A Benchmark for Performance Evaluation and Security Assessment of Image Encryption Schemes

Digital images have become part of everyday life by demonstrating its usability in a variety of fields from education to space research. Confidentiality and security of digital images have grown significantly with increasing trend of information interchange over the public channel. Cryptography can be used as a successful technique to prevent image data from unauthorized access. Keeping the nature of image data in mind, several encryption techniques are presented specifically for digital images, in literature during past few years. These cryptographic algorithms lack a benchmark for evaluation of their performance, cryptographic security and quality analysis of recovered images. In this study, we have designed and developed a benchmark based on all the parameters necessary for a good image encryption scheme. Extensive studies have been made to categories all the parameters used by different researchers to evaluate their algorithms and an optimum benchmark for evaluation is formulated. This benchmark is used to evaluate three image encryption schemes. The results of evaluation have highlighted the specific application areas for these image encryption schemes.

[1]  Stefan Winkler,et al.  The Evolution of Video Quality Measurement: From PSNR to Hybrid Metrics , 2008, IEEE Transactions on Broadcasting.

[2]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[3]  Mohsen Rahmani,et al.  A new modified version of Advanced Encryption Standard based algorithm for image encryption , 2010, 2010 International Conference on Electronics and Information Engineering.

[4]  Shiguo Lian,et al.  Multimedia Content Encryption: Techniques and Applications , 2008 .

[5]  M Bhakti priya,et al.  A New Modified Version Of Advanced Encryption Standard Based Algorithm for Image Encryption , 2018 .

[6]  Kwok-Tung Lo,et al.  Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2011, Signal Process..

[7]  S. El-Rabaie,et al.  Homomorphic image encryption , 2009, J. Electronic Imaging.

[8]  Hui Liu,et al.  Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map , 2013, IET Inf. Secur..

[9]  Li Hong,et al.  A Novel Image Scrambling Algorithm for Digital Watermarking Based on Chaotic Sequences , 2006 .

[10]  Asif Irshad Khan,et al.  Secure Communication using Symmetric and Asymmetric Cryptographic Techniques , 2012 .

[11]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[12]  Hai Yu,et al.  A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism , 2015, Commun. Nonlinear Sci. Numer. Simul..

[13]  Osama M. Abu Zaid,et al.  Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms , 2007, Int. J. Netw. Secur..

[14]  R. Gray Entropy and Information Theory , 1990, Springer New York.

[15]  P. Naskar,et al.  A Secure Symmetric Image Encryption Based on Bit-wise Operation , 2014 .

[16]  Ali Kanso,et al.  An efficient and robust image encryption scheme for medical applications , 2015, Commun. Nonlinear Sci. Numer. Simul..

[17]  Ming-yang Yu,et al.  Image Encryption Based on Improved Chaotic Sequences , 2013, J. Multim..

[18]  Nikolaos G. Bourbakis,et al.  A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..

[19]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[20]  S. Agaian,et al.  NPCR and UACI Randomness Tests for Image Encryption , 2011 .

[21]  T. Sivakumar,et al.  A Novel Image Encryption Approach using Matrix Reordering , 2013 .

[22]  Osama S. Faragallah,et al.  Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images , 2007, 2007 International Conference on Electrical Engineering.

[23]  Ruisong Ye,et al.  An Image Encryption Scheme with Efficient Permutation and Diffusion Processes , 2011 .

[24]  W. Tang,et al.  A fast image encryption system based on chaotic maps with finite precision representation , 2007 .

[25]  Abdennaceur Kachouri,et al.  Implementation of RC5 and RC6 block ciphers on digital images , 2011, Eighth International Multi-Conference on Systems, Signals & Devices.

[26]  Christophe De Vleeschouwer,et al.  Overview on Selective Encryption of Image and Video: Challenges and Perspectives , 2008, EURASIP J. Inf. Secur..

[27]  Xingyuan Wang,et al.  Novel image encryption algorithm based on cycle shift and chaotic system , 2015 .

[28]  Amin Y. Noaman,et al.  Encryption Quality Analysis of the RCBC Block Cipher Compared with RC6 and RC5 Algorithms , 2014, IACR Cryptol. ePrint Arch..

[29]  Vikas Saxena,et al.  Performance Study on Image Encryption Schemes , 2011, ArXiv.

[30]  Kevin Curran,et al.  Securing information content using new encryption method and Steganography , 2008, 2008 Third International Conference on Digital Information Management.