the previous results of the quality analysis. This approach applied for other two
methods (chaotic and permutation) in order to determine the best method depending on the fuzzy logic system
value. This paper was organized as follows. Section 2 describes the fundamentals of the image quality criteria.
While, section 3 describes the fuzzy logic. Section 4 discusses the new scheme for quality analysis of
encryption image methods by using the fuzzy logic technique. The experimental results of the new techniques
were presented in section 5. Finally, the conclusions were presented in section 6.
Figure 1. The structure of the quality assessment for image encryption methods using FLS
2. RESEARCH METHOD
The research present image quality evaluation method by explote the classical methods (PSNR,
correlation, entropy, NPCR and UACI) with an artificial intelligent methods i.e. combine the ordinary image
evaluation methods with the fuzzy logic system.
2.1. PSNR
PSNR is a criterion that used in order to measure the quality difference between the resulted images
from the compression or the encryption, based on the original image. PSNR which depends on the mean square
error (MSE) can be calculated from (1) [19, 20].
(1)
MSE calculates an average of the error between the original image and the extracted image. PSNR can be
calculated as shown in (2) [21, 22].
(2)
The best value for PSNR is near to zero.
2.2. Corelation
Correlation is the quality analysis that used in order to measure the similarity between the plain image
and the cipher image. The correlation can be calculated from (3).
Corr =
∑ ∑ (𝐼1(𝑟, 𝑐) − Ī1)(𝐼2(𝑟, 𝑐) − Ī2)𝑀
𝑐=1
𝑁
𝑟=1
√[∑ ∑ (𝐼1(𝑟, 𝑐) − Ī1)2][∑ ∑ (𝐼2(𝑟, 𝑐) − Ī2)𝑀
𝑐=1
𝑁
𝑟=1 2]𝑀
𝑐=1
𝑁
𝑟=1
(3)
The best preferred correlation value is near zero.
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 2992 - 2998
2994
2.3. Entropy
Entropy is the expected value (or average of information) which can be extracted from the message.
The entropy represent the ratio or the quantity of information thet exist in the image, or how much information
can be extracted from the image. It can be expressed by using (4).
(4)
2.4. NPCR and UACI NPCR
NPCR and UACI NPCR determines the number of the pixels which their values change during
the operation of encryption, while, UACI determines the ratio of the changes between two cipher-images.
The scale of NPCR is [0, 1], the value 0 shows that there is no change in the pixels of image1 and image2.
While, value 1 shows that all pixels in image2 are different from image1. The scale of UACI is [0, 1], which
the most preferred value is near to zero [23, 24].
3. FUZZY LOGIC
Fuzzy logic system has been adopted in order to solve many problems. FLS consists from four stages
which are fuzzification, inference engine, rule base and defuzzification as depicted in Figure 2 [25]. There are
many types of FLS models like Mamdani and Takagi-Sugeno-Kang (TSK) model [26, 27].
Figure 2. The fuzzy system
4. QUALITY EVALUATION USING FLS
The proposed technique is using three techniques which are (RC5, chaotic and permutation) in order to
evaluate which of the three encryption algorithms is the more effective than others, by using the following steps:
- Select thre image to encrypt it by using RC5, chaotic and permutation methods.
- The resulted image is evaluated by using the five quality analysis criteria (PSNR, correlation, entropy,
NPCR, UACI). 3. Enter the quality analysis value which resulted from step to the fuzzyfication step of
the FLS.
- Calculate the output value of the rule bases by mapping the (PSNR, correlation, entropy, NPCR, UACI)
values to the corresponding fuzzy sets.
- Calculate the crisp output value using (5) and (6). Execute the previous steps for other methods (permutation
and chaotic). Select the best method depending on the low crisp output value.
The fuzzy rule that implied is the Mamdani type rule with five values of the input (PSNR, correlation,
entropy, NPCR and UACI) in order to produce one value as an output which represents the optimal value for
the quality of the encryption method. Figure 3 represents the structure of FLS with the five inputs and one
output and Figure 4 represents the triangle membership function which is used in this approach. The triangle
membership function can be calculated by using (5).
(5)
In the quality assessment FLS, the input values are processed by using the inference engine,
Table 1 shows the fuzzy rules which are used in FLS, the total number of fuzzy rule base is 3^5=243. For example,
if PSNR is low, correlation is low, entropy is low, NPCR is high and UACI is low, the optimal value (output) is high.
The rules run in the inference engine simultaneously. Finally, defuzzification stage finds that the optimal crisp value
represents the output from the fuzzy space. This value represents the quality analysis for the method of encryption.
TELKOMNIKA Telecommun Comput El Control 
The quality of image encryption techniques by reasoned logic (Marwah Kamil Hussein)
2995
Figure 3. The structure of FLS using five inputs and one output of the optimal quality value for
the encryption method
Figure 4. Representation of inputs membership function
Table 1. Fuzzy rules of the technique
VL L M H VH
VL VH VH H M L
L VH H H M L
M H H M L VL
H H M M L VL
VH H M M L VL
Fuzzy system can be expressed by using the following procedure:
Procedure Fuzzy: // Procedure Quality Evaluation
Begin
Determine no. of membership function for.
Input1 such as PSNR=3
Input2 such as Correlation=3
Input3 such as Entropy=3
Input4 such as NPSR=3
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 2992 - 2998
