(Ijit-V7i3p7) :t. Ganesh

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

International Journal of Information Technology (IJIT) – Volume 7 Issue 3, May - June 2021

RESEARCH ARTICLE OPEN ACCESS

An Extensive Analysis of Security based Solutions using


Image Encryption Techniques
T. GANESH
Assistant Professor Vel Tech High Tech Engineering College,
Chennai - Tamil Nadu
ABSTRACT
The security of data or images is most important feature from enormous and till increasing field of digital
transfer. Encryption of images is most distinguished model for preserving secrecy of images on certain
unlimited social media. This medium is weak for attacking and so effective encryption techniques were need to
secure data transfer. Several models are presented from works so far, everyone takes an edge on the other, to
catch-up for increasing an essential of security. This paper is an endeavor for comparing one of the famous
methods accessible on the fundamental of different performance metrics namely statistical, differential, and
quantitative attacks analyses. For measuring the efficiency, every recent and grown-up model is applied in
MATLAB-2015. The outcomes depict that the chaotic models utilized form researchers give extremely
scrambled encryption images containing uniform histogram distribution. Also, the encryption images are given
far below degree of correlation coefficient value from horizontal, vertical, and diagonal directions,
demonstrating its resistances towards statistical attack. Lastly, the models give a huge key spacing, so it resists
the brute force attacks and is given far below computational time to an image encryption or decryption with
other models accessible in survey.
Keywords: Encryption/Decryption, Computational time, Cipher images, Boolean matrix, Cryptography

I. INTRODUCTION
The mechanical progressions of most recent multi- reasonable for encryption of writings at the same
decade have given the world frameworks which time, these procedures end up being incapable
can communicate huge lumps of information, when utilized for image encryption application
similar to images, proficiently through the [29–32]. This is because of the inborn trait of
conventional social networks [1-3]. These public images such as solid connection, high excess, and
courses, however, are dependable pathways, are high computational cost [33].
helpless against being gotten to by unauthenticated
clients, and the information moving with them is This paper is an endeavor for comparing one of the
gotten to and adjusted by unauthenticated client famous methods accessible on the fundamental of
allow as payoff product [4 ,5]. In yearly different performance metrics namely statistical,
information for yearly number of estimated differential, and quantitative attacks analyses. For
emancipate product families since 2004 with the measuring the efficiency, every recent and grown-
extended expansion in 2017 [6-10]. It is very clear up model is applied in MATLAB-2015. The
from the figure that the information moved over outcomes depict that the chaotic models utilized
open space is very powerless to assaults [11]. Thus, from researches give extremely scrambled
information ought to be changed into a protected encryption images containing uniform histogram
organization utilizing encryption as broadcast [12, distribution. Also, the encryption images are given
13, 14]. Image encryption improves the security of far below degree of correlation coefficient value
advanced images and is a fundamental segment in from horizontal, vertical, and diagonal directions,
different applications, similar to video demonstrating its resistances towards statistical
conferencing, telemetric clinical imaging attack. Lastly, the models give a huge key spacing,
frameworks, and military image broadcasts [15- so it resists the brute force attacks and is given far
20]. below computational time to an image encryption
or decryption with other models accessible in
Different image encryption procedures are survey.
presented overall [21–26] however a considerable
lot of the strategies are vulnerable to assaults II. RELATED WORK
including differential and factual assaults [27, 28].
The customary encryption instruments namely This work presents a cosine-transform-based
Advanced Encryption Standard, Blowfish, and chaotic system (CTBCS). Utilizing two chaotic
International Data Encryption Algorithm are guides as seed maps, the CTBCS can create chaotic
guides with complex dynamical practices [34, 35].

