Performance Evaluation of Enhanced RC6 Permutation-Diffusion Operation in Securing Images

Several modifications and analysis on encryption performance and security were studied and evaluated by several researchers to measure the efficiency and quality of the proposed enhancement in the encryption method. In this paper, the authors evaluated the performance of the image encryption using the enhanced RC6 permutation-diffusion operation integrating the concept of cyclic-shift permutation. Statistical analysis, key space analysis, and runtime execution analysis were conducted based on considered metrics such as key sensitiveness, histogram and maximum deviation, mean squared error, mean value analysis and the speed measurement of encryption and decryption process. Based on the numerical and visual results, the good qualities of encryption using this method were achieved.

[1]  Jean-Yves Chouinard,et al.  A Secure Image Encryption Algorithm Based on Rubik's Cube Principle , 2012, J. Electr. Comput. Eng..

[2]  C. Seldev Christopher,et al.  Novel Scheme for Compressed Image Authentication Using LSB Watermarking and EMRC6 Encryption , 2016 .

[3]  Lokesh Singh,et al.  An Efficient RC6 based Image Cryptography to Enhance Correlation and Entropy , 2016 .

[4]  Yong Wang,et al.  A new chaos-based fast image encryption algorithm , 2011, Appl. Soft Comput..

[5]  Mohie M. Hadhoud,et al.  Performance Evaluation of Symmetric Encryption Algorithms , 2008 .

[6]  Fathi E. Abd El-Samie,et al.  3-D Image Encryption Based on Rubik’s Cube and RC6 Algorithm , 2017 .

[7]  S. El-Rabaie,et al.  A New Method for Encrypting Images with Few Details Using Rijndael and RC6 Block Ciphers in the Electronic Code Book Mode , 2012, Inf. Secur. J. A Glob. Perspect..

[8]  Archana M. Nayak,et al.  A Literature Survey on Image Encryption , 2016 .

[9]  Vikas Tyagi,et al.  ENHANCEMENT OF RC6 (RC6_EN) BLOCK CIPHER ALGORITHM AND COMPARISON WITH RC5 & RC6 , 2012 .

[10]  Chetan Gupta,et al.  An Enhanced Secure Image Cryptography based on RC6 and RSA to Minimize Entropy and Improve Correlation , 2016 .

[11]  P. Naskar,et al.  A Secure Symmetric Image Encryption Based on Bit-wise Operation , 2014 .

[12]  Shujun Li,et al.  Cryptanalysis of a chaotic image encryption method , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[13]  Mohammed Ali Hussain,et al.  Performance and Security Analysis for Image Encryption using Key Image , 2015 .

[14]  Ariel M. Sison,et al.  Enhanced RC6 permutation-diffusion operation for image encryption , 2018, DSIT '18.

[15]  Man Young Rhee,et al.  Internet Security: Cryptographic Principles, Algorithms and Protocols , 2003 .

[16]  Anupkumar M Bongale,et al.  Image Encryption based on FEAL Algorithm , 2013 .

[17]  Jawad Ahmad,et al.  Efficiency Analysis and Security Evaluation of Image Encryption Schemes , 2012 .

[18]  Osama S. Faragallah,et al.  Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images , 2007, 2007 International Conference on Electrical Engineering.

[19]  Mohsen Guizani,et al.  The rise of ransomware and emerging security challenges in the Internet of Things , 2017, Comput. Networks.

[20]  Salwa K. Abd-El-Hafiz,et al.  Symmetric encryption algorithms using chaotic and non-chaotic generators: A review , 2015, Journal of advanced research.

[21]  Gaurav Bhatnagar,et al.  A secure image encryption algorithm based on polar decomposition , 2018, 2018 IEEE 14th International Colloquium on Signal Processing & Its Applications (CSPA).

[22]  Jinsheng Sun,et al.  A block cipher based on a suitable use of the chaotic standard map , 2005 .

[23]  Jun Wang,et al.  Image encryption algorithm based on chaotic system and dynamic S-boxes composed of DNA sequences , 2015, Multimedia Tools and Applications.

[24]  Kirti Aggarwal Comparison of RC6, modified RC6 & enhancement of RC6 , 2015, 2015 International Conference on Advances in Computer Engineering and Applications.

[25]  S. Agaian,et al.  NPCR and UACI Randomness Tests for Image Encryption , 2011 .

[26]  Nisar Ahmed,et al.  A Benchmark for Performance Evaluation and Security Assessment of Image Encryption Schemes , 2016 .