2996
Input5 such as UACI=3
Output such as Mo=5
Input the values of PSNR, Corr, Ent, NPCR, UACI from the statistical analysis stage;
Begin
Calculate the membership function for the PSNR, Corr, Ent, NPCR, UACI, in the Input1…Input5
by (5); Put the result in Y1...Y5;
UK
= ∑ ∑ 𝑌𝑖 ∗ 𝑌𝑣𝑚=2
𝑣=1
𝑚=1
𝑖=1
Calculate the degree of all fuzzy sets Uk
by the equation:
Using COG strategies to fixed encryption block as a crisp value according to:
𝑂𝑝𝑡𝑖𝑚𝑎𝑙𝑉𝑎𝑙𝑢𝑒 =
∑ 𝑈𝑖 ∗ 𝐶𝑖𝑛
𝑖=1
∑ 𝑈𝑖𝑛
𝑖=1
End; End;
5. EXPERIMENTAL RESULTS
In order to evaluate the technique, three encryption algorithms were used (RC5, permutation and chaotic).
Each one of these methods runs on eight different standard images which are (birds, boat, barco, house, star, peppers,
boys and fingerprint). Table 2 represents values of the quality analysis metrics that resulted from RC5 encryption
methods for eight images by using five metrics. Table 3 represents the values of FLS which evaluate the metrics of
Table 2. Table 4 represents the quality analysis metrics that resulted from chaotic method of eight images. Table 5
represents the values of quality analysis using FLS which evaluate the metrics of Table 4. Table 6, represents the
values of quality analysis metrics resulted from the permutation encryption methods for eight images. Table 7 shows
the quality analysis using fuzzy system that resulted from the metrics of the quality analysis for eight images. From
Tables 2, 4, and 6, it's very difficult to determine which one of three methods is the best to encrypt the image,
depending on the ordinary metrics (PSNR, correlation, entropy, NPCR and UACI) because the values of these
methods are very similar or very closer. So, values of these metrics are using as inputs to FLS in order to determine
in precisely which one of these methods is better than the other. Tables 3, 4, and 5 show the fuzzy logic values which
used to determine a quality analysis for each encryption method.
Table 2. Metrics of quality analysis for RC5 encryption method
Image Name
PSNR
Plain image vs
cipher image
Corrdation
Plain image vs
cipher image
Entropy
for cipher image
NPCR
Plain image vs
cipher image
UACI
Birds 43.2947 0.0278548 7.94921 0.9993 0.571291
Boat 43.4917 0.00167326 7.93313 1 0.490355
House 43.4073 0.0209042 7.94329 1 0.502669
Barco 43.4172 0.00320752 7.90872 1 0.639404
Boys 43.4806 0.0252667 7.77518 1 0.591233
Star 42.8029 0.0456949 4.8765 0.9998 0.801624
Peppers 43.4035 0.0200264 7.95373 1 0.516007
Finger-print 43.3416 0.0004241111 7.972999 1 0.044125
Table 3. Quality analysis using FLS to RC5 encryption method
Image Name Birds Boat House Barco Boys Star Peppers Finger-print
Fuzzy Logic 0.282274 0.258981 0.258991 0.304111 0.302259 0.594698 0.403435 0.470525
Table 4. Quality analysis metrics for chaotic encryption method
Image Name
PSNR
Plain image vs
cipher image
Corrdation
Plain image vs
cipher image
Entropy
for cipher image
NPCR
Plain image vs
cipher image
UACI
Birds 11.8263 0.00265036 7.30424 0.992218 0.196837
Boat 11.7637 7.814875 7.19046 0.990265 0.195799
House 11.6677 0.00239873 7.48304 0.993591 0.268934
Barco 9.38535 0.0010362 7.3561 0.991287 0.268934
Boys 10.5447 0.00032136 7.21731 0.987473 0.240348
Star 7.87947 0.00221533 4.11628 0.639038 0.282137
Peppers 9.67225 0.159637 0.0104066 1 0.257559
Finger-print 9.96458 0.0951743 0.0305328 1 0.0258193
TELKOMNIKA Telecommun Comput El Control 
The quality of image encryption techniques by reasoned logic (Marwah Kamil Hussein)
2997
Table 5. Quality analysis by using FLS to chaotic encryption method
Image Name Birds Boat House Barco Boys Star Peppers Finger-print
Fuzzy Logic 0.588561 0.588232 0.593566 0.628818 0.595186 0.662544 0.599226 0.600087
Table 6. Quality analysis metrics for permutation encryption method
Image Name
PSNR
Plain image vs
cipher image
Corrdation
Plain image vs
cipher image
Entropy
for cipher image
NPCR
Plain image vs
cipher image
UACI
Birds 11.8263 0.00265036 7.30424 0.992218 0.196837
Boat 11.7637 7.81487e-5 7.19046 0.990265 0.195799
House 11.6677 0.00239873 7.48304 0.993591 0.210841
Barco 9.38535 0.00101362 7.3561 0.991287 0.268934
Boys 10.5447 0.000312136 7.21731 0.987473 0.240348
Star 7.87947 0.00221533 4.11628 0.639038 0.282137
Peppers 10.6217 0.00516135 7.53269 0.994217 0.239001
Finger-print 10.9255 0.00349311 6.73171 0.9899 0.232249
Table 7. Quality analysis values by using FLS to permutation method
Image Name Birds Boat House Barco Boys Star Peppers Finger-print
Fuzzy Logic 0.408072 0.412495 0.397225 0.380794 0.39548 0.414579 0.695494 0.414579
6. CONCLUSIONS
Quality assessment of the encryption methods is very important in order to determine the encryption
mechanism strength. Several quality assessment methods which are implemented to determine the
cryptographic method efficiency by using so many metrics. In this work, a new method of the quality
assessment has been applied on three image encryption algorithms which are (RC5, chaotic and permutation),
by calculating the quality analysis for each method by using five metrics (PSNR, entropy, correlation, NPCR
and UACI), the results of these metrics enter to FLS in order to determine the fitness of each method of
encryption. The results show that the best method was RC5. Therefore, FL quality assessment for the image
encryption methods adds a new method in order to analytical comparison among the implemented methods.
As a future work, exploring more methods and investigating the performance of using the methods to check its
effectiveness by using FL system.
REFERENCES