ISSN: 2454-5414 www.ijitjournal.org Page 30


International Journal of Information Technology (IJIT) – Volume 7 Issue 3, May - June 2021

To delineation, we produce three chaotic guides Josephus issue is utilized to rearrange the image
utilizing the CTBCS and investigate their chaos pixels to various situations to accomplish the
difficulty. Utilizing one of the created chaotic confusion property. Utilizing an arbitrarily created
maps, we further propose an image encryption plot. channel, the sifting innovation can spread slight
The encryption conspire utilizes high-effectiveness changes of the first image to all pixels of the cipher
scrambling to isolate adjoining pixels and utilizes image to get diffusion property [58].
irregular request replacement for spreading a little
change in the plain-image to every pixel of the An examination guide is required for the security
cipherimage [36-40]. investigation of new recommendations. This
examination expects to address this weakness [59].
It presents a permutation technique which can Examination and test outcomes show that
ensure great change execution as well as assurance numerous confusion based image encryption
of low reality intricacy. Above all, this paper calculations recently distributed in the nonlinear
proposes an equal dissemination technique [41-43]. elements are really not however secure as they
This technique guarantees the parallelism of seem to be communicated albeit these calculations
diffusion to the most extreme degree and do breeze through a few measurable and
accomplishes a qualitative enhancement in haphazardness assessments. An agenda has been
proficiency over conventional streaming diffusion proposed to tackle these issues [60 public media].
strategies [44, 45]. At long last, joined with the The utilization of the proposed agenda has
proposed change and dissemination, the paper appeared for changed calculations. The proposed
proposes a computational model for equal image agenda is believed to be a decent beginning stage
encryption techniques. for specialists who are thinking about working in
confusion based cryptography.
It is carried out an intensive examination of their
calculation from the viewpoint of present day III. CONCLUSION
cryptography [46]. We discover it is powerless
against the known plaintext assault: based on one This paper is an endeavor for comparing one of the
set of a known plain-image and its comparing famous methods accessible on the fundamental of
cipher-image, a foe can infer a veiled image, which different performance metrics namely statistical,
can be utilized as an identical mystery key to differential, and quantitative attacks analyses. For
effectively unscramble other cipher images measuring the efficiency, every recent and grown-
encoded under a similar key with a non- up model is applied in MATLAB-2015. The
unimportant likelihood of 1/256 [47-50]. Utilizing outcomes depict that the chaotic models utilized
this as an average counterexample, we sum up from research give extremely scrambled encryption
security surrenders in the plan of the Ye-Huang image containing uniform histogram distribution.
calculation. The exercises are by and large Also, the encryption images are given far below
appropriate to numerous other image encryption degree of correlation coefficient values from
plans [51]. horizontal, vertical, and diagonal directions,
demonstrating its resistance towards statistical
This work examines chaotic image encryption attack. Lastly, the models give a huge key spacing,
innovation and the use of matrix semi-tensor item so it resists the brute force attacks and is given far
hypothesis, and a Boolean network encryption below computational time to an image encryption
calculation to coordinated upgrade measure is or decryption with other models accessible in a
presented [52-54]. A 2D-LASM chaotic system is survey.
utilized for creating an irregular key stream. Initial,
a Boolean network is coded, and Boolean matrix is REFERENCES
created. When the vital, the Boolean network
framework is diffused in one round so the Boolean [1] Li, Linguo, et al. "Fuzzy multilevel image
matrix is stored as an image. At that point, three thresholding based on improved coyote
arbitrary position scrambling’s are utilized for optimization algorithm." IEEE Access 9
scramble the plaintext image. At last, utilizing a (2021): 33595-33607.
lattice semi-tensor item procedure to produce a [2] Gochhayat, S. P., Kaliyar, P., Conti, M.,
scrambled image from second round of diffusion, Tiwari, P., Prasath, V. B. S., Gupta, D., &
another Boolean network is created by encoding Khanna, A. (2019). LISA: Lightweight
the encoded image [55, 56]. context-aware IoT service architecture.
Journal of cleaner production, 212, 1345-
This paper builds up an image encryption 1356.
calculation using the standards of the Josephus [3] Raveendran, A. P., Alzubi, J. A., Sekaran,
issue and the separating innovation [57]. The R., & Ramachandran, M. A high
encryption calculation follows the old style performance scalable fuzzy based modified
diffusion and confusion structure. The guideline of

ISSN: 2454-5414 www.ijitjournal.org Page 31


International Journal of Information Technology (IJIT) – Volume 7 Issue 3, May - June 2021

