Analysis of traditional and modern image encryption algorithms under realistic ambience

  • PDF / 10,181,312 Bytes
  • 53 Pages / 439.37 x 666.142 pts Page_size
  • 35 Downloads / 146 Views

DOWNLOAD

REPORT


Analysis of traditional and modern image encryption algorithms under realistic ambience Anjali Malik 1 & Shailender Gupta 1 & Sangeeta Dhall 1 Received: 10 June 2019 / Revised: 14 June 2020 / Accepted: 29 June 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract

Cryptography (encryption/decryption) is one of the prevailing mechanisms for protection of information (data or image) in the growing era of computerized exchange. It is the art of securing data/image by changing it into an unreadable format, called cipher text/image. Encryption mechanism is said to be efficient if it offers high security and robustness against attacks, and endow with very low correlation value between cipher and the original information. Enormous techniques and corresponding survey papers are available in literature considering only a few methods or parameters into account, but there is a stern need of investigation, which thoroughly considers vast variety of techniques and compares them in the light of numerous performance metrics under the influence of wide variety of probable threats. In view of the fact, this paper has taken account of almost all traditional, modern, chaotic, and quantum-chaotic based methods under the influence of prevalent intimidation and does a comprehensive investigation based on various performance metrics. To measure the efficacy, all the mechanisms are implemented in MATLAB-2014. Chaos and Quantum based algorithms are the superlative in comparison to others presented in literature under most of the extensive threats (attacks, noises etc.) and can resist brute force attacks due to large key space. In addition, suggestions for future scope have been given. Keywords Attacks . Brute force attacks . Chaotic . Cryptography . Key space . Noises . Performance metrics . Quantum-chaotic . Traditional techniques

* Sangeeta Dhall [email protected] Anjali Malik [email protected] Shailender Gupta [email protected]

1

JCBose University of Science and Technology, YMCA, Faridabad, India

Multimedia Tools and Applications

1 Introduction Accessibility of online transcripts, images, sound, figures or maps in digital form is enhanced with the progression of internet and digital technologies. Once digitalized all the contents are ‘equivalent’ and can be misused, altered or malformed by anyone. Stored Information or during transmission is powerless against a security rupture. These facts support that encryption of the information assumes an indispensable job in protecting its legitimacy regardless of whether it’s open to a cryptanalyst. Different cryptography algorithms are subsequently advanced by researchers. Among these algorithms, those serving to sight and sound security are picking up significance in view of its developing use in significant fields of existence, such as in restorative and military parts and similarly in everyday life. Image encryption is the technique that changes the image into unrecognisable image format which is being transmitted over the transmission