[1] Sheikh H. R., Bovik A. C., “Image information and visual quality,” IEEE Transactions.on Image Processing,
vol. 15, no. 2, pp. 430-444, February 2006.
[2] You J., et al., “Perceptual quality assessment based on visual attention analysis,” Proceedings of the 17th ACM
international conference on Multimedia, pp. 19-24, October 2009.
[3] Zhai G., Zhang W. and Lin W., “LGPS: Phase based image quality assessment metric,” IEEE Workshop on Signal
Processing Systems, pp. 605-609, October 2007.
[4] Liu Z. and Laganiere R., “On the use of phase congruency to evaluate image similarity.” IEEE International
Conference on Acoustics Speech and Signal Processing Proceedings, May 2006.
[5] Davis L. S., Wu Z. and Sun H., “Contour-based motion estimation.” Computer vision, Graphics, and. image Process,
vol. 23, no. 3, pp. 313-326, September 1983.
[6] Han S., Mao H. and Dally W. J. A., “Deep neural network compression pipeline: Pruning, quantization, huffman
encoding.” arXiv Prepr, February 2016.
[7] Fu W., Gu X. and Wang Y., “Image quality assessment using edge and contrast similarity.” IEEE International Joint
Conference on Neural Networks (IEEE World Congress on Computational Intelligence), pp. 852-855, June 2008.
[8] Yap V. V., “Wavelet-based image compression for mobile applications.” Middlesex University. 2005.
[9] Yang C. L., Wang F. and Xiao D., “Contourlet transform-based structural similarity for image quality assessment.”
IEEE International Conference on Intelligent Computing and Intelligent Systems, pp. 175-179, November 2009.
[10] Alhijaj A. A. and Hussein M. K., “Stereo images encryption by OSA & RSA algorithms.” Journal Physics
Conference Series, vol.1279, no. 1, pp. 1-7, January. 2019.
[11] Hussein M. K., Alhijaj A, “TDL and Ron Rivest, Adi Shamir, and Leonard Adleman in Stereo images encrypt”
Journal of Advanced Research in Dynamical and Control Systems-JARDCS, vol. 11, no. 01, pp. 1811-1817, 2018.
[12] Sathishkumar G. A., Bhoopathy K., Siriaam N., “Image encryption based on diffusion and multiple chaotic maps.”
International Journal of Network Security & Its Applications, vol. 3, no. 2, pp. 181-194, 2011.
[13] Sesha P., Indrakanti, Avadhani P. S., “Permutation based Image encryption technique.” International Journal of
Computer Applications, vol. 28, no. 8, pp.45-47, August 2011.
[14] Wang Z., Bovik A. C., Sheikh H. D. and Simoncelli E., “Image quality assessment: from error visibility to structural
similarity,” IEEE Transactions on Image Processing, vol. 4, no. 4, pp. 600-612, April 2004.
[15] Xuehu Yan, et al., “A new assessment measure of shadow image quality based on error diffusion techniques.” Journal
of Information Hiding and Multimedia Signal Processing, vol. 4, no.2, pp. 118-126, January 2013.
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 2992 - 2998
2998
[16] Shannon C. E., “Communication theory of secrecy systems.”’ Bell System Technical Journal, vol. 28, no. 4,
pp. 656-715, October 1949.
[17] Chen G., Mao Y. and Chui C. A., “Symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos,
Solitons and Fractals, vol. 21, no. 3, pp. 749-761, July 2004.
[18] Mao Y., Chen Y. and Lian S. A., “Novel fast image encryption scheme based on 3D chaotic baker maps, International
Journal of Bifurcation and Chaos, vol. 14, no. 10, November 2011.
[19] Sencar H. T., Ramkumar M., Akansu A. N., “Data hiding fundamentals and applications.” New York, Elsevier
Academic Press, 2004.
[20] Chang C. C., Lin C. C., Chen Y. H., “Reversible data-embedding scheme using differences between original and
predicted pixel values.” IET Information Security, vol. 2, no. 2, pp. 35-46, June 2008.
[21] Hussein M. K., Abdul-Kareem H., “Video compression for communication and storage using wavelet transform and
adaptive rood pattern search matching algorithm,” Al-Mustansiriyah Journal of Science, vol. 24, no. 5, pp. 393-406, 2013.
[22] Dirankov D., Hellendron H. and Reinfrank M., “An introduction to fuzzy control,” Springer New York. 1993.
[23] Haider M., Al-Mashhadi, Iman Q. Abduljaleel, “Color image encryption using chaotic maps, triangular scrambling,
with DNA sequences,” International Conference on Current Research in Computer Science and Information
Technology (ICCIT), pp. 93-98, April 2017.
[24] Haider M., Al-Mashadi, Ala'a A. Khalaf, “Hybrid homomorphic cryptosystem for secure transfer of color image on
public cloud,” Journal of Theoretical and Applied Information Technology, vol. 96, no. 19, pp. 6474-6486, 2018.
[25] Mitaim, Sanya, and Bart Kosko, “The shape of fuzzy sets in adaptive function approximation.” IEEE Transactions
on Fuzzy Systems, vol. 9, no. 4, pp. 637-656, August 2001.
[26] Schmidt M., Stidsen T., “Hyprid system: genetic algorithms, neural networks, and fuzzy logic.” Denmark. 1996.
[27] Hussein M. K., “Encryption of stereo images after estimated the motion using spatially dependent algorithms.”
International Journal of Computer Science and Mobile Computing, vol. 5, no. 12, pp. 150-159, December 2016.
BIOGRAPHIES OF AUTHORS
Marwah K. Hussein is a lecturer in computer information systems since (2013), University
of Basra in Iraq. Her current research interests included information security, Video and
image processing.
Dr. Kareem Radhi Hassan, is an assistant professor in Computer system department, since
(1996), university of Basrah, Iraq. His current research interests include information
security, IoT, GIS, AI.
Dr. Haider M. Al-Mashhadi, is a professor in computer information systems department
since 2003, university of Basrah, Iraq. His research interests in the network and information
security, IoT, embedded systems, AI and image processing.

