BAZI GÖRÜNTÜ ŞİFRELEME TEKNİKLERİNİN PERFORMANS ANALİZİ UYGULAMALARI

İçinde bulunduğumuz teknoloji çağında veri güvenliği artık hükümetlerin, şirketlerin ve bireylerin en hayati ve en önemli konusu haline geldi. Veri türleri arasında görseller içerdikleri önemli bilgiler nedeniyle özel bir öneme sahiptir. Görüntülerin aktarılması veya saklanması ekstra güvenlik önlemleri gerektirir. Bu çalışmada, bazı görüntü şifreleme yöntemleri görüntü işleme alanında en popüler ve en çok kullanılan görüntülere uygulanarak performansları karşılaştırılmıştır. Dört farklı deney gerçekleştirilmiştir. Yedi farklı şifreleme yönteminin performansları birbirleri ile karşılaştırılarak yapılan ölçümler ve elde edilen gözlemler sunulmuştur.

PERFORMANCE ANALYSIS APPLİCATIONS OF SOME IMAGE ENCRYPTION TECHNIQUES

Data security is now the most vital and most important issue of governments, companies and individuals in the technology age we live in. Among the data types, images have a special importance because of the important information they contain. Transferring or storing images requires extra security measures. In this study, the performances of the image encryption methods were compared with each other by applying them to the most popular and most used images in the image processing area. Four different experiments were carried out. Performance of the seven particular encryption methods compared to each other and the obsevations and measurements was presented.

___

  • [1] Srividya, G. & Nandakumar, P.. (2011). A Triple-Key chaotic image encryption method. ICCSP 2011 - 2011 International Conference on Communications and Signal Processing.
  • [2] Chai, X., Zheng, X., Gan, Z., Han, D., & Chen, Y. (2018). An image encryption algorithm based on chaotic system and compressive sensing. Signal Processing, 148, 124-144.
  • [3] Zhang, Y., Li, Y., & Su, J. (2018). Iterative learning control for image feature extraction with multiple-image blends. EURASIP Journal on Image and Video Processing, 2018(1), 1-11.
  • [4] Jiang, N., Zhao, N., & Wang, L. (2016). LSB based quantum image steganography algorithm. International Journal of Theoretical Physics, 55(1), 107-123.
  • [5] Muhammad, K., Ahmad, J., Farman, H., & Zubair, M. (2015). A novel image steganographic approach for hiding text in color images using HSI color model. arXiv preprint arXiv:1503.00388.
  • [6] Isac, B., & Santhi, V. (2011). A study on digital image and video watermarking schemes using neural networks. International Journal of Computer Applications, 12(9), 1-6.
  • [7] Gonzalez, R. C., & Woods, R. E. (1992). Instructor's manual for digital image processing (Vol. 199). Addison-Wesley.
  • [8] Davies, E. R. (2004). Machine vision: theory, algorithms, practicalities. Elsevier.
  • [9] Horn, B. K., & Vision, R. (1986). MIT Press. Cambridge, Massachusetts.
  • [10] Anandakumar, S. (2015). Image cryptography using RSA algorithm in network security. International Journal of Computer Science & Engineering Technology, 5(9), 326-330.
  • [11] Xue, X., Zhou, D., & Zhou, C. (2020). New insights into the existing image encryption algorithms based on DNA coding. Plos one, 15(10), e0241184.
  • [12] Mousa, H. M. (2016). DNA-Genetic Encryption Technique. International Journal of Computer Network & Information Security, 8(7).
  • [13] Shaheen, A.M., Sheltami, T.R., Al-Kharoubi, T.M. et al. Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT. J Ambient Intell Human Comput 10, 4733–4750 (2019).
  • [14] Shiguo Lian, Jinsheng Sun and Zhiquan Wang, "A novel image encryption scheme based-on JPEG encoding," Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004., 2004, pp. 217-220.