Abstract
Image encryption mechanisms provide confidentiality and concealment of information (image) in transmission over the alleyway, susceptible to prevalent invasions. With escalating threats in cybersecurity, various cryptography techniques were projected by researchers. The abundance of such mechanisms requires systematic investigation so that that appropriate method can be selected for diverse applications. An efficient encryption technique must analyze all the parameters in an ideal situation and practical cases. Numerous survey papers available in the literature for experimental comparison are devoid of many probable attacks such as anti occlusion attack, chosen-plaintext attack, jpeg compression, etc. This paper provides a qualified study of almost all basic, traditional, chaotic, lightweight, quantum, fractal, and qubit based encryption methods under the influence of prevalent intimidation (Salt & Pepper, Gaussian, Poisson, Rotation attack, chosen-plaintext attack, known-plaintext attack, and so on). We thus carried out an experimental and theoretical investigation based on statistical, differential, and quantitative analysis. To measure the efficacy, all the mechanisms are implemented in MATLAB-2014 and provide the standard deviation to each metric. It is observed that the Quantum and Qubit based algorithms are superlative in comparison to others under the majority of extensive threats due to their sensitive behaviour towards initial conditions and highly random behaviour.
Similar content being viewed by others
References
Abd El-Latif AA, Li L, Wang N, Han Q, Niu X (2013) A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Process 93(11):2986–3000
Ahmed HEDH, Kalash HM, Allah OF (2007) Encryption efficiency analysis and security evaluation of RC6 block cipher for digital images. In: 2007 International Conference on Electrical Engineering, pp 1–7 IEEE
Ahmed F, Siyal MY, Abbas VU 2010 A perceptually scalable and jpeg compression tolerant image encryption scheme. In 2010 Fourth pacific-rim symposium on image and video technology (pp. 232-238). IEEE
Akhshani A, Akhavan A, Lim SC, Hassan Z (2012) An image encryption scheme based on quantum logistic map. Commun Nonlinear Sci Numer Simul 17(12):4653–4661
Anderson TW (1958) An introduction to multivariate statistical analysis. Wiley, New York
Bansal R, Gupta S, Sharma G (2017) An innovative image encryption scheme based on chaotic map and Vigenère scheme. Multimed Tools Appl 76(15):16529–16562
Barker E, Mouha N, 2017 Recommendation for the triple data encryption algorithm (TDEA) block cipher (no. NIST special publication (SP) 800-67 rev. 2 (draft)). National Institute of Standards and Technology
Basu S (2011) International data encryption algorithm (Idea)–a typical illustration. J Global Res Comput Sci 2(7):116–118
Chandra S, Paira S, Alam SS, Goutam S (2014) A comparative survey of symmetric and asymmetric key cryptography. In: 2014 International Conference on Electronics. Computational Engineering (ICECCE), Communication and
Chavan PV, Atique D (2014) Design and implementation of hierarchical visual cryptography with expansion less shares. arXiv preprint arXiv:1402.2745
Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals 21(3):749–761
François M, Grosges T, Barchiesi D, Erra R (2012) A new image encryption scheme based on a chaotic function. Signal Process Image Commun 27(3):249–259
Hanchinamani G, Kulkarni L (2015) An efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher. 3D Res 6(3):30
Jabade V, Gengaje S (2016) Modelling of geometric attacks for digital image watermarking. Int J Innov Eng Res Technol [IJIERT], ISSN:2394–3696
Jain Y, Bansal R, Sharma G, Kumar B, Gupta S (2016) Image encryption schemes: a complete survey. Int J Signal Process, Image Process Pattern Recogn 9(7):157–192
John Justin M, Manimurugan S (2012) A survey on various encryption techniques. Int J Soft Comput Eng (IJSCE) ISSN: 2231-2307 2(1):429–432
Kamble VD, Doke K (2018) A novel survey on image encryption. Int Res J Eng Technol
Kaur M, Kumar V (2018) A comprehensive review on image encryption techniques. Arch Comput Methods Eng:1–29
Kester QA (2013) A hybrid cryptosystem based on Vigenere cipher and columnar transposition cipher. arXiv preprint arXiv:1307.7786.
Kevadia KT, Nayak AM, Patel KS, Patel BU (2016) A literature survey on image encryption. Int J Res Sci Eng Technol 2:741–746
Kohli R (2013) Cryptography on system-Chip Design using VLSI. Lambert Academic Publication House, Germany
Kumar, M., Lahcen, R.A.M., Mohapatra, R.N., Alwala, C. and Kurella, S.V.K., 2020. Review of image encryption techniques. Pp. 31-37.
