Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Efficiency Analysis and Security Evaluation of Block based Image Encryption Schemes


Affiliations
1 MCA Dept., PET Engineering College, Vallioor, India
2 Sadakathullah Appa College, Tirunelveli, India
     

   Subscribe/Renew Journal


In open network Encryption is used to transmit data securely. Each type of data has its own features, therefore to protect confidential image data from unauthorized access different techniques should be used. A framework is presented in this paper to evaluate image encryption schemes. A number of parameters such as correlation coefficient, information Entropy and a number of pixel change rate are used to quantify the security of encrypted images instead of visual inspection. Encryption efficiency analysis and security evaluation of some schemes like Zonal Transformation Matrix Method and Primitive Root Based Image Encryption schemes are presented. Experimental results demonstrate that the Zonal Transformation Matrix Method provides effective performance and security compared to primitive ischolar_main based encryption scheme.


Keywords

Encryption, Zonal Transformation Matrix, Primitive Root Theorem.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 141

PDF Views: 2




  • Efficiency Analysis and Security Evaluation of Block based Image Encryption Schemes

Abstract Views: 141  |  PDF Views: 2

Authors

A. Kalai Selvi
MCA Dept., PET Engineering College, Vallioor, India
M. Mohamed Sathik
Sadakathullah Appa College, Tirunelveli, India

Abstract


In open network Encryption is used to transmit data securely. Each type of data has its own features, therefore to protect confidential image data from unauthorized access different techniques should be used. A framework is presented in this paper to evaluate image encryption schemes. A number of parameters such as correlation coefficient, information Entropy and a number of pixel change rate are used to quantify the security of encrypted images instead of visual inspection. Encryption efficiency analysis and security evaluation of some schemes like Zonal Transformation Matrix Method and Primitive Root Based Image Encryption schemes are presented. Experimental results demonstrate that the Zonal Transformation Matrix Method provides effective performance and security compared to primitive ischolar_main based encryption scheme.


Keywords


Encryption, Zonal Transformation Matrix, Primitive Root Theorem.