Visual Security Assessment for Cipher-Images based on Neighborhood Similarity

نویسندگان

  • Ye Yao
  • Zhengquan Xu
  • Jing Sun
چکیده

In the recent decades, many practical algorithms have been put forward for images and videos encryption. However, there is no objective security assessment algorithm or calculation index has been proposed at present. According to the differences of pixel value and neighborhood distribution between cipher-images and original images, we present a visual security assessment algorithm based on neighborhood similarity. The experiment result shows that the scheme can provide an objective assessment which is match up to subjective assessment, and is also suitable for the security assessment of cipher-images produced by other selective encryption algorithms.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Vision-Based and GPS-Signal-Independent Approach in Jamming Detection and UAV Absolute Positioning Assessment

The Unmanned Aerial Vehicles (UAV) positioning in the outdoor environment is usually done by the Global Positioning System (GPS). Due to the low power of the GPS signal at the earth surface, its performance disrupted in the contaminated environments with the jamming attacks. The UAV positioning and its accuracy using GPS will be degraded in the jamming attacks. A positioning error about tens of...

متن کامل

Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms

RC6, MRC6, and Rijndael are three block cipher algorithms. Different types of Bitmap images are encrypted with each of the three encryption algorithms. Visual inspection is not enough on judging the quality of encrypted images. So, other measuring factors are considered based on: measuring the maximum deviation between the original and the encrypted images, measuring the correlation coefficient...

متن کامل

New Fixed Point Attacks on GOST2 Block Cipher

GOST block cipher designed in the 1970s and published in 1989 as the Soviet and Russian standard GOST 28147-89. In order to enhance the security of GOST block cipher after proposing various attacks on it, designers published a modified version of GOST, namely GOST2, in 2015 which has a new key schedule and explicit choice for S-boxes. In this paper, by using three exactly identical portions of ...

متن کامل

روشی برای بازخورد ربط براساس بهبود تابع شباهت در بازیابی تصویر بر اساس محتوا

In content based image retrieval systems, the suitable visual features are extracted from images and stored in the feature database Then the feature database are searched to find the most similar images to the query image. In this paper, three types of visual features by 270 components were used for image indexing. Here, we use a weighted distance for similarity measurement between two images....

متن کامل

Security, confidentiality, and privacy of information in the field of health with data EPR embedding in medical MRI images based on HVS model

the development of new technology and modern equipment has led to the development of telemedicine systems. As a result, there are dangers such as publishing patient information and intentionally or unintentionally, medical information. The forensic organization, as one of the powerful arms of the judiciary, pursues important cases in the medical and psychiatric commissions to take steps to rea...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Informatica (Slovenia)

دوره 33  شماره 

صفحات  -

تاریخ انتشار 2009