Araştırma Makalesi
BibTex RIS Kaynak Göster

BAZI GÖRÜNTÜ ŞİFRELEME TEKNİKLERİNİN PERFORMANS ANALİZİ UYGULAMALARI

Yıl 2022, Cilt: 15 Sayı: 2, 77 - 88, 30.12.2022
https://doi.org/10.20854/bujse.1114856

Öz

İçinde bulunduğumuz teknoloji çağında veri güvenliği artık hükümetlerin, şirketlerin ve bireylerin en hayati ve en önemli konusu haline geldi. Veri türleri arasında görseller içerdikleri önemli bilgiler nedeniyle özel bir öneme sahiptir. Görüntülerin aktarılması veya saklanması ekstra güvenlik önlemleri gerektirir. Bu çalışmada, bazı görüntü şifreleme yöntemleri görüntü işleme alanında en popüler ve en çok kullanılan görüntülere uygulanarak performansları karşılaştırılmıştır. Dört farklı deney gerçekleştirilmiştir. Yedi farklı şifreleme yönteminin performansları birbirleri ile karşılaştırılarak yapılan ölçümler ve elde edilen gözlemler sunulmuştur.

Kaynakça

  • [1] Srividya, G. & Nandakumar, P.. (2011). A Triple-Key chaotic image encryption method. ICCSP 2011 - 2011 International Conference on Communications and Signal Processing.
  • [2] Chai, X., Zheng, X., Gan, Z., Han, D., & Chen, Y. (2018). An image encryption algorithm based on chaotic system and compressive sensing. Signal Processing, 148, 124-144.
  • [3] Zhang, Y., Li, Y., & Su, J. (2018). Iterative learning control for image feature extraction with multiple-image blends. EURASIP Journal on Image and Video Processing, 2018(1), 1-11.
  • [4] Jiang, N., Zhao, N., & Wang, L. (2016). LSB based quantum image steganography algorithm. International Journal of Theoretical Physics, 55(1), 107-123.
  • [5] Muhammad, K., Ahmad, J., Farman, H., & Zubair, M. (2015). A novel image steganographic approach for hiding text in color images using HSI color model. arXiv preprint arXiv:1503.00388.
  • [6] Isac, B., & Santhi, V. (2011). A study on digital image and video watermarking schemes using neural networks. International Journal of Computer Applications, 12(9), 1-6.
  • [7] Gonzalez, R. C., & Woods, R. E. (1992). Instructor's manual for digital image processing (Vol. 199). Addison-Wesley.
  • [8] Davies, E. R. (2004). Machine vision: theory, algorithms, practicalities. Elsevier.
  • [9] Horn, B. K., & Vision, R. (1986). MIT Press. Cambridge, Massachusetts.
  • [10] Anandakumar, S. (2015). Image cryptography using RSA algorithm in network security. International Journal of Computer Science & Engineering Technology, 5(9), 326-330.
  • [11] Xue, X., Zhou, D., & Zhou, C. (2020). New insights into the existing image encryption algorithms based on DNA coding. Plos one, 15(10), e0241184.
  • [12] Mousa, H. M. (2016). DNA-Genetic Encryption Technique. International Journal of Computer Network & Information Security, 8(7).
  • [13] Shaheen, A.M., Sheltami, T.R., Al-Kharoubi, T.M. et al. Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT. J Ambient Intell Human Comput 10, 4733–4750 (2019).
  • [14] Shiguo Lian, Jinsheng Sun and Zhiquan Wang, "A novel image encryption scheme based-on JPEG encoding," Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004., 2004, pp. 217-220.

PERFORMANCE ANALYSIS APPLİCATIONS OF SOME IMAGE ENCRYPTION TECHNIQUES

Yıl 2022, Cilt: 15 Sayı: 2, 77 - 88, 30.12.2022
https://doi.org/10.20854/bujse.1114856

Öz

Data security is now the most vital and most important issue of governments, companies and individuals in the technology age we live in. Among the data types, images have a special importance because of the important information they contain. Transferring or storing images requires extra security measures. In this study, the performances of the image encryption methods were compared with each other by applying them to the most popular and most used images in the image processing area. Four different experiments were carried out. Performance of the seven particular encryption methods compared to each other and the obsevations and measurements was presented.

