Skip to main content
Log in

Analysis of traditional and modern image encryption algorithms under realistic ambience

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Cryptography (encryption/decryption) is one of the prevailing mechanisms for protection of information (data or image) in the growing era of computerized exchange. It is the art of securing data/image by changing it into an unreadable format, called cipher text/image. Encryption mechanism is said to be efficient if it offers high security and robustness against attacks, and endow with very low correlation value between cipher and the original information. Enormous techniques and corresponding survey papers are available in literature considering only a few methods or parameters into account, but there is a stern need of investigation, which thoroughly considers vast variety of techniques and compares them in the light of numerous performance metrics under the influence of wide variety of probable threats. In view of the fact, this paper has taken account of almost all traditional, modern, chaotic, and quantum-chaotic based methods under the influence of prevalent intimidation and does a comprehensive investigation based on various performance metrics. To measure the efficacy, all the mechanisms are implemented in MATLAB-2014. Chaos and Quantum based algorithms are the superlative in comparison to others presented in literature under most of the extensive threats (attacks, noises etc.) and can resist brute force attacks due to large key space. In addition, suggestions for future scope have been given.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30
Fig. 31
Fig. 32
Fig. 33

Similar content being viewed by others

References

  1. John Justin, M. and Manimurugan, S., (2012). A survey on various encryption techniques. International Journal of Soft Computing and Engineering (IJSCE), 2(1), ISSN, 2231, 2307.

  2. Padmavathi, B. and Kumari, S.R., (2013). A survey on performance analysis of DES, AES and RSA algorithm along with LSB substitution. International journal of Science and Research (IJSR), 2(4), ISSN, 2319, 7064.

  3. Tanwar, G. and Mishra, N., (2015). Survey on image encryption techniques. Int J Adv Res Computer Sci Software Eng, 5(12).

  4. Mohammad OF, Rahim MSM, Zeebaree SRM, Ahmed FY (2017) A survey and analysis of the image encryption methods. Int J Appl Eng Res 12(23):13265–13280

    Google Scholar 

  5. Kumari M, Gupta S, Sardana P (2017) A survey of image encryption algorithms. 3D. Research 8(4):37

    Google Scholar 

  6. Chandra, S., Paira, S., Alam, S.S. and Sanyal, G., (2014), November. A comparative survey of symmetric and asymmetric key cryptography. In 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE) (pp. 83-93). IEEE.

  7. Clement, J. (2020). U.S. data breaches and exposed records 2019. Retrieved from https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/

  8. 2017 Cost of Cyber Crime Study. (n.d.). Retrieved from https://www.accenture.com/in-en/insight-cost-of-cybercrime-2017

  9. Jain Y, Bansal R, Sharma G, Kumar B, Gupta S (2016) Image encryption schemes: a complete survey. Int J Signal Process Image Process Pattern Recognition 9(7):157–192

    Google Scholar 

  10. Schneier B (1994) The Blowfish encryption algorithm. Dr Dobb's J-Software Tools Professional Programmer 19(4):38–43

    Google Scholar 

  11. Basu S (2011) International data encryption algorithm (IDEA)–a typical illustration. J Global Res Comput Sci 2(7):116–118

    Google Scholar 

  12. Mousa A, Hamad A (2006) Evaluation of the RC4 algorithm for data encryption. Int J Comput Sci Appl (IJCSA) 3(2):44–56

    Google Scholar 

  13. Rivest RL (1994) The RC5 encryption algorithm. In: International Workshop on Fast Software Encryption. Springer, Berlin, pp 86–96

    Google Scholar 

  14. Ahmed, H.E.D.H., Kalash, H.M. and Allah, O.F., (2007). Encryption efficiency analysis and security evaluation of RC6 block cipher for digital images. In 2007 International Conference on Electrical Engineering (pp. 1-7). IEEE.

  15. Barker, E. and Mouha, N., (2017). Recommendation for the triple data encryption algorithm (TDEA) block cipher (no. NIST special publication (SP) 800-67 rev. 2 (draft)). National Institute of Standards and Technology.

  16. Kester, Q.A., (2013). A hybrid cryptosystem based on Vigenere cipher and columnar transposition cipher. arXiv preprint arXiv:1307.7786.

  17. Mandal S, Das S, Nath A (2014) Data hiding and retrieval using visual cryptography. Int J Innovativ Res Adv Eng 1:102–110

    Google Scholar 

  18. François M, Grosges T, Barchiesi D, Erra R (2012) A new image encryption scheme based on a chaotic function. Signal Process Image Commun 27(3):249–259

    Article  Google Scholar 

  19. Sam IS, Devaraj P, Bhuvaneswaran RS (2012) A novel image cipher based on mixed transformed logistic maps. Multimed Tools Appl 56(2):315–330

    Article  Google Scholar 

  20. Sam IS, Devaraj P, Bhuvaneswaran RS (2012) An intertwining chaotic maps based image encryption scheme. Nonlinear Dynamics 69(4):1995–2007

