Research Article
BibTex RIS Cite

BAZI GÖRÜNTÜ ŞİFRELEME TEKNİKLERİNİN PERFORMANS ANALİZİ UYGULAMALARI

Year 2022, Volume: 15 Issue: 2, 77 - 88, 30.12.2022
https://doi.org/10.20854/bujse.1114856

Abstract

İçinde bulunduğumuz teknoloji çağında veri güvenliği artık hükümetlerin, şirketlerin ve bireylerin en hayati ve en önemli konusu haline geldi. Veri türleri arasında görseller içerdikleri önemli bilgiler nedeniyle özel bir öneme sahiptir. Görüntülerin aktarılması veya saklanması ekstra güvenlik önlemleri gerektirir. Bu çalışmada, bazı görüntü şifreleme yöntemleri görüntü işleme alanında en popüler ve en çok kullanılan görüntülere uygulanarak performansları karşılaştırılmıştır. Dört farklı deney gerçekleştirilmiştir. Yedi farklı şifreleme yönteminin performansları birbirleri ile karşılaştırılarak yapılan ölçümler ve elde edilen gözlemler sunulmuştur.

References

  • [1] Srividya, G. & Nandakumar, P.. (2011). A Triple-Key chaotic image encryption method. ICCSP 2011 - 2011 International Conference on Communications and Signal Processing.
  • [2] Chai, X., Zheng, X., Gan, Z., Han, D., & Chen, Y. (2018). An image encryption algorithm based on chaotic system and compressive sensing. Signal Processing, 148, 124-144.
  • [3] Zhang, Y., Li, Y., & Su, J. (2018). Iterative learning control for image feature extraction with multiple-image blends. EURASIP Journal on Image and Video Processing, 2018(1), 1-11.
  • [4] Jiang, N., Zhao, N., & Wang, L. (2016). LSB based quantum image steganography algorithm. International Journal of Theoretical Physics, 55(1), 107-123.
  • [5] Muhammad, K., Ahmad, J., Farman, H., & Zubair, M. (2015). A novel image steganographic approach for hiding text in color images using HSI color model. arXiv preprint arXiv:1503.00388.
  • [6] Isac, B., & Santhi, V. (2011). A study on digital image and video watermarking schemes using neural networks. International Journal of Computer Applications, 12(9), 1-6.
  • [7] Gonzalez, R. C., & Woods, R. E. (1992). Instructor's manual for digital image processing (Vol. 199). Addison-Wesley.
  • [8] Davies, E. R. (2004). Machine vision: theory, algorithms, practicalities. Elsevier.
  • [9] Horn, B. K., & Vision, R. (1986). MIT Press. Cambridge, Massachusetts.
  • [10] Anandakumar, S. (2015). Image cryptography using RSA algorithm in network security. International Journal of Computer Science & Engineering Technology, 5(9), 326-330.
  • [11] Xue, X., Zhou, D., & Zhou, C. (2020). New insights into the existing image encryption algorithms based on DNA coding. Plos one, 15(10), e0241184.
  • [12] Mousa, H. M. (2016). DNA-Genetic Encryption Technique. International Journal of Computer Network & Information Security, 8(7).
  • [13] Shaheen, A.M., Sheltami, T.R., Al-Kharoubi, T.M. et al. Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT. J Ambient Intell Human Comput 10, 4733–4750 (2019).
  • [14] Shiguo Lian, Jinsheng Sun and Zhiquan Wang, "A novel image encryption scheme based-on JPEG encoding," Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004., 2004, pp. 217-220.

PERFORMANCE ANALYSIS APPLİCATIONS OF SOME IMAGE ENCRYPTION TECHNIQUES

Year 2022, Volume: 15 Issue: 2, 77 - 88, 30.12.2022
https://doi.org/10.20854/bujse.1114856

Abstract

Data security is now the most vital and most important issue of governments, companies and individuals in the technology age we live in. Among the data types, images have a special importance because of the important information they contain. Transferring or storing images requires extra security measures. In this study, the performances of the image encryption methods were compared with each other by applying them to the most popular and most used images in the image processing area. Four different experiments were carried out. Performance of the seven particular encryption methods compared to each other and the obsevations and measurements was presented.

