2019
DOI: 10.12928/telkomnika.v17i6.10488
| View full text |Cite
|
Sign up to set email alerts
|

Abstract: Encryption systems have been developed for image viewing applications using the Hill Cipher algorithm. This study aims to evaluate the image encryption quality of the Hill Cipher algorithm. Several traditional metrics are used to evaluate the quality of the encryption scheme. Three of such metrics have been selected for this study. These include, the Colour Histogram, the Maximum Deviation (comparing the original image) and the Entropy Analysis of the encrypted image. Encryption quality results from all three … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…)dB (formula no)…... (8) Where f(i,j) represent the original pixel (i, j), while F(i, j) is the ciphered pixel, and M × N refer to the picture size. MSE as part of equation 6, provides a quantitative score to describe the degree of similarity between two signals (19). Table 2 show the values of PSNR is highly below 30dB and that prove the encrypted image is highly secure and MSE values is very high and far from 0 with significant value.…”
Section: Msementioning
confidence: 96%
“…)dB (formula no)…... (8) Where f(i,j) represent the original pixel (i, j), while F(i, j) is the ciphered pixel, and M × N refer to the picture size. MSE as part of equation 6, provides a quantitative score to describe the degree of similarity between two signals (19). Table 2 show the values of PSNR is highly below 30dB and that prove the encrypted image is highly secure and MSE values is very high and far from 0 with significant value.…”
Section: Msementioning
confidence: 96%
“…Information Entropy Analysis (IEA) evaluates the degree of disorder or randomness of information in an image [23]. When the value of information entropy is high then there would be the least possibility of information leakage [64]. Here, i represents the value of pixel and p(i) shows the probability of i.…”
Section: ) Information Entropy Analysismentioning
confidence: 99%
“…The result of the analysis of the histogram shows that the modified algorithm is resistant to statistical attack. For an encryption algorithm to be resistant to statistical attack, it must have a histogram that is entirely different from the plain image and has a uniform distribution of values [25][26][27].…”
Section: Statistical Attackmentioning
confidence: 99%