More Related Content

What's hot

IRJET- Data Embedding using Image Steganography
IRJET-  	  Data Embedding using Image SteganographyIRJET-  	  Data Embedding using Image Steganography
IRJET- Data Embedding using Image SteganographyIRJET Journal
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature mapsAlexander Decker
 
2013 feature selection for intrusion detection using nsl kdd
2013 feature selection for intrusion detection using nsl kdd2013 feature selection for intrusion detection using nsl kdd
2013 feature selection for intrusion detection using nsl kddVan Thanh
 
Full reference video quality assessment
Full reference video quality assessmentFull reference video quality assessment
Full reference video quality assessmentHoàng Sơn
 
Object Oriented Modeling of Space Efficient LSB based Steganography including...
Object Oriented Modeling of Space Efficient LSB based Steganography including...Object Oriented Modeling of Space Efficient LSB based Steganography including...
Object Oriented Modeling of Space Efficient LSB based Steganography including...IJCSIS Research Publications
 
Voice Signal Synthesis using Non Negative Matrix Factorization
Voice Signal Synthesis using Non Negative Matrix FactorizationVoice Signal Synthesis using Non Negative Matrix Factorization
Voice Signal Synthesis using Non Negative Matrix FactorizationIRJET Journal
 
INTRA BLOCK AND INTER BLOCK NEIGHBORING JOINT DENSITY BASED APPROACH FOR JPEG...
INTRA BLOCK AND INTER BLOCK NEIGHBORING JOINT DENSITY BASED APPROACH FOR JPEG...INTRA BLOCK AND INTER BLOCK NEIGHBORING JOINT DENSITY BASED APPROACH FOR JPEG...
INTRA BLOCK AND INTER BLOCK NEIGHBORING JOINT DENSITY BASED APPROACH FOR JPEG...ijsc
 
Lossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative StudyLossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative StudyIRJET Journal
 
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...CSCJournals
 
Evaluation of Huffman and Arithmetic Algorithms for Multimedia Compression St...
Evaluation of Huffman and Arithmetic Algorithms for Multimedia Compression St...Evaluation of Huffman and Arithmetic Algorithms for Multimedia Compression St...
Evaluation of Huffman and Arithmetic Algorithms for Multimedia Compression St...IJCSEA Journal
 
Improvement of chaotic secure communication scheme based on steganographic me...
Improvement of chaotic secure communication scheme based on steganographic me...Improvement of chaotic secure communication scheme based on steganographic me...
Improvement of chaotic secure communication scheme based on steganographic me...Massoud Khodadadzadeh
 
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...IRJET Journal
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System iosrjce
 

What's hot (19)

IRJET- Data Embedding using Image Steganography
IRJET-  	  Data Embedding using Image SteganographyIRJET-  	  Data Embedding using Image Steganography
IRJET- Data Embedding using Image Steganography
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
 
2013 feature selection for intrusion detection using nsl kdd
2013 feature selection for intrusion detection using nsl kdd2013 feature selection for intrusion detection using nsl kdd
2013 feature selection for intrusion detection using nsl kdd
 
Ft3111351140
Ft3111351140Ft3111351140
Ft3111351140
 
FYP Journal Paper
FYP Journal PaperFYP Journal Paper
FYP Journal Paper
 
Full reference video quality assessment
Full reference video quality assessmentFull reference video quality assessment
Full reference video quality assessment
 
Object Oriented Modeling of Space Efficient LSB based Steganography including...
Object Oriented Modeling of Space Efficient LSB based Steganography including...Object Oriented Modeling of Space Efficient LSB based Steganography including...
Object Oriented Modeling of Space Efficient LSB based Steganography including...
 
D018141922
D018141922D018141922
D018141922
 
CR_CSI_119
CR_CSI_119CR_CSI_119
CR_CSI_119
 
Voice Signal Synthesis using Non Negative Matrix Factorization
Voice Signal Synthesis using Non Negative Matrix FactorizationVoice Signal Synthesis using Non Negative Matrix Factorization
Voice Signal Synthesis using Non Negative Matrix Factorization
 
INTRA BLOCK AND INTER BLOCK NEIGHBORING JOINT DENSITY BASED APPROACH FOR JPEG...
INTRA BLOCK AND INTER BLOCK NEIGHBORING JOINT DENSITY BASED APPROACH FOR JPEG...INTRA BLOCK AND INTER BLOCK NEIGHBORING JOINT DENSITY BASED APPROACH FOR JPEG...
INTRA BLOCK AND INTER BLOCK NEIGHBORING JOINT DENSITY BASED APPROACH FOR JPEG...
 
Lossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative StudyLossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative Study
 
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
 
Evaluation of Huffman and Arithmetic Algorithms for Multimedia Compression St...
Evaluation of Huffman and Arithmetic Algorithms for Multimedia Compression St...Evaluation of Huffman and Arithmetic Algorithms for Multimedia Compression St...
Evaluation of Huffman and Arithmetic Algorithms for Multimedia Compression St...
 
Improvement of chaotic secure communication scheme based on steganographic me...
Improvement of chaotic secure communication scheme based on steganographic me...Improvement of chaotic secure communication scheme based on steganographic me...
Improvement of chaotic secure communication scheme based on steganographic me...
 
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System
 

Similar to The quality of image encryption techniques by reasoned logic

IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET Journal
 
Evaluation of the quality of an image encrytion scheme
Evaluation of the quality of an image encrytion schemeEvaluation of the quality of an image encrytion scheme
Evaluation of the quality of an image encrytion schemeTELKOMNIKA JOURNAL
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplicationijcsit
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imageseSAT Journals
 
Improving face recognition by artificial neural network using principal compo...
Improving face recognition by artificial neural network using principal compo...Improving face recognition by artificial neural network using principal compo...
Improving face recognition by artificial neural network using principal compo...TELKOMNIKA JOURNAL
 
Security analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digitalSecurity analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digitaleSAT Publishing House
 
37de29c2ae88c046317fcfbebd7a66784874
37de29c2ae88c046317fcfbebd7a6678487437de29c2ae88c046317fcfbebd7a66784874
37de29c2ae88c046317fcfbebd7a66784874hemant gupta
 
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...IJNSA Journal
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionIRJET Journal
 
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONSECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONsipij
 
Chaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey StudyChaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey StudyjournalBEEI
 
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFING
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFINGPSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFING
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFINGcscpconf
 
Pso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofingPso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofingcsandit
 
Channel encoding system for transmitting image over wireless network
Channel encoding system for transmitting image over wireless network Channel encoding system for transmitting image over wireless network
Channel encoding system for transmitting image over wireless network IJECEIAES
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...TELKOMNIKA JOURNAL
 
Stereo matching algorithm using census transform and segment tree for depth e...
Stereo matching algorithm using census transform and segment tree for depth e...Stereo matching algorithm using census transform and segment tree for depth e...
Stereo matching algorithm using census transform and segment tree for depth e...TELKOMNIKA JOURNAL
 
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...CSCJournals
 

Similar to The quality of image encryption techniques by reasoned logic (20)

IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
 
Evaluation of the quality of an image encrytion scheme
Evaluation of the quality of an image encrytion schemeEvaluation of the quality of an image encrytion scheme
Evaluation of the quality of an image encrytion scheme
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
 
Improving face recognition by artificial neural network using principal compo...
Improving face recognition by artificial neural network using principal compo...Improving face recognition by artificial neural network using principal compo...
Improving face recognition by artificial neural network using principal compo...
 