References

  • [1] Srividya, G. & Nandakumar, P.. (2011). A Triple-Key chaotic image encryption method. ICCSP 2011 - 2011 International Conference on Communications and Signal Processing.
  • [2] Chai, X., Zheng, X., Gan, Z., Han, D., & Chen, Y. (2018). An image encryption algorithm based on chaotic system and compressive sensing. Signal Processing, 148, 124-144.
  • [3] Zhang, Y., Li, Y., & Su, J. (2018). Iterative learning control for image feature extraction with multiple-image blends. EURASIP Journal on Image and Video Processing, 2018(1), 1-11.
  • [4] Jiang, N., Zhao, N., & Wang, L. (2016). LSB based quantum image steganography algorithm. International Journal of Theoretical Physics, 55(1), 107-123.
  • [5] Muhammad, K., Ahmad, J., Farman, H., & Zubair, M. (2015). A novel image steganographic approach for hiding text in color images using HSI color model. arXiv preprint arXiv:1503.00388.
  • [6] Isac, B., & Santhi, V. (2011). A study on digital image and video watermarking schemes using neural networks. International Journal of Computer Applications, 12(9), 1-6.
  • [7] Gonzalez, R. C., & Woods, R. E. (1992). Instructor's manual for digital image processing (Vol. 199). Addison-Wesley.
  • [8] Davies, E. R. (2004). Machine vision: theory, algorithms, practicalities. Elsevier.
  • [9] Horn, B. K., & Vision, R. (1986). MIT Press. Cambridge, Massachusetts.
  • [10] Anandakumar, S. (2015). Image cryptography using RSA algorithm in network security. International Journal of Computer Science & Engineering Technology, 5(9), 326-330.
  • [11] Xue, X., Zhou, D., & Zhou, C. (2020). New insights into the existing image encryption algorithms based on DNA coding. Plos one, 15(10), e0241184.
  • [12] Mousa, H. M. (2016). DNA-Genetic Encryption Technique. International Journal of Computer Network & Information Security, 8(7).
  • [13] Shaheen, A.M., Sheltami, T.R., Al-Kharoubi, T.M. et al. Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT. J Ambient Intell Human Comput 10, 4733–4750 (2019).
  • [14] Shiguo Lian, Jinsheng Sun and Zhiquan Wang, "A novel image encryption scheme based-on JPEG encoding," Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004., 2004, pp. 217-220.
There are 14 citations in total.

Details

Primary Language English
Subjects Engineering
Journal Section Articles
Authors

Cihan Tiken 0000-0001-7844-2579

Rüya Şamlı 0000-0002-8723-1228

Publication Date December 30, 2022
Published in Issue Year 2022 Volume: 15 Issue: 2

Cite

APA Tiken, C., & Şamlı, R. (2022). PERFORMANCE ANALYSIS APPLİCATIONS OF SOME IMAGE ENCRYPTION TECHNIQUES. Beykent Üniversitesi Fen Ve Mühendislik Bilimleri Dergisi, 15(2), 77-88. https://doi.org/10.20854/bujse.1114856
AMA Tiken C, Şamlı R. PERFORMANCE ANALYSIS APPLİCATIONS OF SOME IMAGE ENCRYPTION TECHNIQUES. BUJSE. December 2022;15(2):77-88. doi:10.20854/bujse.1114856
Chicago Tiken, Cihan, and Rüya Şamlı. “PERFORMANCE ANALYSIS APPLİCATIONS OF SOME IMAGE ENCRYPTION TECHNIQUES”. Beykent Üniversitesi Fen Ve Mühendislik Bilimleri Dergisi 15, no. 2 (December 2022): 77-88. https://doi.org/10.20854/bujse.1114856.
EndNote Tiken C, Şamlı R (December 1, 2022) PERFORMANCE ANALYSIS APPLİCATIONS OF SOME IMAGE ENCRYPTION TECHNIQUES. Beykent Üniversitesi Fen ve Mühendislik Bilimleri Dergisi 15 2 77–88.
IEEE C. Tiken and R. Şamlı, “PERFORMANCE ANALYSIS APPLİCATIONS OF SOME IMAGE ENCRYPTION TECHNIQUES”, BUJSE, vol. 15, no. 2, pp. 77–88, 2022, doi: 10.20854/bujse.1114856.
ISNAD Tiken, Cihan - Şamlı, Rüya. “PERFORMANCE ANALYSIS APPLİCATIONS OF SOME IMAGE ENCRYPTION TECHNIQUES”. Beykent Üniversitesi Fen ve Mühendislik Bilimleri Dergisi 15/2 (December 2022), 77-88. https://doi.org/10.20854/bujse.1114856.
JAMA Tiken C, Şamlı R. PERFORMANCE ANALYSIS APPLİCATIONS OF SOME IMAGE ENCRYPTION TECHNIQUES. BUJSE. 2022;15:77–88.
MLA Tiken, Cihan and Rüya Şamlı. “PERFORMANCE ANALYSIS APPLİCATIONS OF SOME IMAGE ENCRYPTION TECHNIQUES”. Beykent Üniversitesi Fen Ve Mühendislik Bilimleri Dergisi, vol. 15, no. 2, 2022, pp. 77-88, doi:10.20854/bujse.1114856.
Vancouver Tiken C, Şamlı R. PERFORMANCE ANALYSIS APPLİCATIONS OF SOME IMAGE ENCRYPTION TECHNIQUES. BUJSE. 2022;15(2):77-88.