    Article  MathSciNet  Google Scholar 

  21. Ye G, Pan C, Huang X, Zhao Z, He J (2018) A chaotic image encryption algorithm based on information entropy. Int J Bifurcation Chaos 28(01):1850010

    Article  MathSciNet  MATH  Google Scholar 

  22. Hanchinamani G, Kulkarni L (2015) An efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher. 3D Research 6(3):30

    Article  Google Scholar 

  23. Matthews R (1989) On the derivation of a “chaotic” encryption algorithm. Cryptologia 13(1):29–42

    Article  MathSciNet  Google Scholar 

  24. Mousa A, Hamad A (2006) Evaluation of the RC4 algorithm for data encryption. Int J Comput Sci Appl (IJCSA) 3(2):44–56

    Google Scholar 

  25. Matsui M (1994) The first experimental cryptanalysis of the data encryption standard. In: Annual International Cryptology Conference. Springer, Berlin, pp 1–11

    Google Scholar 

  26. Rayarikar R, Upadhyay S, Pimpale P (2012) SMS encryption using AES algorithm on android. Int J Comput Appl 50(19):12–17

    Google Scholar 

  27. El-Latif AAA, Li L, Wang N, Han Q, Niu X (2013) A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Process 93(11):2986–3000

    Article  Google Scholar 

  28. Akhshani A, Akhavan A, Lim SC, Hassan Z (2012) An image encryption scheme based on quantum logistic map. Commun Nonlinear Sci Numer Simul 17(12):4653–4661

    Article  MathSciNet  MATH  Google Scholar 

  29. Liu H, Jin C (2017) A novel color image encryption algorithm based on quantum chaos sequence. 3D Research 8(1):4

    Article  Google Scholar 

  30. Zhou N, Chen W, Yan X, Wang Y (2018) Bit-level quantum color image encryption scheme with quantum cross-exchange operation and hyper-chaotic system. Quantum Inf Process 17(6):137

    Article  MathSciNet  MATH  Google Scholar 

  31. Liu X, Xiao D, Xiang Y (2018) Quantum image encryption using intra and inter bit permutation based on logistic map. IEEE Access 7:6937–6946

    Article  Google Scholar 

  32. Anderson TW (1958) An introduction to multivariate statistical analysis. Wiley, New York

    MATH  Google Scholar 

  33. Jabade V, Gengaje S (2016) Modelling of geometric attacks for digital image watermarking. Image 5:7

  34. Licks V, Jordan R (2005) Geometric attacks on image watermarking systems. IEEE Multimed 12(3):68–78

    Article  Google Scholar 

  35. Li S, Zhao Y, Qu B (2013) Image scrambling based on chaotic sequences and Veginère cipher. Multimed Tools Appl 66(3):573–588

    Article  Google Scholar 

  36. Xu, S., Wang, Y., Wang, J. and Tian, M., (2008), December. Cryptanalysis of two chaotic image encryption schemes based on permutation and XOR operations. In 2008 International Conference on Computational Intelligence and Security (Vol. 2, pp. 433-437). IEEE.

  37. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J: Multidisciplin J Sci Technol J Select Areas Telecommun (JSAT) 1(2):31–38

    Google Scholar 

  38. Alloghani M, Alani MM, Al-Jumeily D, Baker T, Mustafina J, Hussain A, Aljaaf AJ (2019) A systematic review on the status and progress of homomorphic encryption technologies. J Inform Secur Appl 48:102362

    Google Scholar 

  39. Younes MAB (2019) A survey of the Most current image encryption and decryption techniques. Int J Adv Res Comput Sci 10(1):9

    Article  Google Scholar 

  40. Patel S, Vaish A (2020) A systematic survey on image encryption using compressive sensing. J Sci Res 64(1):291–296

    Google Scholar 

  41. Pandya A, Pandey P (2018) Comparative analysis of encryption techniques. Int Res J Eng Technol 05(03):2010–2012

    Google Scholar 

  42. Kevadia, K.T., Nayak, A.M., Patel, K.S. and Patel, B.U., (2016). A literature survey on image encryption. vol, 2, pp.741-746.

  43. Wang, H., Tao, X. and Huang, J.S., (2019). An improved chessboard covering algorithm with generalized fractal strategy.

    Google Scholar 

  44. Ait Maalem Lahcen, Rachid & Alwala, Chandan & Vamsi, Surya & Kurella, Krishna & Mohapatra, Ram & Kumar, Manish, (2020). Review of image encryption techniques. IOSR J Comput Eng (IOSR-JCE), 22(1). 31–37.

  45. Statistica. (2020, April 14). Retrieved from https://en.wikipedia.org/wiki/Statistica.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sangeeta Dhall.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Malik, A., Gupta, S. & Dhall, S. Analysis of traditional and modern image encryption algorithms under realistic ambience. Multimed Tools Appl 79, 27941–27993 (2020). https://doi.org/10.1007/s11042-020-09279-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09279-6

Keywords

Navigation