SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 387
SECURITY ANALYSIS OF FBDK BLOCK CIPHER FOR DIGITAL
IMAGES
M. Kiran Reddy1
, K. J. Jegadish Kumar2
1
M.E-Communication Systems, 2
Assistant Professor, Electronics and Communication Department, SSN College of
Engineering, Tamilnadu, India
Abstract
Network security is one of the major concerns in the modern world. In this regard, a strong security technique is required to protect
user data. Cryptography techniques plays an important role in secured transmission through encryption of data and thus ensuring
integrity, authenticity, confidentiality of information. Several encryption algorithms have been proposed like AES (Advanced
Encryption Standard), DES (Data Encryption Standard) and RSA. These provide very good encryption for text applications. However,
these encryption schemes appear not to be ideal for image applications. Some algorithms like GKSBC and RC6 provide very good
encryption for digital images. New techniques are emerging that are aimed at providing secured transmission of images over
networks. The FBDK (Fixed Block with Dynamic Key Size) block cipher is a new cryptography technique designed using simple
operations like XOR, substitutions, circular shifting. The FBDK algorithm is applicable for blocks of any size with key size being
dynamic for each block. It does not involve any complex mathematical operations like modular exponentiation. It is a hybrid
cryptography technique based on symmetric key and asymmetric key cryptosystems. This paper investigates the security of FBDK
block cipher for digital images against brute-force attack, statistical analysis and Differential analysis attacks. In this paper, various
security analysis tests has been discussed which are helpful in finding out whether the FBDK encryption algorithm can do secure
encryption or not. Experimental results proves the security and efficiency of FBDK cipher for images against all aforementioned
types of attacks which justifies its consideration for real time image applications.
Keywords: Cryptography, Ciphers, Encryption, Security, and cryptanalysis.
----------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
The security of digital images is more important since the
communication of digital products over open networks occur
more and more frequently. Special and efficient technique is
needed for storage and transmission of data securely.
Encryption is the most practical security technique for digital
data in computer systems.
In order to fulfill such a task, many encryption methods have
been proposed such as DES, AES and RSA. However, these
encryption schemes appear not to be ideal for image
applications, due to bulk data capacity and high redundancy.
Also, they involve complex mathematical calculations that
require more time. In [2], FBDK block cipher was proposed,
which is capable of handling any block size with dynamic key
size based on the size of the message. The design procedure of
the FBDK algorithm is given in detail in [2]. This paper
explores the security of FBDK algorithm regarding brute
force, statistical attacks and Differential analysis in secured
transmission of digital images. The experiments carried out
along with their outcomes are discussed in detail in the
following sections.
2. SECURITY ANALYSIS AND TEST RESULTS
A good encryption technique has thoroughly rearranged pixel
positions, values transformed and visually transformed
processes. Some security analysis parameters [1] which are
done on FBDK algorithm are:
1. Statistical analysis
2. Key space analysis
3. Encryption quality
4. Differential analysis
2.1 Statistical Analysis
Shannon introduced two methods known as diffusion and
confusion which will make intruders and their attackers more
bewildered [1]. Diffusion means spreading out the influence of
a single plain image pixel over many cipher image pixels.
Confusion means, using transformations that Complicate the
dependence of statistics of the cipher image on the statistics of
the plain image [1]. The statistical analysis test is done by
finding out histogram and correlation of encrypted image with
respect to original image. The tests were performed using
Microsoft Windows 2008 on Intel(R) core(TM) i3-2350 CPU,
2.3 GHz to 2 GB of RAM using Matlab 7.0.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 388
2.1.1 Histogram
These are the first visual test performed by the intruders as
well as sender and receiver while decryption [1]. The
histogram of original and encrypted image must totally be
different, so that no sort of information about the original
image can be obtained from the encrypted image. Figure 1
shows the histograms of the original image “Cameraman.tif”
and its encrypted image. From the figure 1 it can be seen that
the histogram of encrypted image is completely different from
that of the original image and hence the FBDK algorithm is
highly resistant to histogram analysis and intruder can gain no
information from the encrypted image through visual tests.
Fig -1: Histogram analysis using FBDK algorithm. (a)
Original Image, (b) Histogram of Original Image, (c)
Encrypted Image, (d) Histogram of Encrypted Image.
2.1.2 Correlation Coefficient
Correlation coefficient gives the degree of similarity or
relationship between original and encrypted images [7]. Let A
be the original image and B be the encrypted image of size
MXN. Then the correlation coefficient denoted by ϓ is
calculated as,
ϓ =
∑ ∑∑∑
∑∑
−−
−−
m m n
mmn
n
mmn
m n
mmnmmn
BBAA
BBAA
))(
2
())(
2
(
))((
Where, Amn is pixel intensity at mth
row and nth
column of
original image, Bmn is pixel intensity at mth
row and nth
column
of encrypted image. Am is mean of all elements in original
image A and Bm is mean of all elements in encrypted image B.
The table 1 shows the correlation coefficient values obtained
for various images encrypted using FBDK algorithm.
Table -1: Correlation coefficient of standard Images
encrypted with FBDK algorithm
Image Size ϓ
Singer.jpg 256X256 -0.0005
Lena.tif 512X512 -0.0022
Pirage.tif 512X512 0.0006
The range of ϓ is -1 to +1. If the correlation coefficient value
is close to -1 or +1 then the original and encrypted images are
highly correlated and a significant information about original
image can be easily obtained from encrypted image. If ϓ is
close to zero then the original image and encrypted image are
highly uncorrelated and this implies the encryption efficiency