Asymmetric Heterogene Multiprocessor Network. Mobile Networks and


System on Chip (AHt-MPSOC) Applications, 1-9.
reconfigurable architecture. Journal of [14] Choudhury, S. S., Mohanty, S. N., &
Intelligent & Fuzzy Systems, (Preprint), 1- Jagadev, A. K. (2021). Multimodal trust
12. based recommender system with machine
[4] Zhang, X., Mohanty, S. N., Parida, A. K., learning approaches for movie
Pani, S. K., Dong, B., & Cheng, X. (2020). recommendation. International Journal of
Annual and non-monsoon rainfall prediction Information Technology, 13(2), 475-482.
modelling using SVR-MLP: an empirical [15] Pustokhina, I. V., Pustokhin, D. A., Kumar
study from Odisha. IEEE Access, 8, 30223- Pareek, P., Gupta, D., Khanna, A., &
30233. Shankar, K. (2021). Energy‐efficient
[5] Pustokhina, I. V., Pustokhin, D. A., Nguyen, cluster‐based unmanned aerial vehicle
P. T., Elhoseny, M., & Shankar, K. (2021). networks with deep learning‐based scene
Multi-objective rain optimization algorithm classification model. International Journal of
with WELM model for customer churn Communication Systems, 34(8), e4786.
prediction in telecommunication sector. [16] Mansour, Romany F., and Nojood O.
Complex & Intelligent Systems, 1-13. Aljehane. "An optimal segmentation with
[6] Mansour, Romany Fouad, et al. "Artificial deep learning based inception network
Intelligence and Internet of Things Enabled model for intracranial hemorrhage
Disease Diagnosis Model for Smart diagnosis." Neural Computing and
Healthcare Systems." IEEE Access 9 (2021): Applications (2021): 1-13.
45137-45146. [17] Jain, R., Gupta, D., & Khanna, A. (2019).
[7] Sankhwar, S., Gupta, D., Ramya, K. C., Usability feature optimization using
Rani, S. S., Shankar, K., & MWOA. In International conference on
Lakshmanaprabu, S. K. (2020). Improved innovative computing and communications
grey wolf optimization-based feature subset (pp. 453-462). Springer, Singapore.
selection with fuzzy neural classifier for [18] Hamdoun, H., Nazir, S., Alzubi, J. A.,
financial crisis prediction. Soft Computing, Laskot, P., & Alzubi, O. A. (2021).
24(1), 101-110. Performance benefits of network coding for
[8] Alzubi, J. A. (2020). Bipolar fully recurrent HEVC video communications in satellite
deep structured neural learning based attack networks. Iranian Journal of Electrical and
detection for securing industrial sensor Electronic Engineering, 1956-1956.
networks. Transactions on Emerging [19] Natarajan, Y., Kannan, S., & Mohanty, S. N.
Telecommunications Technologies, e4069. (2021). Survey of Various Statistical
[9] Mohanty, S. N., Rejina Parvin, J., Vinoth Numerical and Machine Learning
Kumar, K., Ramya, K. C., Sheeba Rani, S., Ontological Models on Infectious Disease
& Lakshmanaprabu, S. K. (2019). Optimal Ontology. Data Analytics in Bioinformatics:
rough fuzzy clustering for user profile A Machine Learning Perspective, 431-442.
ontology based web page recommendation [20] Kannan, S., Dhiman, G., Natarajan, Y.,
analysis. Journal of Intelligent & Fuzzy Sharma, A., Mohanty, S. N., Soni, M., ... &
Systems, 37(1), 205-216. Gheisari, M. (2021). Ubiquitous vehicular
[10] Nguyen, G. N., Le Viet, N. H., Elhoseny, ad-hoc network computing using deep neural
M., Shankar, K., Gupta, B. B., & Abd El- network with iot-based bat agents for traffic
Latif, A. A. (2021). Secure blockchain management. Electronics, 10(7), 785.
enabled Cyber–physical systems in [21] Manne, S., Lydia, E. L., Pustokhina, I. V.,
healthcare using deep belief network with Pustokhin, D. A., Parvathy, V. S., &
ResNet model. Journal of Parallel and Shankar, K. (2021). An intelligent energy
Distributed Computing, 153, 150-160. management and traffic predictive model for
[11] Zhang, Yu-Hang, et al. "Investigating gene autonomous vehicle systems. Soft
methylation signatures for fetal intolerance Computing, 1-13.
prediction." Plos one 16.4 (2021): e0250032. [22] Al-Otaibi, S. T., Al-Rasheed, A., Mansour,
[12] Gupta, D., & Ahlawat, A. K. (2019). R. F., Yang, E., Joshi, G. P., & Cho, W.
Taxonomy of GUM and usability prediction (2021). Hybridization of Metaheuristic
using GUM multistage fuzzy expert system. Algorithm for Dynamic Cluster-based
Int. Arab J. Inf. Technol., 16(3), 357-363. Routing Protocol in Wireless Sensor
[13] Babu, M. V., Alzubi, J. A., Sekaran, R., Networks. IEEE Access.
Patan, R., Ramachandran, M., & Gupta, D. [23] Gupta, D., & Ahlawat, A. K. (2016).
(2020). An Improved IDAF-FIT Clustering Usability determination using multistage
Based ASLPP-RR Routing with Secure Data fuzzy system. Procedia Computer Science,
Aggregation in Wireless Sensor 78, 263-270.

