Open Access Open Access  Restricted Access Subscription or Fee Access

Efficiency Analysis and Security Evaluation of Block based Image Encryption Schemes

Dr. A. Kalai Selvi, Dr.M. Mohamed Sathik

Abstract


In open network Encryption is used to transmit data securely. Each type of data has its own features, therefore to protect confidential image data from unauthorized access different techniques should be used. A framework is presented in this paper to evaluate image encryption schemes. A number of parameters such as correlation coefficient, information Entropy and a number of pixel change rate are used to quantify the security of encrypted images instead of visual inspection. Encryption efficiency analysis and security evaluation of some schemes like Zonal Transformation Matrix Method and Primitive Root Based Image Encryption schemes are presented. Experimental results demonstrate that the Zonal Transformation Matrix Method provides effective performance and security compared to primitive root based encryption scheme.


Keywords


Encryption, Zonal Transformation Matrix, Primitive Root Theorem.

Full Text:

PDF

References


DingWei, QiDongxu: Digital image transform, information hiding and camoufiage technique. Journal of computers. 1998 21: 838 – 843, September, 1998.

A. Shamir, How to share a secret. Communication of the ACM 22’, 1979, pp. 612-613.

M.Naor, Visual Cryptography. In Proceeding of - Eurocrypt ’94, 1994, pp. 441 – 449.

Cao Zhenfu: A threshold key escrow based on public key cryptosystem. Science in China (Series E), 200144: pp. 441 – 448, April, 2001.

Shannon, C.E.: Communication Theory of secrecy systems. Bell System Technical Journal. 1994 28: 656 – 715, April, 1994.

Bidhudendra Acharya, Sarat Kumar Patra and Ganapati Panda “A Novel Cryptosystem Using Matrix Transformation”, Proceedings of SPIT-IEEE Colloquium & International Conference Vol 4, pp. 92 – 95, 2008.

Bidhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra and Saroj Kumar Panigrahy. “Novel Methods of Generating Self Invertible Matrix for Hill Cipher Algorithm”, International Journal of Security (CSS Journals). Vol 1, Issue. (1), pp. 14 – 21, 2007.

H. Cheng and X. Li, “Partial encryption of compressed images and videos,” Signal Processing, IEEE Transactions on, vol. 48, no. 8, pp. 2439–2451, 2000.

S. Lian, Multimedia content encryption: techniques and applications. Auerbach Publications, 2008.

J. Rodrigues, W. Puech, and A. Bors, “Selective encryption of human skin in jpeg images,” in Image Processing, 2006 IEEE International Conference on. IEEE, 2006, pp. 1981–1984.

A. Barbir, “Method and apparatus for performing simultaneous data compression and encryption,” Sep. 19 2000, pp., 122,379.

H. Chang and J. Liu, “A linear quadtree compression scheme for image encryption,” Signal Processing: Image Communication, vol. 10, no. 4, pp. 279–290, 1997.

A. Kalai Selvi, Dr.M. Mohamed Sathik, “Multimedia Security Using Secret Sharing Scheme for Image Encryption”, International Journal of Computer AND Internet Security, 2010, pp. 57-66.

A.Kalai Selvi, Dr.M.Mohamed Sathik,” Polynomial Based Secret Sharing Scheme for Image Encryption Based on Mathematical Theorem”, International Journal of Advanced Research in Computer Science, 201, pp. 284-287.

S. Li, C. Li, K. Lo, and G. Chen, “Cryptanalysis of an image scrambling scheme without bandwidth expansion,” Circuits and Systems for Video Technology, IEEE Transactions on, vol. 18, no. 3, pp. 338–349, 2008.

B. Furht and D. Socek, “a survey of multimedia security,” Comprehensive Report on, 2003.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.