Assessment of diverse image encryption mechanisms under prevalent invasion

Image encryption mechanisms provide confidentiality and concealment of information (image) in transmission over the alleyway, susceptible to prevalent invasions. With escalating threats in cybersecurity, various cryptography techniques were projected by researchers. The abundance of such mechanisms requires systematic investigation so that that appropriate method can be selected for diverse applications. An efficient encryption technique must analyze all the parameters in an ideal situation and practical cases. Numerous survey papers available in the literature for experimental comparison are devoid of many probable attacks such as anti occlusion attack, chosen-plaintext attack, jpeg compression, etc. This paper provides a qualified study of almost all basic, traditional, chaotic, lightweight, quantum, fractal, and qubit based encryption methods under the influence of prevalent intimidation (Salt & Pepper, Gaussian, Poisson, Rotation attack, chosen-plaintext attack, known-plaintext attack, and so on). We thus carried out an experimental and theoretical investigation based on statistical, differential, and quantitative analysis. To measure the efficacy, all the mechanisms are implemented in MATLAB-2014 and provide the standard deviation to each metric. It is observed that the Quantum and Qubit based algorithms are superlative in comparison to others under the majority of extensive threats due to their sensitive behaviour towards initial conditions and highly random behaviour.

[1]  Zhenyu Zhao,et al.  A Chaotic Image Encryption Algorithm Based on Information Entropy , 2018, Int. J. Bifurc. Chaos.

[2]  Sandipan Basu INTERNATIONAL DATA ENCRYPTION ALGORITHM (IDEA) - A TYPICAL ILLUSTRATION , 2011 .

[3]  L. Kulkarni,et al.  An Efficient Image Encryption Scheme Based on a Peter De Jong Chaotic Map and a RC4 Stream Cipher , 2015 .

[4]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[5]  Mitsuru Matsui,et al.  The First Experimental Cryptanalysis of the Data Encryption Standard , 1994, CRYPTO.

[6]  I. Shatheesh Sam,et al.  A novel image cipher based on mixed transformed logistic maps , 2010, Multimedia Tools and Applications.

[7]  Robert A. J. Matthews,et al.  On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.

[8]  Xin Liao,et al.  Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform , 2017, Multimedia Tools and Applications.

[9]  Di Xiao,et al.  Quantum Image Encryption Using Intra and Inter Bit Permutation Based on Logistic Map , 2019, IEEE Access.

[10]  Priyanka Pimpale,et al.  SMS Encryption using AES Algorithm on Android , 2012 .

[11]  R. S. Bhuvaneswaran,et al.  An intertwining chaotic maps based image encryption scheme , 2012 .

[12]  Dominique Barchiesi,et al.  A new image encryption scheme based on a chaotic function , 2012, Signal Process. Image Commun..

[13]  Ahmad Hamad,et al.  Evaluation of the RC4 Algorithm for Data Encryption , 2006, Int. J. Comput. Sci. Appl..

[14]  Goutam Sanyal,et al.  A comparative survey of Symmetric and Asymmetric Key Cryptography , 2014, 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE).

[15]  Gaurav Sharma,et al.  Image Encryption Schemes: A Complete Survey , 2016 .

[16]  Shailender Gupta,et al.  A superlative image encryption technique based on bit plane using key-based electronic code book , 2020, Multimedia Tools and Applications.

[17]  Archana M. Nayak,et al.  A Literature Survey on Image Encryption , 2016 .

[18]  Cong Jin,et al.  A Novel Color Image Encryption Algorithm Based on Quantum Chaos Sequence , 2017 .

[19]  S. Agaian,et al.  NPCR and UACI Randomness Tests for Image Encryption , 2011 .

[20]  A. Akhavan,et al.  An image encryption scheme based on quantum logistic map , 2012 .

[21]  Shanshan Li,et al.  Image scrambling based on chaotic sequences and Veginère cipher , 2013, Multimedia Tools and Applications.

[22]  Mohammad Ali Bani Younes,et al.  A SURVEY OF THE MOST CURRENT IMAGE ENCRYPTION AND DECRYPTION TECHNIQUES , 2019, International Journal of Advanced Research in Computer Science.

[23]  Saumya Patel,et al.  A systematic survey on Image Encryption using Compressive Sensing , 2020 .

[24]  Shailender Gupta,et al.  A Novel Image Encryption Scheme Based on Intertwining Chaotic Maps and RC4 Stream Cipher , 2018 .

[25]  Nishchol Mishra,et al.  Survey on Image Encryption Techniques , 2015 .

[26]  Ramiro Jordan,et al.  Geometric attacks on image watermarking systems , 2005, IEEE MultiMedia.

[27]  Weiwei Chen,et al.  Bit-level quantum color image encryption scheme with quantum cross-exchange operation and hyper-chaotic system , 2018, Quantum Information Processing.

[28]  T. W. Anderson An Introduction to Multivariate Statistical Analysis , 1959 .

[29]  Li Li,et al.  A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces , 2013, Signal Process..

[30]  Osama S. Farag Allah,et al.  Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images , 2007 .

[31]  Shailender Gupta,et al.  A Survey of Image Encryption Algorithms , 2017 .

[32]  Gaurav Sharma,et al.  An innovative image encryption scheme based on chaotic map and Vigenère scheme , 2016, Multimedia Tools and Applications.