
Security Analysis of XOR Based Ciphered Image
Author(s) -
Piyali Sharma,
Ravi Shrivastava,
Vijay Kumar Sarthi,
Pramay Bhatpahri
Publication year - 2018
Publication title -
asian journal of computer science and technology
Language(s) - English
Resource type - Journals
eISSN - 2583-7907
pISSN - 2249-0701
DOI - 10.51983/ajcst-2018.7.1.1829
Subject(s) - scrambling , encryption , pixel , cipher , bitwise operation , histogram , entropy (arrow of time) , mathematics , exclusive or , computer science , cryptography , randomness , theoretical computer science , image (mathematics) , algorithm , artificial intelligence , statistics , computer security , decoding methods , physics , quantum mechanics , programming language
In the present paper, we report security analysis of an effective method of scrambling i.e. XOR technique, which may be used as an important component in visual cryptography. Histogram of scrambled or encrypted images expressed that pixel values are distributed quite uniformly. This implies that nothing can be guessed about the original image using the encrypted image. For analyzing the complexity of encrypted images, information entropy, the correlation coefficient of adjacent pixels values were also calculated. Values of horizontal correlation, vertical correlation, and information entropy reflected that the complexity and randomness of pixel values are quite high for XOR cipher. Now a day’s differential attack has been very common. Keeping the same in the mind, we have calculated Unified Average Changing Intensity (UACI) and the Number of Pixels Change Rate (NPCR), to exhibit the ability of encrypted image using XOR cipher to resist the differential attack. So we can say that XOR cipher is useful for secure transmission of an image.