Security analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digitalSecurity analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digital
 
37de29c2ae88c046317fcfbebd7a66784874
37de29c2ae88c046317fcfbebd7a6678487437de29c2ae88c046317fcfbebd7a66784874
37de29c2ae88c046317fcfbebd7a66784874
 
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
 
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONSECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
 
Chaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey StudyChaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey Study
 
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFING
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFINGPSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFING
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFING
 
Pso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofingPso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofing
 
Ay33292297
Ay33292297Ay33292297
Ay33292297
 
Ay33292297
Ay33292297Ay33292297
Ay33292297
 
Channel encoding system for transmitting image over wireless network
Channel encoding system for transmitting image over wireless network Channel encoding system for transmitting image over wireless network
Channel encoding system for transmitting image over wireless network
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
 
Stereo matching algorithm using census transform and segment tree for depth e...
Stereo matching algorithm using census transform and segment tree for depth e...Stereo matching algorithm using census transform and segment tree for depth e...
Stereo matching algorithm using census transform and segment tree for depth e...
 
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
Performance Analysis of Mobile Security Protocols: Encryption and Authenticat...
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringC Sai Kiran
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfAbrahamGadissa
 
shape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptxshape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptxVishalDeshpande27
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfKamal Acharya
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdfKamal Acharya
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
 
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES  INTRODUCTION UNIT-IENERGY STORAGE DEVICES  INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES INTRODUCTION UNIT-IVigneshvaranMech
 
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical EngineeringC Sai Kiran
 
Pharmacy management system project report..pdf
Pharmacy management system project report..pdfPharmacy management system project report..pdf
Pharmacy management system project report..pdfKamal Acharya
 
Introduction to Casting Processes in Manufacturing
Introduction to Casting Processes in ManufacturingIntroduction to Casting Processes in Manufacturing
Introduction to Casting Processes in Manufacturingssuser0811ec
 
Top 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering ScientistTop 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering Scientistgettygaming1
 
Peek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdfPeek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdfAyahmorsy
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectRased Khan
 
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...Amil baba
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxMd. Shahidul Islam Prodhan
 
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfKamal Acharya
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGKOUSTAV SARKAR
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industriesMuhammadTufail242431
 
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...Amil baba
 

Recently uploaded (20)

Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
 
shape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptxshape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptx
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES  INTRODUCTION UNIT-IENERGY STORAGE DEVICES  INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
 
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
 
Pharmacy management system project report..pdf
Pharmacy management system project report..pdfPharmacy management system project report..pdf
Pharmacy management system project report..pdf
 
Introduction to Casting Processes in Manufacturing
Introduction to Casting Processes in ManufacturingIntroduction to Casting Processes in Manufacturing
Introduction to Casting Processes in Manufacturing
 
Top 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering ScientistTop 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering Scientist
 
Peek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdfPeek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdf
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker project
 