is high. From Table 1 the ϓ values obtained by encrypting
various standard images are very low (nearly zero) which
indicates that the original image and encrypted image are
highly uncorrelated and hence statistical attacks using
correlation is very difficult. The results of Histogram analysis
and Correlation coefficient tests prove that the FBDK
algorithm is highly resistant to statistical attacks. In the next
section, the algorithm’s resistance to key space analysis is
investigated.
2.2 Key Space Analysis
The key space refers to the number of bits used to encrypt
image. The key size should be large enough to tackle key
space analysis also known as brute force search attack. Here,
all possible key combinations are tried on the encrypted
message. Suppose, if the original key length used by the
receiver is of N bits, then 2N
combinations of key are possible.
If the N is very large, then it will be very difficult for the
attacker to try all the combinations. In the worse case, the
minimum number of searches the intruder must perform in
order to get the original key should be 2N/2
. The security of an
algorithm depends on its resistance to brute force search. The
proposed algorithm is analyzed against brute force search and
the experimental results prove it to be more resistant to key
space analysis. The table 1 shows the brute force search time
required with different N values and at an average decryption
time of 2.456. In the proposed algorithm the key length varies
for each block and hence it is very difficult for the attacker to
know the key length and to perform key analysis. Since, the
text and image data is highly encrypted and there is no pattern
of input seen in the encrypted output, the proposed algorithm
is also resistant to traffic analysis and release of message
content attacks.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 389
Table -2: Brute Force search analysis of FBDK algorithm
Key Length (in bits) Brute Force search time
(years)
128 5.61e+36
136 5.28e+38
144 1.29e+41
152 3.36e+43
The table 2 shows that if a key of length 128 bits is used then
the time required to perform brute for search is 5.61e+36
years. This is very large when compared with the lifetime of
the message that is being transmitted. Hence proposed
algorithm is highly resistant to brute force search attack or key
space analysis.
2.3 Encryption Quality
A good encryption scheme must posses high encryption
quality and low execution time [7]. In this section, encryption
quality and performance analysis tests were conducted on
FBDK algorithm using text and image files. The tests were
performed using Microsoft Windows 2008 on Intel(R)
core(TM) i3-2350 CPU, 2.3 GHz to 2 GB of RAM using
Matlab 7.0.
2.3.1 Encryption Analysis
To determine the encryption quality two tests Viz., EQ
measure, and PSNR (Peak Signal to Noise Ratio) value
calculation is performed.
2.3.1.1 Encryption Quality (EQ) measure
When an image is encrypted there will be a change in its grey
scale values. The EQ [7] measure gives the amount of
deviation of grey scale values in original and encrypted
images. Let I denote the original image and I’ denote the
encrypted image each of size M*N pixels with L grey levels.
Let HL(I) denote the number of occurrences of each grey level
L in the original image and HL(I’) denote the number of
occurrences of each grey level L in the encrypted image. The
encryption quality [7] represents the average number of
changes to each grey level L and is expressed mathematically
as,
Encryption Quality = 256
)()'(
255
0
∑=
−
L
LL IHIH
The table 3 gives a comparison between GKSBC and FBDK
in terms of EQ. All the images are of size 512X512 and FBDK
has high EQ values compared to GKSBC [7]. Hence, the
proposed algorithm proves to be efficient for image encryption
when compared with GKSBC.
Table -3: EQ comparison between GKSBC and FBDK
Image File EQ (GKSBC) EQ (FBDK)
Lena (512X512) 663.82 714.65
Baboon (512X512) 773.90 823.71
Girl (512X512) 894.89 939.71
2.3.1.2 PSNR Value
An efficient encryption algorithm produces an unintelligible
image [3] as output. The parameter that can be used for
determining the encryption efficiency of the algorithm is the
PSNR (peak signal to noise ratio) [4] value in decibels (dB).
Ideally, PSNR value between the actual image and encrypted
image (PSNR_A_E) should be 0 dB and between the actual
image and decrypted image (PSNR_A_D) it should be infinity
[7]. Practically an efficient algorithm give a PSNR value less
than 9 dB between actual image and encrypted image, a PSNR
value between (30-60) dB between actual image and
decrypted image. Table 2 shows the PSNR values obtained
with various standard test images taken as input to the
proposed algorithm. For all the images the PSNR value is
quite good, this also indicates that the algorithm can tolerate
various statistical attacks like the traffic analysis,
autocorrelation analysis etc. The PSNR values for decrypted
image show that the original image can be reconstructed
efficiently from the encrypted image.
Table -4: PSNR values for different Standard test images
encrypted using FBDK
Image name Dimensions PSNR_A_E
(dB)
PSNR_A_D
(dB)
Cameraman.tif 256 X 256 8.389 37.8532
Singer.jpg 225 X 225
X 3
8.6653 46.9137
Pirate.tif 512 X 512 8.9183 36.6502
2.4 Differential Analysis
Generally, the intruder tries to make slight changes such as
modifying one pixel of the encrypted image, and then
observes the change of the result. After such changes, if the
attacker is able to obtain any relevant information about
original image from the encrypted image then the algorithm
used for encryption is practically inefficient. Also, the
encrypted image must be sensitive to small changes in original
image. If a change in original image can cause a significant
change in the cipher image with respect to diffusion and
confusion, then the differential attack becomes very inefficient
on that image. The methods [1] used to study the influence of
one-pixel change on the whole image, encrypted by FBDK
are: Number of Pixels Change Rate (NPCR) and Unified
Average changing Intensity (UACI). NPCR gives the number
of pixels change rate in encrypted image when one pixel
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 390
change occurs in original image [1]. Consider two encrypted
images T1 and T2, whose original images have only one pixel
difference. Then, NPCR of two images is defined as [1]:
NPCR=
%100*
*
),(
,
vw
jiS
ji
∑
Where, S (i, j) = 


