Loading…
Assessment of diverse image encryption mechanisms under prevalent invasion
Image encryption mechanisms provide confidentiality and concealment of information (image) in transmission over the alleyway, susceptible to prevalent invasions. With escalating threats in cybersecurity, various cryptography techniques were projected by researchers. The abundance of such mechanisms...
Saved in:
Published in: | Multimedia tools and applications 2021-06, Vol.80 (14), p.21521-21559 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Image encryption mechanisms provide confidentiality and concealment of information (image) in transmission over the alleyway, susceptible to prevalent invasions. With escalating threats in cybersecurity, various cryptography techniques were projected by researchers. The abundance of such mechanisms requires systematic investigation so that that appropriate method can be selected for diverse applications. An efficient encryption technique must analyze all the parameters in an ideal situation and practical cases. Numerous survey papers available in the literature for experimental comparison are devoid of many probable attacks such as anti occlusion attack, chosen-plaintext attack, jpeg compression, etc. This paper provides a qualified study of almost all basic, traditional, chaotic, lightweight, quantum, fractal, and qubit based encryption methods under the influence of prevalent intimidation (Salt & Pepper, Gaussian, Poisson, Rotation attack, chosen-plaintext attack, known-plaintext attack, and so on). We thus carried out an experimental and theoretical investigation based on statistical, differential, and quantitative analysis. To measure the efficacy, all the mechanisms are implemented in MATLAB-2014 and provide the standard deviation to each metric. It is observed that the Quantum and Qubit based algorithms are superlative in comparison to others under the majority of extensive threats due to their sensitive behaviour towards initial conditions and highly random behaviour. |
---|---|
ISSN: | 1380-7501 1573-7721 |
DOI: | 10.1007/s11042-021-10670-0 |