ISSN: 2454-5414 www.ijitjournal.org Page 32


International Journal of Information Technology (IJIT) – Volume 7 Issue 3, May - June 2021

[24] Amiri, I. S., Palai, G., Alzubi, J. A., & disease diagnosis. International Journal of
Nayak, S. R. (2020). Chip to chip Information Technology, 13(2), 647-655.
communication through the photonic [36] Nguyen, G. N., Le Viet, N. H., Devaraj, A.
integrated circuit: A new paradigm to optical F. S., Gobi, R., & Shankar, K. (2020).
VLSI. Optik, 202, 163588. Blockchain enabled energy efficient red deer
[25] Satpathy, S., Mangla, M., Sharma, N., algorithm based clustering protocol for
Deshmukh, H., & Mohanty, S. (2021). pervasive wireless sensor networks.
Predicting mortality rate and associated risks Sustainable Computing: Informatics and
in COVID-19 patients. Spatial Information Systems, 28, 100464.
Research, 1-10. [37] Mansour, R. F., Al-Otaibi, S., Al-Rasheed,
[26] Rajagopal, A., Ramachandran, A., Shankar, A., Aljuaid, H., Pustokhina, I., & Pustokhin,
K., Khari, M., Jha, S., & Joshi, G. P. D. A. (2021). An Optimal Big Data
Optimal routing strategy based on extreme Analytics with Concept Drift Detection on
learning machine with beetle antennae High-Dimensional Streaming Data. CMC-
search algorithm for Low Earth Orbit COMPUTERS MATERIALS &
satellite communication networks. CONTINUA, 68(3), 2843-2858.
International Journal of Satellite [38] Le, D. N., Parvathy, V. S., Gupta, D.,
Communications and Networking. Khanna, A., Rodrigues, J. J., & Shankar, K.
[27] Mansour, R. F., Escorcia-Gutierrez, J., (2021). IoT enabled depthwise separable
Gamarra, M., Villanueva, J. A., & Leal, N. convolution neural network with deep
(2021). Intelligent video anomaly detection support vector machine for COVID-19
and classification using faster RCNN with diagnosis and classification. International
deep reinforcement learning model. Image Journal of Machine Learning and
and Vision Computing, 104229. Cybernetics, 1-14.
[28] Gupta, D., Arora, J., Agrawal, U., Khanna, [39] Alzubi, J. A., Manikandan, R., Alzubi, O.
A., & de Albuquerque, V. H. C. (2019). A., Qiqieh, I., Rahim, R., Gupta, D., &
Optimized Binary Bat algorithm for Khanna, A. (2020). Hashed Needham
classification of white blood cells. Schroeder industrial IoT based cost
Measurement, 143, 180-190. optimized deep secured data transmission in
[29] Alrabea, A., Alzubi, O. A., & Alzubi, J. A. cloud. Measurement, 150, 107077.
(2019). A task-based model for minimizing [40] Sankhwar, S., Pandey, D., Khan, R. A., &
energy consumption in WSNs. Energy Mohanty, S. N. (2021). An anti‐phishing
Systems, 1-18. enterprise environ model using feed‐forward
[30] Sharma, N., Dev, J., Mangla, M., Wadhwa, backpropagation and Levenberg‐Marquardt
V. M., Mohanty, S. N., & Kakkar, D. method. Security and Privacy, 4(1), e132.
(2021). A heterogeneous ensemble [41] Pustokhina, I. V., Pustokhin, D. A.,
forecasting model for disease prediction. Rodrigues, J. J., Gupta, D., Khanna, A.,
New Generation Computing, 1-15. Shankar, K., ... & Joshi, G. P. (2020).
[31] Shankar, K., & Perumal, E. (2020). A novel Automatic vehicle license plate recognition
hand-crafted with deep learning features using optimal K-means with convolutional
based fusion model for COVID-19 diagnosis neural network for intelligent transportation
and classification using chest X-ray images. systems. IEEE Access, 8, 92907-92917.
Complex & Intelligent Systems, 1-17. [42] Bharathi, R., Abirami, T., Dhanasekaran, S.,
[32] Mansour, R. F., & Al-Marghilnai, A. (2021). Gupta, D., Khanna, A., Elhoseny, M., &
Glaucoma detection using novel perceptron Shankar, K. (2020). Energy efficient
based convolutional multi-layer neural clustering with disease diagnosis model for
network classification. Multidimensional IoT based sustainable healthcare systems.
Systems and Signal Processing, 1-19. Sustainable Computing: Informatics and
[33] Gupta, D., Ahlawat, A., & Sagar, K. (2014, Systems, 28, 100453.
November). A critical analysis of a hierarchy [43] . Alzubi, O. A., Alzubi, J. A., Alweshah, M.,
based Usability Model. In 2014 international Qiqieh, I., Al-Shami, S., & Ramachandran,
conference on contemporary computing and M. (2020). An optimal pruning algorithm of
informatics (IC3I) (pp. 255-260). IEEE. classifier ensembles: dynamic programming
[34] Alzubi, O. A., Alzubi, J. A., Dorgham, O., & approach. Neural Computing and
Alsayyed, M. (2020). Cryptosystem design Applications, 32(20), 16091-16107.
based on Hermitian curves for IoT [44] Dash, L., Das, S., Mohanty, S., Rahman, F.
security. The Journal of H., Sahoo, S. K., & Mishra, S. N. (2020).
Supercomputing, 76(11), 8566-8589. Platform Based Housing System Improved
[35] Sahu, B., & Mohanty, S. N. (2021). CMBA- Health and Reduced Mortality Percentage of
SVM: a clinical approach for Parkinson

