Efficiency and Security of Some Image Encryption Algorithms

This paper describes the results of efficient measuring methods whereby the encryption capability of four algorithms are evaluated. Specifically this work focuses on measuring the encryption quality, the memory requirement and the execution time of the encryption as an indicator to the usage of the software and the hardware. Also, the security analysis of these schemes is investigated from cryptographic viewpoint; statistical and differential attacks. A number of requirements are therefore identified upon which the algorithms are evaluated. The results of the efficient measuring methods show that each algorithm has its own strengths and weaknesses and no single encryption mechanism is able to get the maximum security with minimum execution time. The paper proposes that it may be possible to develop new algorithms providing adequate means of efficiency with acceptable security.

[1]  Elizabeth Chang,et al.  Disguising Text Cryptography using Image Cryptography , 2004 .

[2]  Ibrahim Sogukpinar,et al.  Analysis and Comparison of Image Encryption Algorithms , 2007 .

[3]  Guanrong Chen,et al.  YET ANOTHER CHAOTIC ATTRACTOR , 1999 .

[4]  Borko Furht,et al.  Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[5]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[6]  Jiun-In Guo,et al.  A new chaotic key-based design for image encryption and decryption , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).

[7]  Nikolaos G. Bourbakis,et al.  Image and video encryption using SCAN patterns , 2004, Pattern Recognit..

[8]  Abhijit Mitra,et al.  A New Image Encryption Approach using Combinational Permutation Techniques , 2008 .

[9]  Yang Shuangyuan,et al.  An asymmetric image encryption based on matrix transformation , 2004, IEEE International Symposium on Communications and Information Technology, 2004. ISCIT 2004..

[10]  H.M. Elkamchouchi,et al.  Measuring encryption quality for bitmap images encrypted with rijndael and KAMKAR block ciphers , 2005, Proceedings of the Twenty-Second National Radio Science Conference, 2005. NRSC 2005..

[11]  Guanrong Chen,et al.  A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.