当前位置: X-MOL 学术Multimed. Tools Appl. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Analysis of traditional and modern image encryption algorithms under realistic ambience
Multimedia Tools and Applications ( IF 3.0 ) Pub Date : 2020-07-30 , DOI: 10.1007/s11042-020-09279-6
Anjali Malik , Shailender Gupta , Sangeeta Dhall

Cryptography (encryption/decryption) is one of the prevailing mechanisms for protection of information (data or image) in the growing era of computerized exchange. It is the art of securing data/image by changing it into an unreadable format, called cipher text/image. Encryption mechanism is said to be efficient if it offers high security and robustness against attacks, and endow with very low correlation value between cipher and the original information. Enormous techniques and corresponding survey papers are available in literature considering only a few methods or parameters into account, but there is a stern need of investigation, which thoroughly considers vast variety of techniques and compares them in the light of numerous performance metrics under the influence of wide variety of probable threats. In view of the fact, this paper has taken account of almost all traditional, modern, chaotic, and quantum-chaotic based methods under the influence of prevalent intimidation and does a comprehensive investigation based on various performance metrics. To measure the efficacy, all the mechanisms are implemented in MATLAB-2014. Chaos and Quantum based algorithms are the superlative in comparison to others presented in literature under most of the extensive threats (attacks, noises etc.) and can resist brute force attacks due to large key space. In addition, suggestions for future scope have been given.



中文翻译:

现实环境下传统和现代图像加密算法分析

密码学(加密/解密)是在计算机化交换时代不断发展中保护信息(数据或图像)的主要机制之一。通过将数据/图像更改为不可读的格式(称为密文/图像)来保护数据/图像是一种艺术。如果加密机制具有很高的安全性和鲁棒性来抵御攻击,并且在密码和原始信息之间具有非常低的相关值,则它被认为是有效的。文献中提供了巨大的技术和相应的调查论文,仅考虑了几种方法或参数,但迫切需要进行调查,这需要彻底考虑各种技术,并根据众多性能指标在以下因素的影响下进行比较。各种可能的威胁。有鉴于此,本文考虑了在普遍恐吓的影响下几乎所有传统,现代,混沌和量子混沌方法,并基于各种性能指标进行了全面研究。为了测量功效,所有机制均在MATLAB-2014中实现。与文献中提出的其他算法相比,在大多数广泛的威胁(攻击,噪声等)下,基于混沌和量子的算法是最高级的,并且由于较大的密钥空间而可以抵抗暴力攻击。此外,还提出了有关未来范围的建议。所有机制均在MATLAB-2014中实现。与文献中提出的其他算法相比,在大多数广泛的威胁(攻击,噪声等)下,基于混沌和量子的算法是最高级的,并且由于较大的密钥空间而可以抵抗暴力攻击。此外,还提出了有关未来范围的建议。所有机制均在MATLAB-2014中实现。与文献中提出的其他算法相比,在大多数广泛的威胁(攻击,噪声等)下,基于混沌和量子的算法是最高级的,并且由于较大的密钥空间而可以抵抗暴力攻击。此外,还提出了有关未来范围的建议。

更新日期:2020-07-30
down
wechat
bug