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
 
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
 

The quality of image encryption techniques by reasoned logic

  • 1. TELKOMNIKA Telecommunication, Computing, Electronics and Control Vol. 18, No. 6, December 2020, pp. 2992~2998 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v18i6.14340  2992 Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA The quality of image encryption techniques by reasoned logic Marwah Kamil Hussein1 , Kareem Radhi Hassan2 , Haider M. Al-Mashhadi3 1,3 Department of Information Systems, University of Basra, Iraq 2 Department of Computer Science, University of Basra, Iraq Article Info ABSTRACT Article history: Received Oct 17, 2019 Revised Mar 17, 2020 Accepted Mar 27, 2020 One form of data is digital images, because of their widespread of frequent exchange over the Internet it is necessary to preserve the security and privacy of the images transmitted. There are many image encryption techniques that have different security levels and there are many standards and protocols for testing the quality of encryption security. The cipher images can be evaluated using various quality measuring criteria, these measures quantify certain features of the image. If there are many methods that can be applied to secure images; the question is what is the most powerful scheme that can be used among these methods? This research try to answer this question by taking three different encryption methods (rivest cipher 5 (RC5), chaotic and permutation) and measure their quality using the peek signal to noise ratio (PSNR), correlation, entropy, number of pixels changes rate (NPCR) and unified average changing intensity (UACI), the results of these criteria were input to a fuzzy logic system that was used to find the best one among them. Keywords: Correlation Encryption Entropy Fuzzy logic NPCR This is an open access article under the CC BY-SA license. Corresponding Author: Haider M. Al-Mashhadi, Department of Information Systems, College of Computer Science and Information Technology, University of Basra, Garmat Ali, Basra, Iraq. Email: mashhad01@gmail.com 1. INTRODUCTION The quality assessment is a very important tool in order to check the efficiency and effectiveness of the cryptographic algorithms. There are several methods in order to assess the cryptography techniques i.e. depending on the key length, the block or word length, number of the rounds, the execution time and so on. Techniques of the image encryption are widely used to ensure that the secure transmission for the image. Image quality assessment (IQA) can be divided into two types; the first is subjective method, which depends on human beings that assess the quality of the image. While the second method of IQA is the objective methods which can be assess a quality of the image automatically by using several criteria [1-10]. These criteria are widely used in order to evaluate the image quality. The major idea behind this paper can be dividing into three stages: - Stage 1: select the image in order to encrypt it by using three encryption techniques which are (rivest cipher 5 (RC5) [11], chaotic [12] and permutation [13]). - Stage 2: Using the following metrics of the image encryption quality: peek signal to noise ratio (PSNR) [14], correlation [15], entropy [16], number of pixels changes rate (NPCR) and unified average changing intensity (UACI) [17, 18]. To measure the encrypted image quality which results from stage 1; the result was fifteen values, five values for each encryption method. - Stage 3: finally, using the five values of quality resulted from stage 2 as input to the fuzzy logic system (FLS), in order to assess a quality of each encryption techniques. The low result of FLS refers to the best
  • 2. TELKOMNIKA Telecommun Comput El Control  The quality of image encryption techniques by reasoned logic (Marwah Kamil Hussein) 2993 encryption method. By far, no such work in the field of quality assessment for image encryption techniques by using the fuzzy logic system. Figure 1 shows the proposed method structure, the image is entered to the encryption method like (RC5) in order to produce a cipher image, after that, the cipher image will input to the quality analysis metrics to evaluate the method efficiency, results of the quality analysis are entering to the FLS to produce the value from FLS depending on the previous results of the quality analysis. This approach applied for other two methods (chaotic and permutation) in order to determine the best method depending on the fuzzy logic system value. This paper was organized as follows. Section 2 describes the fundamentals of the image quality criteria. While, section 3 describes the fuzzy logic. Section 4 discusses the new scheme for quality analysis of encryption image methods by using the fuzzy logic technique. The experimental results of the new techniques were presented in section 5. Finally, the conclusions were presented in section 6. Figure 1. The structure of the quality assessment for image encryption methods using FLS 2. RESEARCH METHOD The research present image quality evaluation method by explote the classical methods (PSNR, correlation, entropy, NPCR and UACI) with an artificial intelligent methods i.e. combine the ordinary image evaluation methods with the fuzzy logic system. 2.1. PSNR PSNR is a criterion that used in order to measure the quality difference between the resulted images from the compression or the encryption, based on the original image. PSNR which depends on the mean square error (MSE) can be calculated from (1) [19, 20]. (1) MSE calculates an average of the error between the original image and the extracted image. PSNR can be calculated as shown in (2) [21, 22]. (2) The best value for PSNR is near to zero. 2.2. Corelation Correlation is the quality analysis that used in order to measure the similarity between the plain image and the cipher image. The correlation can be calculated from (3). Corr = ∑ ∑ (𝐼1(𝑟, 𝑐) − Ī1)(𝐼2(𝑟, 𝑐) − Ī2)𝑀 𝑐=1 𝑁 𝑟=1 √[∑ ∑ (𝐼1(𝑟, 𝑐) − Ī1)2][∑ ∑ (𝐼2(𝑟, 𝑐) − Ī2)𝑀 𝑐=1 𝑁 𝑟=1 2]𝑀 𝑐=1 𝑁 𝑟=1 (3) The best preferred correlation value is near zero.
