TY - JOUR
T1 - An experimental comparison of chaotic and non-chaotic image encryption schemes
AU - Ahmad, Jawad
AU - Hwang, Seong Oun
AU - Arshad, Ali
PY - 2015/9/14
Y1 - 2015/9/14
N2 - During last few years, transmission of digital multimedia data (images, audios and videos) over Internet, wireless cell phones, television broadcasting etc., has been significantly evolved. The provision of security to store and transmit data with confidentiality, integrity, and authentication for multimedia data over wireless medium is attaining importance these days. Over a few decades, a number of image encryption schemes have been implemented, each with various features, pros and cons. So there is a need to carry out security analysis of these schemes through some standard parameters. In this paper, an effort is being made for comparison of traditional encryption algorithms via some security parameters rather than using just visual inspection. Through these security parameters, one can determine a better and highly secure image encryption scheme. Comparative analysis of Advanced Encryption Standard, Compression Friendly Encryption Scheme, Chaotically Coupled Chaotic Map Encryption Scheme and a Bernoulli Map Based Encryption Scheme are done. Results are finally compiled to conclude the optimum scheme to be used feasibly with high security level.
AB - During last few years, transmission of digital multimedia data (images, audios and videos) over Internet, wireless cell phones, television broadcasting etc., has been significantly evolved. The provision of security to store and transmit data with confidentiality, integrity, and authentication for multimedia data over wireless medium is attaining importance these days. Over a few decades, a number of image encryption schemes have been implemented, each with various features, pros and cons. So there is a need to carry out security analysis of these schemes through some standard parameters. In this paper, an effort is being made for comparison of traditional encryption algorithms via some security parameters rather than using just visual inspection. Through these security parameters, one can determine a better and highly secure image encryption scheme. Comparative analysis of Advanced Encryption Standard, Compression Friendly Encryption Scheme, Chaotically Coupled Chaotic Map Encryption Scheme and a Bernoulli Map Based Encryption Scheme are done. Results are finally compiled to conclude the optimum scheme to be used feasibly with high security level.
KW - AES
KW - CFES
KW - chaos
KW - image encryption
KW - MCFES
UR - http://www.scopus.com/inward/record.url?scp=84938996446&partnerID=8YFLogxK
U2 - 10.1007/s11277-015-2667-9
DO - 10.1007/s11277-015-2667-9
M3 - Article
AN - SCOPUS:84938996446
SN - 0929-6212
VL - 84
SP - 901
EP - 918
JO - Wireless Personal Communications
JF - Wireless Personal Communications
IS - 2
ER -