Encryption Quality Evaluation of Robust Chaotic Block Cipher for Digital Imaging

The visual inspection is an important fac tor in examining encrypted images, where the highly disappeared features of the image, the better the encryption al gorithm used. However, depending on the visual inspection only is not enough in judging the quality of complete hiding of the co ntent of the data image. In this paper, we estimate the degree of image encryption quality not only practically using visua l inspection, but also quantitatively using quality evaluation me trics. The efficient robust chaotic block cipher (RCBC) encryp tion quality algorithm for digital imaging is investigat ed. Comparative analysis regarding encryption quality (EQ) of the RCBC with algorithms such as RC6, and RC5 is performed. Ciphers design parameters are analyzed for their opt imal values, as function of different ciphers operation modes, i ncluding ECB, CBC, CFB, and OFB. Thorough experimental tests are carried out with detailed analysis demonstrating the better performance of the RCBC block cipher.

[1]  Bahram Javidi,et al.  Security analysis of optical encryption , 2005, Security + Defence.

[2]  Amin Y. Noaman,et al.  Security Evaluation of Robust Chaotic Block Cipher , 2014 .

[3]  Osama M. Abu Zaid,et al.  Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms , 2007, Int. J. Netw. Secur..

[4]  Osama S. Faragallah,et al.  Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images , 2007, 2007 International Conference on Electrical Engineering.

[5]  Bhavana Agrawal,et al.  Implementation of Various Cryptosystem Using Chaos , 2013 .

[6]  Christophe De Vleeschouwer,et al.  Overview on Selective Encryption of Image and Video: Challenges and Perspectives , 2008, EURASIP J. Inf. Secur..

[7]  Anne Canteaut Similarities between Encryption and Decryption: How far can we go? , 2013 .

[8]  Anne Canteaut,et al.  PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version) , 2012, IACR Cryptol. ePrint Arch..

[9]  Alireza Jolfaei,et al.  A new approach to measure quality of image encryption , 2010 .

[10]  Osama S. Farag Allah,et al.  Encryption quality analysis of the RC5 block cipher algorithm for digital images , 2006 .

[11]  John Bosco Balaguru Rayappan,et al.  Why Image Encryption for Better Steganography , 2013 .

[12]  Manish Manoria,et al.  A Novel Approach for Image Encryption by New M Box Encryption Algorithm using Block based Transformation along with Shuffle Operation , 2012 .

[13]  Sandipan Basu INTERNATIONAL DATA ENCRYPTION ALGORITHM (IDEA) - A TYPICAL ILLUSTRATION , 2011 .

[14]  J. Eloff,et al.  Encryption Techniques: a Timeline Approach † , 2004 .

[15]  Anne Canteaut,et al.  PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract , 2012, ASIACRYPT.

[16]  G. N. Krishnamurthy,et al.  Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images , 2009, ArXiv.

[17]  Andrew K. Wright,et al.  Low-Latency Cryptographic Protection for SCADA Communications , 2004, ACNS.

[18]  Alireza Jolfaei,et al.  Image Encryption Using Chaos and Block Cipher , 2010, Comput. Inf. Sci..

[19]  Bhavana Agrawal,et al.  Implementation of AES and RSA Using Chaos System , 2013 .