  • 3.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 2992 - 2998 2994 2.3. Entropy Entropy is the expected value (or average of information) which can be extracted from the message. The entropy represent the ratio or the quantity of information thet exist in the image, or how much information can be extracted from the image. It can be expressed by using (4). (4) 2.4. NPCR and UACI NPCR NPCR and UACI NPCR determines the number of the pixels which their values change during the operation of encryption, while, UACI determines the ratio of the changes between two cipher-images. The scale of NPCR is [0, 1], the value 0 shows that there is no change in the pixels of image1 and image2. While, value 1 shows that all pixels in image2 are different from image1. The scale of UACI is [0, 1], which the most preferred value is near to zero [23, 24]. 3. FUZZY LOGIC Fuzzy logic system has been adopted in order to solve many problems. FLS consists from four stages which are fuzzification, inference engine, rule base and defuzzification as depicted in Figure 2 [25]. There are many types of FLS models like Mamdani and Takagi-Sugeno-Kang (TSK) model [26, 27]. Figure 2. The fuzzy system 4. QUALITY EVALUATION USING FLS The proposed technique is using three techniques which are (RC5, chaotic and permutation) in order to evaluate which of the three encryption algorithms is the more effective than others, by using the following steps: - Select thre image to encrypt it by using RC5, chaotic and permutation methods. - The resulted image is evaluated by using the five quality analysis criteria (PSNR, correlation, entropy, NPCR, UACI). 3. Enter the quality analysis value which resulted from step to the fuzzyfication step of the FLS. - Calculate the output value of the rule bases by mapping the (PSNR, correlation, entropy, NPCR, UACI) values to the corresponding fuzzy sets. - Calculate the crisp output value using (5) and (6). Execute the previous steps for other methods (permutation and chaotic). Select the best method depending on the low crisp output value. The fuzzy rule that implied is the Mamdani type rule with five values of the input (PSNR, correlation, entropy, NPCR and UACI) in order to produce one value as an output which represents the optimal value for the quality of the encryption method. Figure 3 represents the structure of FLS with the five inputs and one output and Figure 4 represents the triangle membership function which is used in this approach. The triangle membership function can be calculated by using (5). (5) In the quality assessment FLS, the input values are processed by using the inference engine, Table 1 shows the fuzzy rules which are used in FLS, the total number of fuzzy rule base is 3^5=243. For example, if PSNR is low, correlation is low, entropy is low, NPCR is high and UACI is low, the optimal value (output) is high. The rules run in the inference engine simultaneously. Finally, defuzzification stage finds that the optimal crisp value represents the output from the fuzzy space. This value represents the quality analysis for the method of encryption.
  • 4. TELKOMNIKA Telecommun Comput El Control  The quality of image encryption techniques by reasoned logic (Marwah Kamil Hussein) 2995 Figure 3. The structure of FLS using five inputs and one output of the optimal quality value for the encryption method Figure 4. Representation of inputs membership function Table 1. Fuzzy rules of the technique VL L M H VH VL VH VH H M L L VH H H M L M H H M L VL H H M M L VL VH H M M L VL Fuzzy system can be expressed by using the following procedure: Procedure Fuzzy: // Procedure Quality Evaluation Begin Determine no. of membership function for. Input1 such as PSNR=3 Input2 such as Correlation=3 Input3 such as Entropy=3 Input4 such as NPSR=3
  • 5.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 2992 - 2998 2996 Input5 such as UACI=3 Output such as Mo=5 Input the values of PSNR, Corr, Ent, NPCR, UACI from the statistical analysis stage; Begin Calculate the membership function for the PSNR, Corr, Ent, NPCR, UACI, in the Input1…Input5 by (5); Put the result in Y1...Y5; UK = ∑ ∑ 𝑌𝑖 ∗ 𝑌𝑣𝑚=2 𝑣=1 𝑚=1 𝑖=1 Calculate the degree of all fuzzy sets Uk by the equation: Using COG strategies to fixed encryption block as a crisp value according to: 𝑂𝑝𝑡𝑖𝑚𝑎𝑙𝑉𝑎𝑙𝑢𝑒 = ∑ 𝑈𝑖 ∗ 𝐶𝑖𝑛 𝑖=1 ∑ 𝑈𝑖𝑛 𝑖=1 End; End; 5. EXPERIMENTAL RESULTS In order to evaluate the technique, three encryption algorithms were used (RC5, permutation and chaotic). Each one of these methods runs on eight different standard images which are (birds, boat, barco, house, star, peppers, boys and fingerprint). Table 2 represents values of the quality analysis metrics that resulted from RC5 encryption methods for eight images by using five metrics. Table 3 represents the values of FLS which evaluate the metrics of Table 2. Table 4 represents the quality analysis metrics that resulted from chaotic method of eight images. Table 5 represents the values of quality analysis using FLS which evaluate the metrics of Table 4. Table 6, represents the values of quality analysis metrics resulted from the permutation encryption methods for eight images. Table 7 shows the quality analysis using fuzzy system that resulted from the metrics of the quality analysis for eight images. From Tables 2, 4, and 6, it's very difficult to determine which one of three methods is the best to encrypt the image, depending on the ordinary metrics (PSNR, correlation, entropy, NPCR and UACI) because the values of these methods are very similar or very closer. So, values of these metrics are using as inputs to FLS in order to determine in precisely which one of these methods is better than the other. Tables 3, 4, and 5 show the fuzzy logic values which used to determine a quality analysis for each encryption method. Table 2. Metrics of quality analysis for RC5 encryption method Image Name PSNR Plain image vs cipher image Corrdation Plain image vs cipher image Entropy for cipher image NPCR Plain image vs cipher image UACI Birds 43.2947 0.0278548 7.94921 0.9993 0.571291 Boat 43.4917 0.00167326 7.93313 1 0.490355 House 43.4073 0.0209042 7.94329 1 0.502669 Barco 43.4172 0.00320752 7.90872 1 0.639404 Boys 43.4806 0.0252667 7.77518 1 0.591233 Star 42.8029 0.0456949 4.8765 0.9998 0.801624 Peppers 43.4035 0.0200264 7.95373 1 0.516007 Finger-print 43.3416 0.0004241111 7.972999 1 0.044125 Table 3. Quality analysis using FLS to RC5 encryption method Image Name Birds Boat House Barco Boys Star Peppers Finger-print Fuzzy Logic 0.282274 0.258981 0.258991 0.304111 0.302259 0.594698 0.403435 0.470525 Table 4. Quality analysis metrics for chaotic encryption method Image Name PSNR Plain image vs cipher image Corrdation Plain image vs cipher image Entropy for cipher image NPCR Plain image vs cipher image UACI Birds 11.8263 0.00265036 7.30424 0.992218 0.196837 Boat 11.7637 7.814875 7.19046 0.990265 0.195799 House 11.6677 0.00239873 7.48304 0.993591 0.268934 Barco 9.38535 0.0010362 7.3561 0.991287 0.268934 Boys 10.5447 0.00032136 7.21731 0.987473 0.240348 Star 7.87947 0.00221533 4.11628 0.639038 0.282137 Peppers 9.67225 0.159637 0.0104066 1 0.257559 Finger-print 9.96458 0.0951743 0.0305328 1 0.0258193
