Skip to main content
Log in

Assessment of diverse image encryption mechanisms under prevalent invasion

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Image encryption mechanisms provide confidentiality and concealment of information (image) in transmission over the alleyway, susceptible to prevalent invasions. With escalating threats in cybersecurity, various cryptography techniques were projected by researchers. The abundance of such mechanisms requires systematic investigation so that that appropriate method can be selected for diverse applications. An efficient encryption technique must analyze all the parameters in an ideal situation and practical cases. Numerous survey papers available in the literature for experimental comparison are devoid of many probable attacks such as anti occlusion attack, chosen-plaintext attack, jpeg compression, etc. This paper provides a qualified study of almost all basic, traditional, chaotic, lightweight, quantum, fractal, and qubit based encryption methods under the influence of prevalent intimidation (Salt & Pepper, Gaussian, Poisson, Rotation attack, chosen-plaintext attack, known-plaintext attack, and so on). We thus carried out an experimental and theoretical investigation based on statistical, differential, and quantitative analysis. To measure the efficacy, all the mechanisms are implemented in MATLAB-2014 and provide the standard deviation to each metric. It is observed that the Quantum and Qubit based algorithms are superlative in comparison to others under the majority of extensive threats due to their sensitive behaviour towards initial conditions and highly random behaviour.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Abd El-Latif AA, Li L, Wang N, Han Q, Niu X (2013) A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Process 93(11):2986–3000

    Article  Google Scholar 

  2. Ahmed HEDH, Kalash HM, Allah OF (2007) Encryption efficiency analysis and security evaluation of RC6 block cipher for digital images. In: 2007 International Conference on Electrical Engineering, pp 1–7 IEEE

    Google Scholar 

  3. Ahmed F, Siyal MY, Abbas VU 2010 A perceptually scalable and jpeg compression tolerant image encryption scheme. In 2010 Fourth pacific-rim symposium on image and video technology (pp. 232-238). IEEE

  4. Akhshani A, Akhavan A, Lim SC, Hassan Z (2012) An image encryption scheme based on quantum logistic map. Commun Nonlinear Sci Numer Simul 17(12):4653–4661

    Article  MathSciNet  Google Scholar 

  5. Anderson TW (1958) An introduction to multivariate statistical analysis. Wiley, New York

    MATH  Google Scholar 

  6. Bansal R, Gupta S, Sharma G (2017) An innovative image encryption scheme based on chaotic map and Vigenère scheme. Multimed Tools Appl 76(15):16529–16562

    Article  Google Scholar 

  7. Barker E, Mouha N, 2017 Recommendation for the triple data encryption algorithm (TDEA) block cipher (no. NIST special publication (SP) 800-67 rev. 2 (draft)). National Institute of Standards and Technology

  8. Basu S (2011) International data encryption algorithm (Idea)–a typical illustration. J Global Res Comput Sci 2(7):116–118

    Google Scholar 

  9. Chandra S, Paira S, Alam SS, Goutam S (2014) A comparative survey of symmetric and asymmetric key cryptography. In: 2014 International Conference on Electronics. Computational Engineering (ICECCE), Communication and

    Google Scholar 

  10. Chavan PV, Atique D (2014) Design and implementation of hierarchical visual cryptography with expansion less shares. arXiv preprint arXiv:1402.2745

  11. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals 21(3):749–761

    Article  MathSciNet  Google Scholar 

  12. François M, Grosges T, Barchiesi D, Erra R (2012) A new image encryption scheme based on a chaotic function. Signal Process Image Commun 27(3):249–259

    Article  Google Scholar 

  13. Hanchinamani G, Kulkarni L (2015) An efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher. 3D Res 6(3):30

    Article  Google Scholar 

  14. Jabade V, Gengaje S (2016) Modelling of geometric attacks for digital image watermarking. Int J Innov Eng Res Technol [IJIERT], ISSN:2394–3696

  15. Jain Y, Bansal R, Sharma G, Kumar B, Gupta S (2016) Image encryption schemes: a complete survey. Int J Signal Process, Image Process Pattern Recogn 9(7):157–192

    Google Scholar 

  16. John Justin M, Manimurugan S (2012) A survey on various encryption techniques. Int J Soft Comput Eng (IJSCE) ISSN: 2231-2307 2(1):429–432

    Google Scholar 

  17. Kamble VD, Doke K (2018) A novel survey on image encryption. Int Res J Eng Technol

  18. Kaur M, Kumar V (2018) A comprehensive review on image encryption techniques. Arch Comput Methods Eng:1–29

  19. Kester QA (2013) A hybrid cryptosystem based on Vigenere cipher and columnar transposition cipher. arXiv preprint arXiv:1307.7786.

  20. Kevadia KT, Nayak AM, Patel KS, Patel BU (2016) A literature survey on image encryption. Int J Res Sci Eng Technol 2:741–746

    Google Scholar 

  21. Kohli R (2013) Cryptography on system-Chip Design using VLSI. Lambert Academic Publication House, Germany

    Google Scholar 

  22. Kumar, M., Lahcen, R.A.M., Mohapatra, R.N., Alwala, C. and Kurella, S.V.K., 2020. Review of image encryption techniques. Pp. 31-37.

