Abstract
Cryptography (encryption/decryption) is one of the prevailing mechanisms for protection of information (data or image) in the growing era of computerized exchange. It is the art of securing data/image by changing it into an unreadable format, called cipher text/image. Encryption mechanism is said to be efficient if it offers high security and robustness against attacks, and endow with very low correlation value between cipher and the original information. Enormous techniques and corresponding survey papers are available in literature considering only a few methods or parameters into account, but there is a stern need of investigation, which thoroughly considers vast variety of techniques and compares them in the light of numerous performance metrics under the influence of wide variety of probable threats. In view of the fact, this paper has taken account of almost all traditional, modern, chaotic, and quantum-chaotic based methods under the influence of prevalent intimidation and does a comprehensive investigation based on various performance metrics. To measure the efficacy, all the mechanisms are implemented in MATLAB-2014. Chaos and Quantum based algorithms are the superlative in comparison to others presented in literature under most of the extensive threats (attacks, noises etc.) and can resist brute force attacks due to large key space. In addition, suggestions for future scope have been given.
Similar content being viewed by others
References
John Justin, M. and Manimurugan, S., (2012). A survey on various encryption techniques. International Journal of Soft Computing and Engineering (IJSCE), 2(1), ISSN, 2231, 2307.
Padmavathi, B. and Kumari, S.R., (2013). A survey on performance analysis of DES, AES and RSA algorithm along with LSB substitution. International journal of Science and Research (IJSR), 2(4), ISSN, 2319, 7064.
Tanwar, G. and Mishra, N., (2015). Survey on image encryption techniques. Int J Adv Res Computer Sci Software Eng, 5(12).
Mohammad OF, Rahim MSM, Zeebaree SRM, Ahmed FY (2017) A survey and analysis of the image encryption methods. Int J Appl Eng Res 12(23):13265–13280
Kumari M, Gupta S, Sardana P (2017) A survey of image encryption algorithms. 3D. Research 8(4):37
Chandra, S., Paira, S., Alam, S.S. and Sanyal, G., (2014), November. A comparative survey of symmetric and asymmetric key cryptography. In 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE) (pp. 83-93). IEEE.
Clement, J. (2020). U.S. data breaches and exposed records 2019. Retrieved from https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/
2017 Cost of Cyber Crime Study. (n.d.). Retrieved from https://www.accenture.com/in-en/insight-cost-of-cybercrime-2017
Jain Y, Bansal R, Sharma G, Kumar B, Gupta S (2016) Image encryption schemes: a complete survey. Int J Signal Process Image Process Pattern Recognition 9(7):157–192
Schneier B (1994) The Blowfish encryption algorithm. Dr Dobb's J-Software Tools Professional Programmer 19(4):38–43
Basu S (2011) International data encryption algorithm (IDEA)–a typical illustration. J Global Res Comput Sci 2(7):116–118
Mousa A, Hamad A (2006) Evaluation of the RC4 algorithm for data encryption. Int J Comput Sci Appl (IJCSA) 3(2):44–56
Rivest RL (1994) The RC5 encryption algorithm. In: International Workshop on Fast Software Encryption. Springer, Berlin, pp 86–96
Ahmed, H.E.D.H., Kalash, H.M. and Allah, O.F., (2007). Encryption efficiency analysis and security evaluation of RC6 block cipher for digital images. In 2007 International Conference on Electrical Engineering (pp. 1-7). IEEE.
Barker, E. and Mouha, N., (2017). Recommendation for the triple data encryption algorithm (TDEA) block cipher (no. NIST special publication (SP) 800-67 rev. 2 (draft)). National Institute of Standards and Technology.
Kester, Q.A., (2013). A hybrid cryptosystem based on Vigenere cipher and columnar transposition cipher. arXiv preprint arXiv:1307.7786.
