z-logo
open-access-imgOpen Access
How to Evaluate the Security and Performance of an Image Encryption System
Author(s) -
R. Ratheesh,
Jabin Mathew
Publication year - 2020
Publication title -
international journal of scientific research in science, engineering and technology
Language(s) - English
Resource type - Journals
eISSN - 2395-1990
pISSN - 2394-4099
DOI - 10.32628/ijsrset207372
Subject(s) - encryption , computer science , probabilistic encryption , on the fly encryption , 56 bit encryption , multiple encryption , 40 bit encryption , computer security , disk encryption , key (lock) , image (mathematics) , link encryption , disk encryption theory , client side encryption , attribute based encryption , computer vision , public key cryptography
Almost all technical people know about images and image encryption, but some of them are not aware of the security and performance of the encryption systems. All image encryption systems are capable of encrypting the images, but some are not so secure. However, the question is how to evaluate the encryption systems. This paper gives you what are the analyses that are possible for evaluating the security and performance of the encryption systems. We hope this paper gives you an insight into Images, Image encryption, Security attacks, Noise and information loss, Evaluation Criteria, Analysis, Resistance, Key, Speed, Complexity, and other parameters.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here