Loading…

Assessment of diverse image encryption mechanisms under prevalent invasion

Image encryption mechanisms provide confidentiality and concealment of information (image) in transmission over the alleyway, susceptible to prevalent invasions. With escalating threats in cybersecurity, various cryptography techniques were projected by researchers. The abundance of such mechanisms...

Full description

Saved in:
Bibliographic Details
Published in:Multimedia tools and applications 2021-06, Vol.80 (14), p.21521-21559
Main Authors: Malik, Anjali, Jadav, Sunil, Gupta, Shailender
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Image encryption mechanisms provide confidentiality and concealment of information (image) in transmission over the alleyway, susceptible to prevalent invasions. With escalating threats in cybersecurity, various cryptography techniques were projected by researchers. The abundance of such mechanisms requires systematic investigation so that that appropriate method can be selected for diverse applications. An efficient encryption technique must analyze all the parameters in an ideal situation and practical cases. Numerous survey papers available in the literature for experimental comparison are devoid of many probable attacks such as anti occlusion attack, chosen-plaintext attack, jpeg compression, etc. This paper provides a qualified study of almost all basic, traditional, chaotic, lightweight, quantum, fractal, and qubit based encryption methods under the influence of prevalent intimidation (Salt & Pepper, Gaussian, Poisson, Rotation attack, chosen-plaintext attack, known-plaintext attack, and so on). We thus carried out an experimental and theoretical investigation based on statistical, differential, and quantitative analysis. To measure the efficacy, all the mechanisms are implemented in MATLAB-2014 and provide the standard deviation to each metric. It is observed that the Quantum and Qubit based algorithms are superlative in comparison to others under the majority of extensive threats due to their sensitive behaviour towards initial conditions and highly random behaviour.
ISSN:1380-7501
1573-7721
DOI:10.1007/s11042-021-10670-0