Nisar Ahmed

Work place: Department of Computer Science and Engineering, University of Engineering and Technology Lahore, Pakistan

E-mail: nisarahmedrana@yahoo.com

Website:

Research Interests: Computer systems and computational processes, Computer Vision, Computer Architecture and Organization, Computer Graphics and Visualization, Network Security

Biography

Nisar Ahmed is a PhD scholar at Department of Computer Science and Engineering, University of Engineering and Technology Lahore. He has done MS Computer Engineering from the same institute. His areas of interest includes Multimedia Security, Computer Vision and Machine Leanring.

Author Articles
A Benchmark for Performance Evaluation and Security Assessment of Image Encryption Schemes

By Nisar Ahmed Hafiz Muhammad Shahzad Asif Gulshan Saleem

DOI: https://doi.org/10.5815/ijcnis.2016.12.03, Pub. Date: 8 Dec. 2016

Digital images have become part of everyday life by demonstrating its usability in a variety of fields from education to space research. Confidentiality and security of digital images have grown significantly with increasing trend of information interchange over the public channel. Cryptography can be used as a successful technique to prevent image data from unauthorized access. Keeping the nature of image data in mind, several encryption techniques are presented specifically for digital images, in literature during past few years. These cryptographic algorithms lack a benchmark for evaluation of their performance, cryptographic security and quality analysis of recovered images. In this study, we have designed and developed a benchmark based on all the parameters necessary for a good image encryption scheme. Extensive studies have been made to categories all the parameters used by different researchers to evaluate their algorithms and an optimum benchmark for evaluation is formulated. This benchmark is used to evaluate three image encryption schemes. The results of evaluation have highlighted the specific application areas for these image encryption schemes.

[...] Read more.
Other Articles