The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Encryption Quality Measurement of a Proposed

,
#
In this paper, a proposed cryptosystem algorithm ba sed on two different chaotic systems is presented. The proposed cryptosystem algorithm is designated as PCACH. A re cently developed encryption algorithm which is designated here, as HuXia is reviewed. These two algorithms are applied to three images of different color frequencies, i.e., different types of colored"images are encrypted with each of the two e ncryption algorithms. Both of them are applied to the different images with two different types of encryption modes, Elect ronic Code Book (ECB) and Cipher Block Chaining (CB C). Visual inspection is not sufficient to assess the quality of encryption so other measuring factors are consid ered based on measuring the maximum deviation and the Correlation Coefficie nt (CC) between the original and the encrypted images. For judging the force of security, we measure the plain"text sensit ivity by using Number of Pixels Change Rate (NPCR) and Unified Average Changing Intensity (UACI) analysis, measuring infor mation entropy and measuring the key sensitivity. A lso, the encryption/decryption time and the throughput are m easured for the two algorithms. The results suggest that PCACH is a very good algorithm and superior to HuXia.


[1] Abu Zaid O., El Fishawy N., Proposed Permutation Scheme Based on 3 Chaotic System For Encrypting The Colored Images, IJCSI International Computer Science, vol. 2013.

[2] Abu Zaid O., El F ishawy N., Nigm E., Faragallah O., A Proposed Encryption Scheme Based on Henon Chaotic System (PESH) for Image Security, International Journal of Encryption Quality Measurement of a Proposed Crypto system Algorithm for the Colored Images Compared 27 ECB CBC pepper.bmp The image and the modes of operations ECB and CBC the throughput by Kbps for applying HuXia and PCACH with the two modes ECB and CBC. and Figure 18, it is clear that PCACH with the ECB mode has the highest throughput while HuXia with CBC has the smallest PCACH algorithm achieves throughput bigger than the throughput of the HuXia PCACH algorithm is better than the This paper inspected two encryption algorithms, HuXia and PCACH, on encrypting two images of construction with two modes of operation for encryption. Two evaluating measuring factors for quality of encryption, three evaluating measuring factors for security analysis, encryption/decryption and the throughput were considered. of the factors for quality of encryption, PCACH satisfies quality of encryption , where PCACH with CC factor than HuXia. PCACH with factors NPCR% and UACI% gives results better than HuXia with every one of the modes of ECB and CBC. The results of precision of the keys sensitivity for PC ACH are better than the results of HuXia, and sometimes are very convergent. The results of information entropy with ECB for PCACH are better than the results for lts suggest PCACH satisfies high quality of security better than HuXia. Also, PCACH achieves less time and high throughput as compared to HuXia. We conclude that PCACH has a high quality of encryption and provides an efficient image encryption. Fishawy N., and Nigm E., A Proposed Permutation Scheme Based on 3 D Chaotic System For Encrypting The Colored International Journal of , vol. 10, no. 2, pp. 208 214, ishawy N., Nigm E., and Proposed Encryption Scheme on Henon Chaotic System (PESH) for International Journal of 28 The International Arab Journal of Information Tec hnology Computer Applications, vol. 61, no. 5, pp. 29 39, 2013.

[3] Chen D. and Chang Y., A Novel Image Encryption Algorithm Based on Logistic Maps, Advances in Information Sciences and Service Sciences , vol. 3, no. 7, pp. 364 72, 2011.

[4] Chen G., Mao Y., and Chui C., A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps, Chaos, Solitons and Fractals , vol. 21, no. 3, pp. 749 761, 2004.

[5] Cokal C. and Solak E., Cryptanalysis of A Chaos Based Image Encryption Algorithm, Elsevier, Physics Letters A , vol. 373, no. 15, pp. 1357 1360, 2009.

[6] Electronic Code Book Encyclopedia Article About Electronic Code Book., available at: http://encyclopedia.thefreedictionary.com/Electro nic+code+book, last visited 2015.

[7] El Fishawy N. and Abu Zaid O., Quality of Encryption Measurement of Bitmap Images with RC6, MRC6 and Rijndael Block Cipher Algorithms, International Journal of Network Security , vol. 5, no. 3, pp. 241 251, 2007.

[8] Feng Y., Li L., and Huang F., A Symmetric Image Encryption Approach Based on Line Maps, in Proceedings of the 1 st International Symposium Systems and Control in Aerospace and Astronautics , Harbin, pp. 1362 67, 2006.