Mandal S, Das S, Nath A (2014) Data hiding and retrieval using visual cryptography. Int J Innovativ Res Adv Eng 1:102–110
François M, Grosges T, Barchiesi D, Erra R (2012) A new image encryption scheme based on a chaotic function. Signal Process Image Commun 27(3):249–259
Sam IS, Devaraj P, Bhuvaneswaran RS (2012) A novel image cipher based on mixed transformed logistic maps. Multimed Tools Appl 56(2):315–330
Sam IS, Devaraj P, Bhuvaneswaran RS (2012) An intertwining chaotic maps based image encryption scheme. Nonlinear Dynamics 69(4):1995–2007
Ye G, Pan C, Huang X, Zhao Z, He J (2018) A chaotic image encryption algorithm based on information entropy. Int J Bifurcation Chaos 28(01):1850010
Hanchinamani G, Kulkarni L (2015) An efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher. 3D Research 6(3):30
Matthews R (1989) On the derivation of a “chaotic” encryption algorithm. Cryptologia 13(1):29–42
Mousa A, Hamad A (2006) Evaluation of the RC4 algorithm for data encryption. Int J Comput Sci Appl (IJCSA) 3(2):44–56
Matsui M (1994) The first experimental cryptanalysis of the data encryption standard. In: Annual International Cryptology Conference. Springer, Berlin, pp 1–11
Rayarikar R, Upadhyay S, Pimpale P (2012) SMS encryption using AES algorithm on android. Int J Comput Appl 50(19):12–17
El-Latif AAA, Li L, Wang N, Han Q, Niu X (2013) A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Process 93(11):2986–3000
Akhshani A, Akhavan A, Lim SC, Hassan Z (2012) An image encryption scheme based on quantum logistic map. Commun Nonlinear Sci Numer Simul 17(12):4653–4661
Liu H, Jin C (2017) A novel color image encryption algorithm based on quantum chaos sequence. 3D Research 8(1):4
Zhou N, Chen W, Yan X, Wang Y (2018) Bit-level quantum color image encryption scheme with quantum cross-exchange operation and hyper-chaotic system. Quantum Inf Process 17(6):137
Liu X, Xiao D, Xiang Y (2018) Quantum image encryption using intra and inter bit permutation based on logistic map. IEEE Access 7:6937–6946
Anderson TW (1958) An introduction to multivariate statistical analysis. Wiley, New York
Jabade V, Gengaje S (2016) Modelling of geometric attacks for digital image watermarking. Image 5:7
Licks V, Jordan R (2005) Geometric attacks on image watermarking systems. IEEE Multimed 12(3):68–78
Li S, Zhao Y, Qu B (2013) Image scrambling based on chaotic sequences and Veginère cipher. Multimed Tools Appl 66(3):573–588
Xu, S., Wang, Y., Wang, J. and Tian, M., (2008), December. Cryptanalysis of two chaotic image encryption schemes based on permutation and XOR operations. In 2008 International Conference on Computational Intelligence and Security (Vol. 2, pp. 433-437). IEEE.
Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J: Multidisciplin J Sci Technol J Select Areas Telecommun (JSAT) 1(2):31–38
Alloghani M, Alani MM, Al-Jumeily D, Baker T, Mustafina J, Hussain A, Aljaaf AJ (2019) A systematic review on the status and progress of homomorphic encryption technologies. J Inform Secur Appl 48:102362
Younes MAB (2019) A survey of the Most current image encryption and decryption techniques. Int J Adv Res Comput Sci 10(1):9
Patel S, Vaish A (2020) A systematic survey on image encryption using compressive sensing. J Sci Res 64(1):291–296
Pandya A, Pandey P (2018) Comparative analysis of encryption techniques. Int Res J Eng Technol 05(03):2010–2012
Kevadia, K.T., Nayak, A.M., Patel, K.S. and Patel, B.U., (2016). A literature survey on image encryption. vol, 2, pp.741-746.
Wang, H., Tao, X. and Huang, J.S., (2019). An improved chessboard covering algorithm with generalized fractal strategy.
Ait Maalem Lahcen, Rachid & Alwala, Chandan & Vamsi, Surya & Kurella, Krishna & Mohapatra, Ram & Kumar, Manish, (2020). Review of image encryption techniques. IOSR J Comput Eng (IOSR-JCE), 22(1). 31–37.
Statistica. (2020, April 14). Retrieved from https://en.wikipedia.org/wiki/Statistica.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Malik, A., Gupta, S. & Dhall, S. Analysis of traditional and modern image encryption algorithms under realistic ambience. Multimed Tools Appl 79, 27941–27993 (2020). https://doi.org/10.1007/s11042-020-09279-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09279-6