2019 **Abstract:** Encryption systems have been developed for image viewing applications using the Hill Cipher algorithm. This study aims to evaluate the image encryption quality of the Hill Cipher algorithm. Several traditional metrics are used to evaluate the quality of the encryption scheme. Three of such metrics have been selected for this study. These include, the Colour Histogram, the Maximum Deviation (comparing the original image) and the Entropy Analysis of the encrypted image. Encryption quality results from all three …

Help me understand this report

Search citation statements

Paper Sections

Select...

2

1

1

1

Citation Types

0

7

0

Year Published

2020

2023

Publication Types

Select...

8

1

Relationship

0

9

Authors

Journals

(7 citation statements)

0

7

0

“…)dB (formula no)…... (8) Where f(i,j) represent the original pixel (i, j), while F(i, j) is the ciphered pixel, and M × N refer to the picture size. MSE as part of equation 6, provides a quantitative score to describe the degree of similarity between two signals (19). Table 2 show the values of PSNR is highly below 30dB and that prove the encrypted image is highly secure and MSE values is very high and far from 0 with significant value.…”

confidence: 96%

“…)dB (formula no)…... (8) Where f(i,j) represent the original pixel (i, j), while F(i, j) is the ciphered pixel, and M × N refer to the picture size. MSE as part of equation 6, provides a quantitative score to describe the degree of similarity between two signals (19). Table 2 show the values of PSNR is highly below 30dB and that prove the encrypted image is highly secure and MSE values is very high and far from 0 with significant value.…”

confidence: 96%

“…Information Entropy Analysis (IEA) evaluates the degree of disorder or randomness of information in an image [23]. When the value of information entropy is high then there would be the least possibility of information leakage [64]. Here, i represents the value of pixel and p(i) shows the probability of i.…”

confidence: 99%

“…The result of the analysis of the histogram shows that the modified algorithm is resistant to statistical attack. For an encryption algorithm to be resistant to statistical attack, it must have a histogram that is entirely different from the plain image and has a uniform distribution of values [25][26][27].…”

confidence: 99%