A Benchmark for Performance Evaluation and Security Assessment of Image Encryption Schemes

Full Text (PDF, 1616KB), PP.18-29

Views: 0 Downloads: 0

Author(s)

Nisar Ahmed 1,* Hafiz Muhammad Shahzad Asif 1 Gulshan Saleem 2

1. Department of Computer Science and Engineering, University of Engineering and Technology Lahore, Pakistan

2. Department of Computer Engineering, EME College, National University of Science and Technology, Pakistan

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2016.12.03

Received: 3 Apr. 2016 / Revised: 12 Jul. 2016 / Accepted: 11 Sep. 2016 / Published: 8 Dec. 2016

Index Terms

Image encryption, cryptographic security, encryption performance, cryptographic benchmark

Abstract

Digital images have become part of everyday life by demonstrating its usability in a variety of fields from education to space research. Confidentiality and security of digital images have grown significantly with increasing trend of information interchange over the public channel. Cryptography can be used as a successful technique to prevent image data from unauthorized access. Keeping the nature of image data in mind, several encryption techniques are presented specifically for digital images, in literature during past few years. These cryptographic algorithms lack a benchmark for evaluation of their performance, cryptographic security and quality analysis of recovered images. In this study, we have designed and developed a benchmark based on all the parameters necessary for a good image encryption scheme. Extensive studies have been made to categories all the parameters used by different researchers to evaluate their algorithms and an optimum benchmark for evaluation is formulated. This benchmark is used to evaluate three image encryption schemes. The results of evaluation have highlighted the specific application areas for these image encryption schemes.

Cite This Paper

Nisar Ahmed, Hafiz Muhammad Shahzad Asif, Gulshan Saleem, "A Benchmark for Performance Evaluation and Security Assessment of Image Encryption Schemes", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.12, pp.18-29, 2016. DOI:10.5815/ijcnis.2016.12.03

Reference

[1]Stallings, W., Cryptography and network security, principles and practices, 2003. Practice Hall.
[2]Li, C. and K.-T. Lo, Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal processing, 2011. 91(4): p. 949-954.
[3]Omar M.Barukab, Asif Irshad Khan, Mahaboob Sharief Shaik , MV Ramana Murthy, Shahid Ali Khan,"Secure Communication using Symmetric and Asymmetric Cryptographic Techniques", IJIEEB, vol.4, no.2, pp.36-42, 2012.
[4]Prabir Kr. Naskar,Atal Chaudhuri,"A Secure Symmetric Image Encryption Based on Bit-wise Operation", IJIGSP, vol.6, no.2, pp.30-38, 2014.DOI: 10.5815/ijigsp.2014.02.04
[5]Daemen, J. and V. Rijmen, AES Proposal: Rijndael, AES algorithm submission, September 3, 1999. URL http://www. nist. gov/CryptoToolKit, 1999.
[6]Nisar Ahmed, Y.S., Hafiz Adnan Habib, Design and Analysis of a Compression Friendly Image Encryption Scheme. Computers & Electrical Engineering - Journal - Elsevier, 2015.
[7]Ye, R., An Image Encryption Scheme with Efficient Permutation and Diffusion Processes, in Advances in Computer Science and Education Applications2011, Springer. p. 32-39.
[8]Winkler, S. and P. Mohandas, The evolution of video quality measurement: from PSNR to hybrid metrics. Broadcasting, IEEE Transactions on, 2008. 54(3): p. 660-668.
[9]Shannon, C.E., Communication theory of secrecy systems*. Bell system technical journal, 1949. 28(4): p. 656-715.
[10]Gray, R.M., Entropy and information theory2011: Springer Science & Business Media.
[11]Ragab, A.H.M., O.S.F. Alla, and A.Y. Noaman, Encryption Quality Analysis of the RCBC Block Cipher Compared with RC6 and RC5 Algorithms. IACR Cryptology ePrint Archive, 2014. 2014: p. 169.
[12]Kanso, A. and M. Ghebleh, An efficient and robust image encryption scheme for medical applications. Communications in Nonlinear Science and Numerical Simulation, 2015.
[13]Chen, J.-x., et al., A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Communications in Nonlinear Science and Numerical Simulation, 2015. 20(3): p. 846-860.
[14]Wang, X.-Y., S.-X. Gu, and Y.-Q. Zhang, Novel image encryption algorithm based on cycle shift and chaotic system. Optics and Lasers in Engineering, 2015. 68: p. 126-134.
[15]Yu, M.-y., Image Encryption Based on Improved Chaotic Sequences. Journal of Multimedia, 2013. 8(6): p. 802-808.
[16]Elashry, I.F., et al., Homomorphic image encryption. Journal of Electronic Imaging, 2009. 18(3): p. 033002-033002-14.
[17]Kwok, H. and W.K. Tang, A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons & Fractals, 2007. 32(4): p. 1518-1529.
[18]Kamali, S.H., et al. A new modified version of advanced encryption standard based algorithm for image encryption. in Electronics and Information Engineering (ICEIE), 2010 International Conference On. 2010. IEEE.
[19]El Fishawy, N.F. and O.M.A. Zaid, Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms. IJ Network Security, 2007. 5(3): p. 241-251.
[20]Ahmed, H.E.-d.H., H.M. Kalash, and O.S.F. Allah. Encryption efficiency analysis and security evaluation of RC6 block cipher for digital images. in Electrical Engineering, 2007. ICEE'07. International Conference on. 2007. IEEE.
[21]Mohamed, A.B., G. Zaibi, and A. Kachouri. Implementation of rc5 and rc6 block ciphers on digital images. in Systems, Signals and Devices (SSD), 2011 8th International Multi-Conference on. 2011. IEEE.
[22]Cheddad, A., et al. Securing information content using new encryption method and steganography. in Digital Information Management, 2008. ICDIM 2008. Third International Conference on. 2008. IEEE.
[23]Liehuang, Z., et al., A novel image scrambling algorithm for digital watermarking based on chaotic sequences. International Journal of Computer Science and Network Security, 2006. 6(8B): p. 125-130.
[24]Massoudi, A., et al., Overview on selective encryption of image and video: challenges and perspectives. EURASIP Journal on Information Security, 2008. 2008: p. 5.
[25]Wu, Y., J.P. Noonan, and S. Agaian, NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT), 2011: p. 31-38.
[26]Li, J. and H. Liu, Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map. Information Security, IET, 2013. 7(4): p. 265-270.
[27]Gaddam, S.C., Drawing Color Histograms and Color Clouds, in Color Histograms01-08-2010, Boston University: Boston, MA 02215, United States.
[28]Sivakumar, T. and R. Venkatesan, A Novel Image Encryption Approach using Matrix Reordering. WSEAS Transactions on Computers, 2013. 12(11).
[29]Lian, S., Multimedia content encryption: techniques and applications2008: CRC press.
[30]Mohamed M. Fouad, Richard M. Dansereau,"Lossless Image Compression Using A Simplified MED Algorithm with Integer Wavelet Transform", IJIGSP, vol.6, no.1, pp.18-23, 2014.DOI: 10.5815/ijigsp.2014.01.03
[31]Shah, J. and V. Saxena, Performance Study on Image Encryption Schemes. arXiv preprint arXiv:1112.0836, 2011.