≠
=
),(),(if,1
),(),(if,0
21
21
jiTjiT
jiTjiT
w=number of rows in an image, v=number of columns in an
image, (i,j)=Position of Pixels
Another method, UACI is unified average changing intensity
which measures the average intensity of differences between
original image and ciphered image [1]. The formula for UACI
is:
UACI =
%100*
255
),(),((
*
1
,
21
∑
−
ji
jiTjiT
vw
NPCR or UACI are random variables dependent on
parameters such as the image size and format of image rather
than statistical values. For UACI the typical value taken on an
average for different image sizes is 34% and for NPCR score
the upper bound is 100% (ideal value) which indicates, it is
difficult to establish relationship between the images. One
performed test is on the one-pixel change influence on a 256
grey-scale image “cameraman.tif” of size 256X256. The
Figure 2 (b) shows the encrypted image and figure 2 (c) shows
the encrypted image obtained after one pixel value in the
original image is changed. The NPCR and UACI values for
different image sizes are listed in Table 5.
Fig -2: (a) Original Image, (b) Encrypted Image, (c) Encrypted
Image after pixel value change.
The encrypted images before and after pixel change are
completely scrambled. There is no significant information
about the original image is available in these images. From
table 5, we can find the values of NPCR and UACI to be very
close to ideal value for all size of images. This indicates that
no sort of relationship can be established between the
encrypted images.
Table 5 NPCR and UACI values for images of different sizes
encrypted with FBDK
Size NPCR UACI
128X128 99.2432% 33.254%
256X256 99.2523% 33.384%
512X512 99.3147% 33.462%
The NPCR and UACI tests prove that the FBDK algorithm is
resistant to differential analysis and hence it can be used
efficiently for digital image encryption for secured
transmission through the communication networks. Also, the
clearance of the differential analysis tests indicates that the
algorithm is also resistant to attacks like chosen plaintext,
chosen ciphertext, traffic analysis.
3. CONCLUSIONS
In modern communication world, image encryption plays a
crucial role, and hence, an efficient encryption algorithm is
necessary. The paper provides encryption efficiency analysis
and security evaluation of FBDK algorithm. The various
security analysis tests shows that FBDK block cipher can be
considered to be a real-time encryption technique for digital
images.
ACKNOWLEDGEMENTS
The authors wish to express heartful thanks to the faculty of
ECE, SSN College of Engineering, Chennai for their support
to this research.
REFERENCES
[1]. Taranjit Kaur, Reecha Sharma, “Security Definite
parameters for image encryption techniques”, International
journal of Emerging Technology and Advanced Engineering,
Volume 3, Issue 5, May, 2013.
[2]. M.Kiran Reddy and K.J.Jegadish Kumar,
“Implementation of Novel Hybrid Cryptography Algorithm”,
In press.
[3]. M. Ashwak AL-Abiachi, Faudziah Ahmad, Ku Ruhana, “
A Competitive Study of Cryptography Techniques over block
cipher”, UKSim 13th International Conference on Modelling
and Simulation, 2011.
[4]. Amitesh Singh Rajput, Nishchol Mishra, Sanjeev Sharma,
“Towards the Growth of Image Encryption and Authentication
Schemes”, International Conference on Advances in
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 391
Computing, Communicactions and Informatics (ICACCI),
2013.
[5]. G. Chen, Y. Mao and C.K. Chui, “A symmetric image
encryption scheme based on 3D chaotic cat maps”, Chaos
Solitons Fractals 2004; 21:749-61, 2004.
[6]. Nitty Sarah Alex and L. Jani Anbarasi, “Enhanced Image
Secret Sharing via Error Diffusion in Halftone Visual
Cryptography”, IEEE International Conference on ICASSP,
1985.
[7]. S. Arul jothi and M. Venkatesulu, “Encryption Quality
and Performance analysis of GKSBC algorithm”, Journnal of
Information Engineering and Applications, vol 2, No.10,
2012.
BIOGRAPHIES
M.Kiran Reddy is currently pursuing his
Masters degree in communication systems
in SSN Collegeof Engineering,
Email-id: kiran.reddy889@gmail.com
K.J.Jegadish Kumar is working as
Assistant Professor in SSN college of
Engineering, Chennai in ECE Department.
Email-id: jegadishkj@ssn.edu.in