Kumari M, Gupta S (2018) A novel image encryption scheme based on intertwining chaotic maps and RC4 stream cipher. 3D Res 9(1):10
Kumari M, Gupta S, Sardana P (2017) A survey of image encryption algorithms. 3D Research 8(4):Article No. 148
Kumari M, Gupta S, Malik A (2020) A superlative image encryption technique based on bit plane using key-based electronic code book. Multimed Tools Appl 79(43):33161–33191
Li S, Zhao Y, Qu B (2013) Image scrambling based on chaotic sequences and Veginère cipher. Multimed Tools Appl 66(3):573–588
Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76(20):20739–20753
Licks V, Jordan R (2005) Geometric attacks on image watermarking systems. IEEE Multimedia 12(3):68–78
Liu H, Jin C (2017) A novel color image encryption algorithm based on quantum chaos sequence. 3D Research 8(1):4
Liu X, Xiao D, Xiang Y (2018) Quantum image encryption using intra and inter bit permutation based on logistic map. IEEE Access 7:6937–6946
Loukhaoukha K, Chouinard JY, Berdai (2012) A secure image encryption algorithm based on Rubik's cube principle. J Electr Comput Eng
Mandal S, Das S, Nath A (2014) Data hiding and retrieval using visual cryptography. Int J Innov Res Advan Eng 1:102–110
Matsui M (1994) The first experimental cryptanalysis of the data encryption standard. In: Ann Int Cryptol Conf. Springer, Berlin, pp 1–11
Matthews R (1989) On the derivation of a “chaotic” encryption algorithm. Cryptologia 13(1):29–42
Mohammad OF, Ahmed Ahmed FYH, Zeebaree SRM (2017) A Survey and Analysis of the Image Encryption Methods. Int J Appl Eng Res ISSN 0973–4562 12(23):13265–13280
Mousa A, Hamad A (2006) Evaluation of the RC4 algorithm for data encryption. IJCSA 3(2):44–56
Mousa A, Hamad A (2006) Evaluation of the RC4 algorithm for data encryption. IJCSA 3(2):44–56
Padmavathi B, Ranjitha Kumari S (2013) A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique. Int J Sci Res (IJSR), India, Online ISSN: 2319–7064 2(4):170–174
Patel S, Vaish A (2020) A systematic survey on image encryption using compressive sensing. J Sci Res 64(1):291–296
Rashi K, Manoj K (2013) Optimized on System Analysis Using AES and X-tea. Int J Adv Res Comput Sci Software Eng (2277-128X) 3(2)
Rayarikar R, Upadhyay S, Pimpale P (2012) SMS encryption using AES algorithm on android. Int J Comput Appl 50(19):12–17
Rivest RL (1996) The RC5 encryption algorithm, from dr. dobb’s journal, january, 1995. In: William Stallings, Practical cryptography for data internetworks. IEEE Computer Society Press
Sam IS, Devaraj P, Bhuvaneswaran RS (2012) A novel image cipher based on mixed transformed logistic maps. Multimed Tools Appl 56(2):315–330
Sam IS, Devaraj P, Bhuvaneswaran RS (2012) An intertwining chaotic maps based image encryption scheme. Nonlinear Dynamics 69(4):1995–2007
Schneier B (1994) The blowfish encryption algorithm. Dr Dobb's J-Software Tools Professional Programmer 19(4):38–43
Sowjanya PL, Lorraine KS (2016) Image encryption using secure force algorithm with affine transform for wsn. Int J Eng Sci Res Technol
Tanwar G, Mishra N (2015) Survey on Image Encryption Techniques. Int J Adv Res Comput Sci Software Eng, ISSN: 2277 128X 5(12):563–569
Usman M, Ahmed I, Aslam MI, Khan S, Shah UA (2017) SIT: a lightweight encryption algorithm for secure internet of things. arXiv preprint arXiv:1704.08688.
Wang H, Tao X, Huang JS (2019) An improved chessboard covering algorithm with generalized fractal strategy.
Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J: Multidiscip J Sci Technol, J Selected Areas Telecommun (JSAT) 1(2):31–38
Ye G, Pan C, Huang X, Zhao Z, He J (2018) A chaotic image encryption algorithm based on information entropy. Int J Bifurcation Chaos 28(01):1850010
Younes MAB (2019) A survey of the most current image encryption and decryption techniques. Int J Adv Res in Comp Sci 10(1):9
Zhou N, Chen W, Yan X, Wang Y (2018) Bit-level quantum color image encryption scheme with quantum cross-exchange operation and hyper-chaotic system. Quantum Inform Process 17(6):137
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Malik, A., Jadav, S. & Gupta, S. Assessment of diverse image encryption mechanisms under prevalent invasion. Multimed Tools Appl 80, 21521–21559 (2021). https://doi.org/10.1007/s11042-021-10670-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-10670-0