[9] Guan Z., Huang F., and Guan W., Chaos Based Image Encryption Algorithm, Physics Letters A, vol. 346, no. 1 3, pp. 153 157, 2005.

[10] Kumar R., Sampath A., and Indumathi P., Enhancement and Analysis of Chaotic Image Encryption Algorithms, available at: http://airccj.org/CSCP/vol1/csit1215.pdf, last visited 2011.

[11] Lian S., Sun J., and Wang Z., A Block Cipher Based on A Suitable Use of Chaotic Standard Map, Chaos, Solitons and Fractals , vol. 26, no. 1, pp. 117 29, 2005.

[12] Lu H. and Xiao X., A Novel Color Image Encryption Algorithm Based on Chaotic Maps, Advances in Information Sciences and Service Sciences , vol. 3, no. 11, pp. 28 35, 2011.

[13] Ma X., Fu C., Lei W., and Li S., A Novel Chaos Based Image Encryption Scheme with An Improved Permutation Process, International Journal of Advanced Computer Technology , vol. 3, no. 5, pp. 223 33, 2011.

[14] Sabery M. and Yaghoobi M., A New Approach for Image Encryption using Chaotic Logistic Map, in Proceedings of International Conference on Advanced Computer Theory and Engineering , Phuket, pp. 585 90, 2008.

[15] Sonis M., Once More on Henon Map: Analysis of Bifurcations, Chaos, Sotilons and Fractals , vol. 7, no. 12, pp. 2215 34, 1996.

[16] Tedmori S. and Al Najdawi N., Lossless Image Cryptography Algorithm Based on Discrete Cosine Transform, the International Arab Journal of Information Technology , vol. 9, no. 5, pp. 471 478, 2012.

[17] Wang X., Tian L., and Yu L., Linear Feedback Controlling and Synchronization of the Chen s Chaotic System, International Journal of Nonlinear Science , vol. 2, no. 1, pp. 43 9, 2006.

[18] Xiao D., Liao X., and Wei P., Analysis and Improvement of A Chaos Based Image Encryption Algorithm, Chaos, Solitons and Fractals , vol. 40, no. 5, pp. 2191 2199, 2009.

[19] Zhou T., Tang Y., and Chen G., Chen s Attractor Exists, International Journal of Bifurcation and Chaos , vol. 14, no. 9, pp. 3167 77, 2004.

[20] Zhu Z., Zhang W., Wong K., and Yu H., A Chaos Based Symmetric Image Encryption Scheme Using A Bit Level Permutation, Information Sciences , vol. 181, no. 6, pp. 1171 86, 2011.

[21] Ziedan I., Fouad M., and Salem D., Application of Data Encryption Standard to Bitmap and JPEG Images, in Proceedings 20 th National Radio Science Conference , Egypt, pp. 1 8, 2003. Osama Abu Zaid received BSc from the Faculty Of Science, Menoufia University, Egypt in 2000. He is working as a network manager in Sadat City University. He received the MSc degree in data security from Faculty of sciences, Menoufia University, Egypt, in 2005. Now, he is lecturer in Faculty of computer sciences and information, Al Jouf University, KSA. He is working for his PhD. He is interested in multimedia securit y over computer networks, and he registered the PhD i n Faculty of sciences, Zagazig University, Egypt. Nawal El-Fishawy received the PhD degree in mobile communications the faculty of Electronic Eng., Menoufia University, Egypt, in collaboration with Southampton University in 1991. Now, she is the head of Computer Science and Engineering Dept., Faculty of Electronic Eng. Her research interest includes computer communication networks. Now, she directed her research interests to the developments of secur ity over wireless communications networks, and encryption algorithms. She has served as a reviewer for many national and international journals and conferences. Also she participated in many technica l program committees of major international conferences in wireless communications. Encryption Quality Measurement of a Proposed Cryptosystem Algorithm for the Colored Images Compared 29 Elsayed Nigm is a professor of mathematics, Department of Mathematics, Zagazig University, Egypt. He obtained his BSc in mathematics, statistics and computer sciences, Zagazig University, Faculty of Science, Egypt. He obtained his MSc degree in mathematics (functional analysis), Zagazig University, Faculty of Science, Egypt. He obtained his PhD degree mathematical statistics also, from Zagazig University, Faculty o f Science, Egypt in 1990. He honors awards prize of t he National Committee of Mathematics, by Egyptian Academy of Sciences and Technologies, Egypt in 2000. He has published more than 51 papers in international journals, international conferences, local Journals and Local Conferences.