ISSN: 2454-5414 www.ijitjournal.org Page 33


International Journal of Information Technology (IJIT) – Volume 7 Issue 3, May - June 2021

Goats in Flood Prone Area of Coastal


Odisha. Advances in Research, 10-17.
[45] Yang, E., Parvathy, V. S., Selvi, P. P.,
Shankar, K., Seo, C., Joshi, G. P., & Yi, O.
(2020). Privacy Preservation in Edge
Consumer Electronics by Combining
Anomaly Detection with Dynamic Attribute-
Based Re-Encryption. Mathematics, 8(11),
1871.
[46] Gupta, D., & Ahlawat, A. K. (2017).
Usability feature selection via MBBAT: a
novel approach. Journal of computational
science, 23, 195-203.
[47] Aljehane, Nojood O., and Romany F.
Mansour. "Big data analytics with
oppositional moth flame optimization based
vehicular routing protocol for future smart
cities." Expert Systems (2021): e12718
[48] Alzubi, J. A., Jain, R., Kathuria, A.,
Khandelwal, A., Saxena, A., & Singh, A.
(2020). Paraphrase identification using
collaborative adversarial networks. Journal
of Intelligent & Fuzzy Systems, (Preprint),
1-12.
[49] Alphonse, A. S., Shankar, K., Rakkini, M. J.,
Ananthakrishnan, S., Athisayamani, S.,
Singh, A. R., & Gobi, R. (2020). A multi-
scale and rotation-invariant phase pattern
(MRIPP) and a stack of restricted Boltzmann
machine (RBM) with preprocessing for
facial expression classification. Journal of
Ambient Intelligence and Humanized
Computing, 1-17.

ISSN: 2454-5414 www.ijitjournal.org Page 34

You might also like