Contenu connexe

Tendances

A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication cscpconf
 
Performance Evaluation of Password Authentication using Associative Neural Me...
Performance Evaluation of Password Authentication using Associative Neural Me...Performance Evaluation of Password Authentication using Associative Neural Me...
Performance Evaluation of Password Authentication using Associative Neural Me...ijait
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
 
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Eswar Publications
 
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...IJCNCJournal
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...IOSR Journals
 
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELAN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELijsptm
 
A survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing TechniqueA survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing Techniqueijsrd.com
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
 
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainEvaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainIJCI JOURNAL
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Imagesijsrd.com
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
 
The efficient digital signature technique with message recovery based on elgamal
The efficient digital signature technique with message recovery based on elgamalThe efficient digital signature technique with message recovery based on elgamal
The efficient digital signature technique with message recovery based on elgamalIAEME Publication
 
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKSA METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKSijsptm
 

Tendances (15)

A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication
 
Performance Evaluation of Password Authentication using Associative Neural Me...
Performance Evaluation of Password Authentication using Associative Neural Me...Performance Evaluation of Password Authentication using Associative Neural Me...
Performance Evaluation of Password Authentication using Associative Neural Me...
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...
 
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
 
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELAN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
 
A survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing TechniqueA survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing Technique
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
 
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainEvaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chain
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Images
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
 
The efficient digital signature technique with message recovery based on elgamal
The efficient digital signature technique with message recovery based on elgamalThe efficient digital signature technique with message recovery based on elgamal
The efficient digital signature technique with message recovery based on elgamal
 
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKSA METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
 

En vedette

Secure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfigurationSecure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfigurationeSAT Publishing House
 
Measurement of iodine availability and stability of
Measurement of iodine availability and stability ofMeasurement of iodine availability and stability of
Measurement of iodine availability and stability ofeSAT Publishing House
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodeSAT Publishing House
 
Impact resistance capacity of a green ultra high performance hybrid fibre rei...
Impact resistance capacity of a green ultra high performance hybrid fibre rei...Impact resistance capacity of a green ultra high performance hybrid fibre rei...
Impact resistance capacity of a green ultra high performance hybrid fibre rei...eSAT Publishing House
 
Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...eSAT Publishing House
 
Growth and characterization of pure and ni2+ doped
Growth and characterization of pure and ni2+ dopedGrowth and characterization of pure and ni2+ doped
Growth and characterization of pure and ni2+ dopedeSAT Publishing House
 
Simulation and experimental studies for lateral
Simulation and experimental studies for lateralSimulation and experimental studies for lateral
Simulation and experimental studies for lateraleSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
An analysis of desktop control and information retrieval from the internet us...
An analysis of desktop control and information retrieval from the internet us...An analysis of desktop control and information retrieval from the internet us...
An analysis of desktop control and information retrieval from the internet us...eSAT Publishing House
 
Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...eSAT Publishing House
 
Best lookup algorithm for 100+gbps ipv6 packet
Best lookup algorithm for 100+gbps ipv6 packetBest lookup algorithm for 100+gbps ipv6 packet
Best lookup algorithm for 100+gbps ipv6 packeteSAT Publishing House
 
Automatic detection and severity analysis of brain
Automatic detection and severity analysis of brainAutomatic detection and severity analysis of brain
Automatic detection and severity analysis of braineSAT Publishing House
 
Learning analytics to quantize and improve the skills development and attainm...
Learning analytics to quantize and improve the skills development and attainm...Learning analytics to quantize and improve the skills development and attainm...
Learning analytics to quantize and improve the skills development and attainm...eSAT Publishing House
 
Game theory problems by an alternative simplex method
Game theory problems by an alternative simplex methodGame theory problems by an alternative simplex method
Game theory problems by an alternative simplex methodeSAT Publishing House
 
Wireless facsimile connectivity using gsm module
Wireless facsimile connectivity using gsm moduleWireless facsimile connectivity using gsm module
Wireless facsimile connectivity using gsm moduleeSAT Publishing House
 
The influence of tree induce suction on soil suction
The influence of tree induce suction on soil suctionThe influence of tree induce suction on soil suction
The influence of tree induce suction on soil suctioneSAT Publishing House
 
Modeling of laminar flow tubular reactor using velocity profile
Modeling of laminar flow tubular reactor using velocity profileModeling of laminar flow tubular reactor using velocity profile
Modeling of laminar flow tubular reactor using velocity profileeSAT Publishing House
 
Anaerobic digestion of domestic wastewater
Anaerobic digestion of domestic wastewaterAnaerobic digestion of domestic wastewater
Anaerobic digestion of domestic wastewatereSAT Publishing House
 
Multi tracking system for vehicle using gps and gsm
Multi tracking system for vehicle using gps and gsmMulti tracking system for vehicle using gps and gsm
Multi tracking system for vehicle using gps and gsmeSAT Publishing House
 
Review and calculation of activity co efficient of tea
Review and calculation of activity co efficient of teaReview and calculation of activity co efficient of tea
Review and calculation of activity co efficient of teaeSAT Publishing House
 

En vedette (20)

Secure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfigurationSecure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfiguration
 
Measurement of iodine availability and stability of
Measurement of iodine availability and stability ofMeasurement of iodine availability and stability of
Measurement of iodine availability and stability of
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope method
 
Impact resistance capacity of a green ultra high performance hybrid fibre rei...
Impact resistance capacity of a green ultra high performance hybrid fibre rei...Impact resistance capacity of a green ultra high performance hybrid fibre rei...
Impact resistance capacity of a green ultra high performance hybrid fibre rei...
 
Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...Growth and physical properties of pure and manganese doped strontium tartrate...
Growth and physical properties of pure and manganese doped strontium tartrate...
 
Growth and characterization of pure and ni2+ doped
Growth and characterization of pure and ni2+ dopedGrowth and characterization of pure and ni2+ doped
Growth and characterization of pure and ni2+ doped
 
Simulation and experimental studies for lateral
Simulation and experimental studies for lateralSimulation and experimental studies for lateral
Simulation and experimental studies for lateral
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
An analysis of desktop control and information retrieval from the internet us...
An analysis of desktop control and information retrieval from the internet us...An analysis of desktop control and information retrieval from the internet us...
An analysis of desktop control and information retrieval from the internet us...
 
Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...Use of cloud federation without need of identity federation using dynamic acc...
Use of cloud federation without need of identity federation using dynamic acc...
 
Best lookup algorithm for 100+gbps ipv6 packet
Best lookup algorithm for 100+gbps ipv6 packetBest lookup algorithm for 100+gbps ipv6 packet
Best lookup algorithm for 100+gbps ipv6 packet
 
Automatic detection and severity analysis of brain
Automatic detection and severity analysis of brainAutomatic detection and severity analysis of brain
Automatic detection and severity analysis of brain
 
Learning analytics to quantize and improve the skills development and attainm...
Learning analytics to quantize and improve the skills development and attainm...Learning analytics to quantize and improve the skills development and attainm...
Learning analytics to quantize and improve the skills development and attainm...
 
Game theory problems by an alternative simplex method
Game theory problems by an alternative simplex methodGame theory problems by an alternative simplex method
Game theory problems by an alternative simplex method
 
Wireless facsimile connectivity using gsm module
Wireless facsimile connectivity using gsm moduleWireless facsimile connectivity using gsm module
Wireless facsimile connectivity using gsm module
 
The influence of tree induce suction on soil suction
The influence of tree induce suction on soil suctionThe influence of tree induce suction on soil suction
The influence of tree induce suction on soil suction
 
Modeling of laminar flow tubular reactor using velocity profile
Modeling of laminar flow tubular reactor using velocity profileModeling of laminar flow tubular reactor using velocity profile
Modeling of laminar flow tubular reactor using velocity profile
 
Anaerobic digestion of domestic wastewater
Anaerobic digestion of domestic wastewaterAnaerobic digestion of domestic wastewater
Anaerobic digestion of domestic wastewater
 
Multi tracking system for vehicle using gps and gsm
Multi tracking system for vehicle using gps and gsmMulti tracking system for vehicle using gps and gsm
Multi tracking system for vehicle using gps and gsm
 
Review and calculation of activity co efficient of tea
Review and calculation of activity co efficient of teaReview and calculation of activity co efficient of tea
Review and calculation of activity co efficient of tea
 

Similaire à Security analysis of fbdk block cipher for digital

Chaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A ReviewChaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A ReviewIRJET Journal
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET Journal
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingIRJET Journal
 
Secured data hiding by using extended visual
Secured data hiding by using extended visualSecured data hiding by using extended visual
Secured data hiding by using extended visualeSAT Publishing House
 
Secured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptographySecured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptographyeSAT Journals
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET-  	  Lossless Encryption Technique for Finger Biometric ImagesIRJET-  	  Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric ImagesIRJET Journal
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET Journal
 
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...IJECEIAES
 
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemProtection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemIRJET Journal
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different mediaseSAT Journals
 
Emerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital ForensicsEmerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital ForensicsIRJET Journal
 
Significant Data Hiding through Discrete Wavelet Transformation Approach
Significant Data Hiding through Discrete Wavelet Transformation ApproachSignificant Data Hiding through Discrete Wavelet Transformation Approach
Significant Data Hiding through Discrete Wavelet Transformation ApproachEswar Publications
 
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET-  	  A Review Paper on Chaotic Map Image Encryption TechniquesIRJET-  	  A Review Paper on Chaotic Map Image Encryption Techniques
IRJET- A Review Paper on Chaotic Map Image Encryption TechniquesIRJET Journal
 
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...IRJET Journal
 
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...IRJET Journal
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET Journal
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature mapsAlexander Decker
 

Similaire à Security analysis of fbdk block cipher for digital (20)

Chaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A ReviewChaos Based Image Encryption Techniques: A Review
Chaos Based Image Encryption Techniques: A Review
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
 
Secured data hiding by using extended visual
Secured data hiding by using extended visualSecured data hiding by using extended visual
Secured data hiding by using extended visual
 
Secured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptographySecured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptography
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET-  	  Lossless Encryption Technique for Finger Biometric ImagesIRJET-  	  Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
 
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
 
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemProtection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based System
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 
Emerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital ForensicsEmerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital Forensics
 
