تعداد نشریات | 38 |
تعداد شمارهها | 1,240 |
تعداد مقالات | 8,994 |
تعداد مشاهده مقاله | 7,844,938 |
تعداد دریافت فایل اصل مقاله | 4,706,581 |
عدم کارایی ضریب همبستگی پیرسن برای سنجش امنیت رمز نگاری تصویر | ||
پدافند الکترونیکی و سایبری | ||
مقاله 8، دوره 6، شماره 2 - شماره پیاپی 22، مرداد 1397، صفحه 83-91 اصل مقاله (1.37 M) | ||
نوع مقاله: مقاله پژوهشی | ||
نویسندگان | ||
مجید فرهادی* 1؛ جواد قاسمیان1؛ حسین سبزه پرور2 | ||
1دانشگاه دامغان | ||
2دانشگاه علم و صنعت | ||
تاریخ دریافت: 14 مهر 1396، تاریخ بازنگری: 01 اسفند 1397، تاریخ پذیرش: 28 شهریور 1397 | ||
چکیده | ||
در این مقاله عدم کارایی ضریب همبستگی پیرسن برای تحلیل ارتباط بین یک تصویر و تصویر رمزشده آن نشان داده شد. همچنین ضریب اطلاع بهعنوان جایگزین مناسب برای ضریب همبستگی پیرسن مورد بررسی قرار گرفته شد. هر چند این ضعف مستقل از سامانه رمز استفادهشده در رمزنگاری تصویر میباشد، ولی دو الگوریتم رمز AES اصلاحشده و رمز جریانی W7 برای محاسبات آزمایشگاهی استفاده و همچنین با بررسی کمی و کیفی استانداردهای دیگر تحلیل رمزنگاری تصویر نشان داده میشود که ضریب اطلاع در مقایسه با ضریب همبستگی پیرسن نقاط قوت و ضعف الگوریتمهای رمزنگاری تصویر را بهتر نشان میدهد. | ||
کلیدواژهها | ||
رمزنگاری؛ رمزنگاری تصویر؛ ضریب همبستگی پیرسن؛ آنتروپی؛ حداکثر نسبت سیگنال به نویز | ||
عنوان مقاله [English] | ||
Non-Performance of Pearson Correlation Coefficient for Evaluating Image Encryption Security | ||
نویسندگان [English] | ||
Majid Farhadi1؛ Javad Ghasemian1؛ Hossein Sabzehparvar2 | ||
چکیده [English] | ||
In this paper, we described Pearson's correlation coefficient inefficiency for analyzing the relationship between an image and encrypted one. Also, the information index was investigated as a suitable substitute for Pearson correlation coefficient. This weakness is independent of the encryption system of the image en-cryption; however, two encryption algorithms such as modified AES and W7 stream cipher have been used for laboratory calculations. In addition, by quantitative and qualitative examination of other standards for encryption analyzing of the image, the information index, in comparison with the Pearson correlation coef-ficient, shows the strengths and weaknesses of the image encryption algorithms better. | ||
کلیدواژهها [English] | ||
Cryptography, Image Encryption, Pearson Correlation Coefficient, Entropy, Information Index | ||
مراجع | ||
[1] A. Mirghadri and A. Jolfaei, “Survey: Image Encryption Using Salsa20,” IJCSI International Journal of Computer Science Issues, vol. 7, Issue .5, pp. 0814-1694, September 2010.## [2] B. K. Singh, N. Sharma, N. Singla, N. Sharma, and N. Choudhary, “Image Encryption Using Block-Based Transformation Algorithm,” IJISET International Journal of Innovative Science, Engineering & Technology, vol. 1 Issue 3, May 2014.## [3] M .A. Bani Younes and A. Jantan, “An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption,” IJCSNS International Journal of Computer Science and Network Security, vol. 8 no. 4, April 2008.## [4] A. Mirghadri and A. Jolfaei, “A Novel Image Encryption Scheme Using Chaotic Maps,” IHU Passive Defence Sci. & Tech., vol. 2, pp. 111-124, 2011. (In Persian)## [5] A. Mirghadri and A. Jolfaei, “An image encryption approach using chaos and stream cipher,” Journal of Theoretical and Applied Information Technology, Sep. 2010.## [6] B. Norouzi, S. Mirzakuchaki, S. M. Seyedzadeh and M. R. Mosavi, “A simple sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process,” Multimedia tools and applications, vol. 71, pp. 1469-1497, 2014.