  • 6. TELKOMNIKA Telecommun Comput El Control  The quality of image encryption techniques by reasoned logic (Marwah Kamil Hussein) 2997 Table 5. Quality analysis by using FLS to chaotic encryption method Image Name Birds Boat House Barco Boys Star Peppers Finger-print Fuzzy Logic 0.588561 0.588232 0.593566 0.628818 0.595186 0.662544 0.599226 0.600087 Table 6. Quality analysis metrics for permutation encryption method Image Name PSNR Plain image vs cipher image Corrdation Plain image vs cipher image Entropy for cipher image NPCR Plain image vs cipher image UACI Birds 11.8263 0.00265036 7.30424 0.992218 0.196837 Boat 11.7637 7.81487e-5 7.19046 0.990265 0.195799 House 11.6677 0.00239873 7.48304 0.993591 0.210841 Barco 9.38535 0.00101362 7.3561 0.991287 0.268934 Boys 10.5447 0.000312136 7.21731 0.987473 0.240348 Star 7.87947 0.00221533 4.11628 0.639038 0.282137 Peppers 10.6217 0.00516135 7.53269 0.994217 0.239001 Finger-print 10.9255 0.00349311 6.73171 0.9899 0.232249 Table 7. Quality analysis values by using FLS to permutation method Image Name Birds Boat House Barco Boys Star Peppers Finger-print Fuzzy Logic 0.408072 0.412495 0.397225 0.380794 0.39548 0.414579 0.695494 0.414579 6. CONCLUSIONS Quality assessment of the encryption methods is very important in order to determine the encryption mechanism strength. Several quality assessment methods which are implemented to determine the cryptographic method efficiency by using so many metrics. In this work, a new method of the quality assessment has been applied on three image encryption algorithms which are (RC5, chaotic and permutation), by calculating the quality analysis for each method by using five metrics (PSNR, entropy, correlation, NPCR and UACI), the results of these metrics enter to FLS in order to determine the fitness of each method of encryption. The results show that the best method was RC5. Therefore, FL quality assessment for the image encryption methods adds a new method in order to analytical comparison among the implemented methods. As a future work, exploring more methods and investigating the performance of using the methods to check its effectiveness by using FL system. REFERENCES [1] Sheikh H. R., Bovik A. C., “Image information and visual quality,” IEEE Transactions.on Image Processing, vol. 15, no. 2, pp. 430-444, February 2006. [2] You J., et al., “Perceptual quality assessment based on visual attention analysis,” Proceedings of the 17th ACM international conference on Multimedia, pp. 19-24, October 2009. [3] Zhai G., Zhang W. and Lin W., “LGPS: Phase based image quality assessment metric,” IEEE Workshop on Signal Processing Systems, pp. 605-609, October 2007. [4] Liu Z. and Laganiere R., “On the use of phase congruency to evaluate image similarity.” IEEE International Conference on Acoustics Speech and Signal Processing Proceedings, May 2006. [5] Davis L. S., Wu Z. and Sun H., “Contour-based motion estimation.” Computer vision, Graphics, and. image Process, vol. 23, no. 3, pp. 313-326, September 1983. [6] Han S., Mao H. and Dally W. J. A., “Deep neural network compression pipeline: Pruning, quantization, huffman encoding.” arXiv Prepr, February 2016. [7] Fu W., Gu X. and Wang Y., “Image quality assessment using edge and contrast similarity.” IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence), pp. 852-855, June 2008. [8] Yap V. V., “Wavelet-based image compression for mobile applications.” Middlesex University. 2005. [9] Yang C. L., Wang F. and Xiao D., “Contourlet transform-based structural similarity for image quality assessment.” IEEE International Conference on Intelligent Computing and Intelligent Systems, pp. 175-179, November 2009. [10] Alhijaj A. A. and Hussein M. K., “Stereo images encryption by OSA & RSA algorithms.” Journal Physics Conference Series, vol.1279, no. 1, pp. 1-7, January. 2019. [11] Hussein M. K., Alhijaj A, “TDL and Ron Rivest, Adi Shamir, and Leonard Adleman in Stereo images encrypt” Journal of Advanced Research in Dynamical and Control Systems-JARDCS, vol. 11, no. 01, pp. 1811-1817, 2018. [12] Sathishkumar G. A., Bhoopathy K., Siriaam N., “Image encryption based on diffusion and multiple chaotic maps.” International Journal of Network Security & Its Applications, vol. 3, no. 2, pp. 181-194, 2011. [13] Sesha P., Indrakanti, Avadhani P. S., “Permutation based Image encryption technique.” International Journal of Computer Applications, vol. 28, no. 8, pp.45-47, August 2011. [14] Wang Z., Bovik A. C., Sheikh H. D. and Simoncelli E., “Image quality assessment: from error visibility to structural similarity,” IEEE Transactions on Image Processing, vol. 4, no. 4, pp. 600-612, April 2004. [15] Xuehu Yan, et al., “A new assessment measure of shadow image quality based on error diffusion techniques.” Journal of Information Hiding and Multimedia Signal Processing, vol. 4, no.2, pp. 118-126, January 2013.
  • 7.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 6, December 2020: 2992 - 2998 2998 [16] Shannon C. E., “Communication theory of secrecy systems.”’ Bell System Technical Journal, vol. 28, no. 4, pp. 656-715, October 1949. [17] Chen G., Mao Y. and Chui C. A., “Symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solitons and Fractals, vol. 21, no. 3, pp. 749-761, July 2004. [18] Mao Y., Chen Y. and Lian S. A., “Novel fast image encryption scheme based on 3D chaotic baker maps, International Journal of Bifurcation and Chaos, vol. 14, no. 10, November 2011. [19] Sencar H. T., Ramkumar M., Akansu A. N., “Data hiding fundamentals and applications.” New York, Elsevier Academic Press, 2004. [20] Chang C. C., Lin C. C., Chen Y. H., “Reversible data-embedding scheme using differences between original and predicted pixel values.” IET Information Security, vol. 2, no. 2, pp. 35-46, June 2008. [21] Hussein M. K., Abdul-Kareem H., “Video compression for communication and storage using wavelet transform and adaptive rood pattern search matching algorithm,” Al-Mustansiriyah Journal of Science, vol. 24, no. 5, pp. 393-406, 2013. [22] Dirankov D., Hellendron H. and Reinfrank M., “An introduction to fuzzy control,” Springer New York. 1993. [23] Haider M., Al-Mashhadi, Iman Q. Abduljaleel, “Color image encryption using chaotic maps, triangular scrambling, with DNA sequences,” International Conference on Current Research in Computer Science and Information Technology (ICCIT), pp. 93-98, April 2017. [24] Haider M., Al-Mashadi, Ala'a A. Khalaf, “Hybrid homomorphic cryptosystem for secure transfer of color image on public cloud,” Journal of Theoretical and Applied Information Technology, vol. 96, no. 19, pp. 6474-6486, 2018. [25] Mitaim, Sanya, and Bart Kosko, “The shape of fuzzy sets in adaptive function approximation.” IEEE Transactions on Fuzzy Systems, vol. 9, no. 4, pp. 637-656, August 2001. [26] Schmidt M., Stidsen T., “Hyprid system: genetic algorithms, neural networks, and fuzzy logic.” Denmark. 1996. [27] Hussein M. K., “Encryption of stereo images after estimated the motion using spatially dependent algorithms.” International Journal of Computer Science and Mobile Computing, vol. 5, no. 12, pp. 150-159, December 2016. BIOGRAPHIES OF AUTHORS Marwah K. Hussein is a lecturer in computer information systems since (2013), University of Basra in Iraq. Her current research interests included information security, Video and image processing. Dr. Kareem Radhi Hassan, is an assistant professor in Computer system department, since (1996), university of Basrah, Iraq. His current research interests include information security, IoT, GIS, AI. Dr. Haider M. Al-Mashhadi, is a professor in computer information systems department since 2003, university of Basrah, Iraq. His research interests in the network and information security, IoT, embedded systems, AI and image processing.