Significant Data Hiding through Discrete Wavelet Transformation Approach
Significant Data Hiding through Discrete Wavelet Transformation ApproachSignificant Data Hiding through Discrete Wavelet Transformation Approach
Significant Data Hiding through Discrete Wavelet Transformation Approach
 
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
IRJET-  	  A Review Paper on Chaotic Map Image Encryption TechniquesIRJET-  	  A Review Paper on Chaotic Map Image Encryption Techniques
IRJET- A Review Paper on Chaotic Map Image Encryption Techniques
 
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
 
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
 

Plus de eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 
Disaster recovery sustainable housing
Disaster recovery sustainable housingDisaster recovery sustainable housing
Disaster recovery sustainable housingeSAT Publishing House
 

Plus de eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 
Disaster recovery sustainable housing
Disaster recovery sustainable housingDisaster recovery sustainable housing
Disaster recovery sustainable housing
 

Dernier

Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 

Dernier (20)

(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 

Security analysis of fbdk block cipher for digital

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 387 SECURITY ANALYSIS OF FBDK BLOCK CIPHER FOR DIGITAL IMAGES M. Kiran Reddy1 , K. J. Jegadish Kumar2 1 M.E-Communication Systems, 2 Assistant Professor, Electronics and Communication Department, SSN College of Engineering, Tamilnadu, India Abstract Network security is one of the major concerns in the modern world. In this regard, a strong security technique is required to protect user data. Cryptography techniques plays an important role in secured transmission through encryption of data and thus ensuring integrity, authenticity, confidentiality of information. Several encryption algorithms have been proposed like AES (Advanced Encryption Standard), DES (Data Encryption Standard) and RSA. These provide very good encryption for text applications. However, these encryption schemes appear not to be ideal for image applications. Some algorithms like GKSBC and RC6 provide very good encryption for digital images. New techniques are emerging that are aimed at providing secured transmission of images over networks. The FBDK (Fixed Block with Dynamic Key Size) block cipher is a new cryptography technique designed using simple operations like XOR, substitutions, circular shifting. The FBDK algorithm is applicable for blocks of any size with key size being dynamic for each block. It does not involve any complex mathematical operations like modular exponentiation. It is a hybrid cryptography technique based on symmetric key and asymmetric key cryptosystems. This paper investigates the security of FBDK block cipher for digital images against brute-force attack, statistical analysis and Differential analysis attacks. In this paper, various security analysis tests has been discussed which are helpful in finding out whether the FBDK encryption algorithm can do secure encryption or not. Experimental results proves the security and efficiency of FBDK cipher for images against all aforementioned types of attacks which justifies its consideration for real time image applications. Keywords: Cryptography, Ciphers, Encryption, Security, and cryptanalysis. ----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION The security of digital images is more important since the communication of digital products over open networks occur more and more frequently. Special and efficient technique is needed for storage and transmission of data securely. Encryption is the most practical security technique for digital data in computer systems. In order to fulfill such a task, many encryption methods have been proposed such as DES, AES and RSA. However, these encryption schemes appear not to be ideal for image applications, due to bulk data capacity and high redundancy. Also, they involve complex mathematical calculations that require more time. In [2], FBDK block cipher was proposed, which is capable of handling any block size with dynamic key size based on the size of the message. The design procedure of the FBDK algorithm is given in detail in [2]. This paper explores the security of FBDK algorithm regarding brute force, statistical attacks and Differential analysis in secured transmission of digital images. The experiments carried out along with their outcomes are discussed in detail in the following sections. 2. SECURITY ANALYSIS AND TEST RESULTS A good encryption technique has thoroughly rearranged pixel positions, values transformed and visually transformed processes. Some security analysis parameters [1] which are done on FBDK algorithm are: 1. Statistical analysis 2. Key space analysis 3. Encryption quality 4. Differential analysis 2.1 Statistical Analysis Shannon introduced two methods known as diffusion and confusion which will make intruders and their attackers more bewildered [1]. Diffusion means spreading out the influence of a single plain image pixel over many cipher image pixels. Confusion means, using transformations that Complicate the dependence of statistics of the cipher image on the statistics of the plain image [1]. The statistical analysis test is done by finding out histogram and correlation of encrypted image with respect to original image. The tests were performed using Microsoft Windows 2008 on Intel(R) core(TM) i3-2350 CPU, 2.3 GHz to 2 GB of RAM using Matlab 7.0.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 388 2.1.1 Histogram These are the first visual test performed by the intruders as well as sender and receiver while decryption [1]. The histogram of original and encrypted image must totally be different, so that no sort of information about the original image can be obtained from the encrypted image. Figure 1 shows the histograms of the original image “Cameraman.tif” and its encrypted image. From the figure 1 it can be seen that the histogram of encrypted image is completely different from that of the original image and hence the FBDK algorithm is highly resistant to histogram analysis and intruder can gain no information from the encrypted image through visual tests. Fig -1: Histogram analysis using FBDK algorithm. (a) Original Image, (b) Histogram of Original Image, (c) Encrypted Image, (d) Histogram of Encrypted Image. 