## [7] Gh. R. Karamali and E. Kavand, “Designing Fast Algorithm to Encrypt Images Using The Chinese Remainder Theorem and Elliptic Curve,” Journal of Electronical & Cyber Defence, vol. 5, no. 3, Serial no. 19, 2017. (In Persian)## [8] B. Fathi Vajargah, R. Asghari, and J. Vahidi, “Design and Analysis of a Novel Synchronous Stream Cipher Using Secure Pseudo Random Number Generator,” Journal of Electronical &Cyber Defence, vol. 4, no. 1, Serial no. 13, 2016. (In Persian)## [9] F. Galton, “Regression towards mediocrity in hereditary stature,” Journal of the Anthropological Institute of Great Britain and Ireland, vol. 15, pp. 246-263, 1986.## [10] F. Galton, “The British Association: Section II, Anthropology: Opening address by Francis Galton, F.R.S., etc., President of the Anthropological Institute, President of the Section,” Nature, vol. 32 (830), pp. 507-510, Sep. 1985.## [11] N. Ebrahimi, N. Y. Jalali, and E. Soofi, “Comparison, utility, and partition of dependence under absolutely continuous and singular distributions,” Journal of Multivariate Analysis, vol. 131, pp. 32-50, Oct. 2014.## [12] J. Daemen and V. Rijmen, “The block cipher Rijindael,” Proceedings of the Third Conference on smart card International Research and Applications, CARDIS’98, Lecture Notes in computer Science, vol. 1820, Springer, Berlin, 2000.## [13] A. Canteaut and E. Filiol, “Ciphertext Only Reconstruction of LFSRbased Stream Ciphers,” Institute National de Recherche en Informatique et en Automatique (INRIA), Technical report no. 3887, Feb. 2000.## [14] S. Thomas, D. Anthony, T. Berson, and G. Gong, “The W7 Stream Cipher Algorithm Internet Draft,” Apr. 2002.## [15] J. Behboudian, “Non Parametric Statistic,” Shiraz University, 2004. (In Persian )## [16] J. L. Rodgers and W.A. Nicewander, “Thirteen ways to look at the correlation coefficient,” The Amer. Statistician, vol. 42, pp. 59-66, Feb. 1988.## [17] O. J. Dunn and V. A. Clark, “Applied Statistics: Analysis of Variance and Regression,” New York: Wiley, 1974.## [18] E. K. Yen and R. G. Johnston, “The Ineffectiveness of the Correlation Coefficient for Image Comparisons,” Los Alamos National Laboratory, LA-UR-96-2474.## [19] J. N. Kapur and M. Dhande, “On the entropy measure of stochastic dependence,” Indian journal of pure and applied mathematics, vol. 5(17), pp. 581-595, 1986.## [20] T. M. Cover and J. A. Thomas, “Elements of Information Theory, 2nd ed,” John Wiley & Sons, Inc. Hoboken, NJ, USA, 2005.## [21] D. J. C MacKay, “Information Theory, Inference, and Learning Algorithms,” 4th ed., Cambridge University Press: Cambridge, UK, 2003.## [22] S. Kullback and R. A. Leibler, “On information and sufficiency,” Annals of Mathematical Statistics, vol. 22 (1), pp. 79–86, 1951.## [23] S. Kullback, “Information Theory and Statistics,” Dover Publications, Inc. , 1968.## [24] J. N. Kapur and M. Dhande, “On a family of normalized measure of inter dependence,” acta ciendica vol. XVI, M, 2, pp. 193-198, 1990.## [25] H. J. Kim, “On information theoretic index for measuring the stochastic dependence among sets of variate,” Journal of Korean Stat. Society, vol. 26(1), pp. 131-146, 1997.## [26] J. N. Kapur, “New measure of stochastic dependence,” IIT/ kapur Res. Rep. No. 243-109-1985.## [27] J. N. Kapur, “Normalized measure of stochastic dependence,” IIT/kapur. Res. Rep. No. 279-110-1985.## [28] H. Noura, L. Sleem, M. Noura, M. Mansour1, A. Chehab1, and R. Couturier, “A New Efficient Lightweight and Secure Image Cipher Scheme,” Multimedia Tools and Applications, Aug. 2017.## [29] Fawaz.Z, Noura.H, and Mostefaoui.A, “An efficient and secure cipher scheme for images confidentiality preservation”, Signal Processing: Image Communication ,42,90–.108-.2016## | ||
آمار تعداد مشاهده مقاله: 449 تعداد دریافت فایل اصل مقاله: 396 |