  23. Kumari M, Gupta S (2018) A novel image encryption scheme based on intertwining chaotic maps and RC4 stream cipher. 3D Res 9(1):10

    Article  Google Scholar 

  24. Kumari M, Gupta S, Sardana P (2017) A survey of image encryption algorithms. 3D Research 8(4):Article No. 148

    Article  Google Scholar 

  25. Kumari M, Gupta S, Malik A (2020) A superlative image encryption technique based on bit plane using key-based electronic code book. Multimed Tools Appl 79(43):33161–33191

    Article  Google Scholar 

  26. Li S, Zhao Y, Qu B (2013) Image scrambling based on chaotic sequences and Veginère cipher. Multimed Tools Appl 66(3):573–588

    Article  Google Scholar 

  27. Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76(20):20739–20753

    Article  Google Scholar 

  28. Licks V, Jordan R (2005) Geometric attacks on image watermarking systems. IEEE Multimedia 12(3):68–78

    Article  Google Scholar 

  29. Liu H, Jin C (2017) A novel color image encryption algorithm based on quantum chaos sequence. 3D Research 8(1):4

    Article  Google Scholar 

  30. Liu X, Xiao D, Xiang Y (2018) Quantum image encryption using intra and inter bit permutation based on logistic map. IEEE Access 7:6937–6946

    Article  Google Scholar 

  31. Loukhaoukha K, Chouinard JY, Berdai (2012) A secure image encryption algorithm based on Rubik's cube principle. J Electr Comput Eng

  32. Mandal S, Das S, Nath A (2014) Data hiding and retrieval using visual cryptography. Int J Innov Res Advan Eng 1:102–110

    Google Scholar 

  33. Matsui M (1994) The first experimental cryptanalysis of the data encryption standard. In: Ann Int Cryptol Conf. Springer, Berlin, pp 1–11

    Google Scholar 

  34. Matthews R (1989) On the derivation of a “chaotic” encryption algorithm. Cryptologia 13(1):29–42

    Article  MathSciNet  Google Scholar 

  35. Mohammad OF, Ahmed Ahmed FYH, Zeebaree SRM (2017) A Survey and Analysis of the Image Encryption Methods. Int J Appl Eng Res ISSN 0973–4562 12(23):13265–13280

    Google Scholar 

  36. Mousa A, Hamad A (2006) Evaluation of the RC4 algorithm for data encryption. IJCSA 3(2):44–56

    Google Scholar 

  37. Mousa A, Hamad A (2006) Evaluation of the RC4 algorithm for data encryption. IJCSA 3(2):44–56

    Google Scholar 

  38. Padmavathi B, Ranjitha Kumari S (2013) A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique. Int J Sci Res (IJSR), India, Online ISSN: 2319–7064 2(4):170–174

    Google Scholar 

  39. Patel S, Vaish A (2020) A systematic survey on image encryption using compressive sensing. J Sci Res 64(1):291–296

    Google Scholar 

  40. Rashi K, Manoj K (2013) Optimized on System Analysis Using AES and X-tea. Int J Adv Res Comput Sci Software Eng (2277-128X) 3(2)

  41. Rayarikar R, Upadhyay S, Pimpale P (2012) SMS encryption using AES algorithm on android. Int J Comput Appl 50(19):12–17

    Google Scholar 

  42. Rivest RL (1996) The RC5 encryption algorithm, from dr. dobb’s journal, january, 1995. In: William Stallings, Practical cryptography for data internetworks. IEEE Computer Society Press

  43. Sam IS, Devaraj P, Bhuvaneswaran RS (2012) A novel image cipher based on mixed transformed logistic maps. Multimed Tools Appl 56(2):315–330

    Article  Google Scholar 

  44. Sam IS, Devaraj P, Bhuvaneswaran RS (2012) An intertwining chaotic maps based image encryption scheme. Nonlinear Dynamics 69(4):1995–2007

    Article  MathSciNet  Google Scholar 

  45. Schneier B (1994) The blowfish encryption algorithm. Dr Dobb's J-Software Tools Professional Programmer 19(4):38–43

    Google Scholar 

  46. Sowjanya PL, Lorraine KS (2016) Image encryption using secure force algorithm with affine transform for wsn. Int J Eng Sci Res Technol

  47. Tanwar G, Mishra N (2015) Survey on Image Encryption Techniques. Int J Adv Res Comput Sci Software Eng, ISSN: 2277 128X 5(12):563–569

    Google Scholar 

  48. Usman M, Ahmed I, Aslam MI, Khan S, Shah UA (2017) SIT: a lightweight encryption algorithm for secure internet of things. arXiv preprint arXiv:1704.08688.

  49. Wang H, Tao X, Huang JS (2019) An improved chessboard covering algorithm with generalized fractal strategy.

    Google Scholar 

  50. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J: Multidiscip J Sci Technol, J Selected Areas Telecommun (JSAT) 1(2):31–38

    Google Scholar 

  51. Ye G, Pan C, Huang X, Zhao Z, He J (2018) A chaotic image encryption algorithm based on information entropy. Int J Bifurcation Chaos 28(01):1850010

    Article  MathSciNet  Google Scholar 

  52. Younes MAB (2019) A survey of the most current image encryption and decryption techniques. Int J Adv Res in Comp Sci 10(1):9

    Article  MathSciNet  Google Scholar 

  53. Zhou N, Chen W, Yan X, Wang Y (2018) Bit-level quantum color image encryption scheme with quantum cross-exchange operation and hyper-chaotic system. Quantum Inform Process 17(6):137

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anjali Malik.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Malik, A., Jadav, S. & Gupta, S. Assessment of diverse image encryption mechanisms under prevalent invasion. Multimed Tools Appl 80, 21521–21559 (2021). https://doi.org/10.1007/s11042-021-10670-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-10670-0

Keywords

Navigation