2.1.2 Correlation Coefficient Correlation coefficient gives the degree of similarity or relationship between original and encrypted images [7]. Let A be the original image and B be the encrypted image of size MXN. Then the correlation coefficient denoted by ϓ is calculated as, ϓ = ∑ ∑∑∑ ∑∑ −− −− m m n mmn n mmn m n mmnmmn BBAA BBAA ))( 2 ())( 2 ( ))(( Where, Amn is pixel intensity at mth row and nth column of original image, Bmn is pixel intensity at mth row and nth column of encrypted image. Am is mean of all elements in original image A and Bm is mean of all elements in encrypted image B. The table 1 shows the correlation coefficient values obtained for various images encrypted using FBDK algorithm. Table -1: Correlation coefficient of standard Images encrypted with FBDK algorithm Image Size ϓ Singer.jpg 256X256 -0.0005 Lena.tif 512X512 -0.0022 Pirage.tif 512X512 0.0006 The range of ϓ is -1 to +1. If the correlation coefficient value is close to -1 or +1 then the original and encrypted images are highly correlated and a significant information about original image can be easily obtained from encrypted image. If ϓ is close to zero then the original image and encrypted image are highly uncorrelated and this implies the encryption efficiency is high. From Table 1 the ϓ values obtained by encrypting various standard images are very low (nearly zero) which indicates that the original image and encrypted image are highly uncorrelated and hence statistical attacks using correlation is very difficult. The results of Histogram analysis and Correlation coefficient tests prove that the FBDK algorithm is highly resistant to statistical attacks. In the next section, the algorithm’s resistance to key space analysis is investigated. 2.2 Key Space Analysis The key space refers to the number of bits used to encrypt image. The key size should be large enough to tackle key space analysis also known as brute force search attack. Here, all possible key combinations are tried on the encrypted message. Suppose, if the original key length used by the receiver is of N bits, then 2N combinations of key are possible. If the N is very large, then it will be very difficult for the attacker to try all the combinations. In the worse case, the minimum number of searches the intruder must perform in order to get the original key should be 2N/2 . The security of an algorithm depends on its resistance to brute force search. The proposed algorithm is analyzed against brute force search and the experimental results prove it to be more resistant to key space analysis. The table 1 shows the brute force search time required with different N values and at an average decryption time of 2.456. In the proposed algorithm the key length varies for each block and hence it is very difficult for the attacker to know the key length and to perform key analysis. Since, the text and image data is highly encrypted and there is no pattern of input seen in the encrypted output, the proposed algorithm is also resistant to traffic analysis and release of message content attacks.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 389 Table -2: Brute Force search analysis of FBDK algorithm Key Length (in bits) Brute Force search time (years) 128 5.61e+36 136 5.28e+38 144 1.29e+41 152 3.36e+43 The table 2 shows that if a key of length 128 bits is used then the time required to perform brute for search is 5.61e+36 years. This is very large when compared with the lifetime of the message that is being transmitted. Hence proposed algorithm is highly resistant to brute force search attack or key space analysis. 2.3 Encryption Quality A good encryption scheme must posses high encryption quality and low execution time [7]. In this section, encryption quality and performance analysis tests were conducted on FBDK algorithm using text and image files. The tests were performed using Microsoft Windows 2008 on Intel(R) core(TM) i3-2350 CPU, 2.3 GHz to 2 GB of RAM using Matlab 7.0. 2.3.1 Encryption Analysis To determine the encryption quality two tests Viz., EQ measure, and PSNR (Peak Signal to Noise Ratio) value calculation is performed. 2.3.1.1 Encryption Quality (EQ) measure When an image is encrypted there will be a change in its grey scale values. The EQ [7] measure gives the amount of deviation of grey scale values in original and encrypted images. Let I denote the original image and I’ denote the encrypted image each of size M*N pixels with L grey levels. Let HL(I) denote the number of occurrences of each grey level L in the original image and HL(I’) denote the number of occurrences of each grey level L in the encrypted image. The encryption quality [7] represents the average number of changes to each grey level L and is expressed mathematically as, Encryption Quality = 256 )()'( 255 0 ∑= − L LL IHIH The table 3 gives a comparison between GKSBC and FBDK in terms of EQ. All the images are of size 512X512 and FBDK has high EQ values compared to GKSBC [7]. Hence, the proposed algorithm proves to be efficient for image encryption when compared with GKSBC. Table -3: EQ comparison between GKSBC and FBDK Image File EQ (GKSBC) EQ (FBDK) Lena (512X512) 663.82 714.65 Baboon (512X512) 773.90 823.71 Girl (512X512) 894.89 939.71 2.3.1.2 PSNR Value An efficient encryption algorithm produces an unintelligible image [3] as output. The parameter that can be used for determining the encryption efficiency of the algorithm is the PSNR (peak signal to noise ratio) [4] value in decibels (dB). Ideally, PSNR value between the actual image and encrypted image (PSNR_A_E) should be 0 dB and between the actual image and decrypted image (PSNR_A_D) it should be infinity [7]. Practically an efficient algorithm give a PSNR value less than 9 dB between actual image and encrypted image, a PSNR value between (30-60) dB between actual image and decrypted image. Table 2 shows the PSNR values obtained with various standard test images taken as input to the proposed algorithm. For all the images the PSNR value is quite good, this also indicates that the algorithm can tolerate various statistical attacks like the traffic analysis, autocorrelation analysis etc. The PSNR values for decrypted image show that the original image can be reconstructed efficiently from the encrypted image. Table -4: PSNR values for different Standard test images encrypted using FBDK Image name Dimensions PSNR_A_E (dB) PSNR_A_D (dB) Cameraman.tif 256 X 256 8.389 37.8532 Singer.jpg 225 X 225 X 3 8.6653 46.9137 Pirate.tif 512 X 512 8.9183 36.6502 2.4 Differential Analysis Generally, the intruder tries to make slight changes such as modifying one pixel of the encrypted image, and then observes the change of the result. After such changes, if the attacker is able to obtain any relevant information about original image from the encrypted image then the algorithm used for encryption is practically inefficient. Also, the encrypted image must be sensitive to small changes in original image. If a change in original image can cause a significant change in the cipher image with respect to diffusion and confusion, then the differential attack becomes very inefficient on that image. The methods [1] used to study the influence of one-pixel change on the whole image, encrypted by FBDK are: Number of Pixels Change Rate (NPCR) and Unified Average changing Intensity (UACI). NPCR gives the number of pixels change rate in encrypted image when one pixel
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 390 change occurs in original image [1]. Consider two encrypted images T1 and T2, whose original images have only one pixel difference. Then, NPCR of two images is defined as [1]: NPCR= %100* * ),( , vw jiS ji ∑ Where, S (i, j) =    ≠ = ),(),(if,1 ),(),(if,0 21 21 jiTjiT jiTjiT w=number of rows in an image, v=number of columns in an image, (i,j)=Position of Pixels Another method, UACI is unified average changing intensity which measures the average intensity of differences between original image and ciphered image [1]. The formula for UACI is: UACI = %100* 255 ),(),(( * 1 , 21 ∑ − ji jiTjiT vw NPCR or UACI are random variables dependent on parameters such as the image size and format of image rather than statistical values. For UACI the typical value taken on an average for different image sizes is 34% and for NPCR score the upper bound is 100% (ideal value) which indicates, it is difficult to establish relationship between the images. One performed test is on the one-pixel change influence on a 256 grey-scale image “cameraman.tif” of size 256X256. The Figure 2 (b) shows the encrypted image and figure 2 (c) shows the encrypted image obtained after one pixel value in the original image is changed. The NPCR and UACI values for different image sizes are listed in Table 5. Fig -2: (a) Original Image, (b) Encrypted Image, (c) Encrypted Image after pixel value change. The encrypted images before and after pixel change are completely scrambled. There is no significant information about the original image is available in these images. From table 5, we can find the values of NPCR and UACI to be very close to ideal value for all size of images. This indicates that no sort of relationship can be established between the encrypted images. Table 5 NPCR and UACI values for images of different sizes encrypted with FBDK Size NPCR UACI 128X128 99.2432% 33.254% 256X256 99.2523% 33.384% 512X512 99.3147% 33.462% The NPCR and UACI tests prove that the FBDK algorithm is resistant to differential analysis and hence it can be used efficiently for digital image encryption for secured transmission through the communication networks. Also, the clearance of the differential analysis tests indicates that the algorithm is also resistant to attacks like chosen plaintext, chosen ciphertext, traffic analysis. 3. CONCLUSIONS In modern communication world, image encryption plays a crucial role, and hence, an efficient encryption algorithm is necessary. The paper provides encryption efficiency analysis and security evaluation of FBDK algorithm. The various security analysis tests shows that FBDK block cipher can be considered to be a real-time encryption technique for digital images. ACKNOWLEDGEMENTS The authors wish to express heartful thanks to the faculty of ECE, SSN College of Engineering, Chennai for their support to this research. REFERENCES [1]. Taranjit Kaur, Reecha Sharma, “Security Definite parameters for image encryption techniques”, International journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 5, May, 2013. [2]. M.Kiran Reddy and K.J.Jegadish Kumar, “Implementation of Novel Hybrid Cryptography Algorithm”, In press. [3]. M. Ashwak AL-Abiachi, Faudziah Ahmad, Ku Ruhana, “ A Competitive Study of Cryptography Techniques over block cipher”, UKSim 13th International Conference on Modelling and Simulation, 2011. [4]. Amitesh Singh Rajput, Nishchol Mishra, Sanjeev Sharma, “Towards the Growth of Image Encryption and Authentication Schemes”, International Conference on Advances in
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 391 Computing, Communicactions and Informatics (ICACCI), 2013. [5]. G. Chen, Y. Mao and C.K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps”, Chaos Solitons Fractals 2004; 21:749-61, 2004. [6]. Nitty Sarah Alex and L. Jani Anbarasi, “Enhanced Image Secret Sharing via Error Diffusion in Halftone Visual Cryptography”, IEEE International Conference on ICASSP, 1985. [7]. S. Arul jothi and M. Venkatesulu, “Encryption Quality and Performance analysis of GKSBC algorithm”, Journnal of Information Engineering and Applications, vol 2, No.10, 2012. BIOGRAPHIES M.Kiran Reddy is currently pursuing his Masters degree in communication systems in SSN Collegeof Engineering, Email-id: kiran.reddy889@gmail.com K.J.Jegadish Kumar is working as Assistant Professor in SSN college of Engineering, Chennai in ECE Department. Email-id: jegadishkj@ssn.edu.in