Kaynakça

  • [1] Srividya, G. & Nandakumar, P.. (2011). A Triple-Key chaotic image encryption method. ICCSP 2011 - 2011 International Conference on Communications and Signal Processing.
  • [2] Chai, X., Zheng, X., Gan, Z., Han, D., & Chen, Y. (2018). An image encryption algorithm based on chaotic system and compressive sensing. Signal Processing, 148, 124-144.
  • [3] Zhang, Y., Li, Y., & Su, J. (2018). Iterative learning control for image feature extraction with multiple-image blends. EURASIP Journal on Image and Video Processing, 2018(1), 1-11.
  • [4] Jiang, N., Zhao, N., & Wang, L. (2016). LSB based quantum image steganography algorithm. International Journal of Theoretical Physics, 55(1), 107-123.
  • [5] Muhammad, K., Ahmad, J., Farman, H., & Zubair, M. (2015). A novel image steganographic approach for hiding text in color images using HSI color model. arXiv preprint arXiv:1503.00388.
  • [6] Isac, B., & Santhi, V. (2011). A study on digital image and video watermarking schemes using neural networks. International Journal of Computer Applications, 12(9), 1-6.
  • [7] Gonzalez, R. C., & Woods, R. E. (1992). Instructor's manual for digital image processing (Vol. 199). Addison-Wesley.
  • [8] Davies, E. R. (2004). Machine vision: theory, algorithms, practicalities. Elsevier.
  • [9] Horn, B. K., & Vision, R. (1986). MIT Press. Cambridge, Massachusetts.
  • [10] Anandakumar, S. (2015). Image cryptography using RSA algorithm in network security. International Journal of Computer Science & Engineering Technology, 5(9), 326-330.
  • [11] Xue, X., Zhou, D., & Zhou, C. (2020). New insights into the existing image encryption algorithms based on DNA coding. Plos one, 15(10), e0241184.
  • [12] Mousa, H. M. (2016). DNA-Genetic Encryption Technique. International Journal of Computer Network & Information Security, 8(7).
  • [13] Shaheen, A.M., Sheltami, T.R., Al-Kharoubi, T.M. et al. Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT. J Ambient Intell Human Comput 10, 4733–4750 (2019).
  • [14] Shiguo Lian, Jinsheng Sun and Zhiquan Wang, "A novel image encryption scheme based-on JPEG encoding," Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004., 2004, pp. 217-220.
Toplam 14 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Mühendislik
Bölüm Makaleler
Yazarlar

Cihan Tiken 0000-0001-7844-2579

Rüya Şamlı 0000-0002-8723-1228

Yayımlanma Tarihi 30 Aralık 2022
Yayımlandığı Sayı Yıl 2022 Cilt: 15 Sayı: 2

Kaynak Göster

APA Tiken, C., & Şamlı, R. (2022). PERFORMANCE ANALYSIS APPLİCATIONS OF SOME IMAGE ENCRYPTION TECHNIQUES. Beykent Üniversitesi Fen Ve Mühendislik Bilimleri Dergisi, 15(2), 77-88. https://doi.org/10.20854/bujse.1114856
AMA Tiken C, Şamlı R. PERFORMANCE ANALYSIS APPLİCATIONS OF SOME IMAGE ENCRYPTION TECHNIQUES. BUJSE. Aralık 2022;15(2):77-88. doi:10.20854/bujse.1114856
Chicago Tiken, Cihan, ve Rüya Şamlı. “PERFORMANCE ANALYSIS APPLİCATIONS OF SOME IMAGE ENCRYPTION TECHNIQUES”. Beykent Üniversitesi Fen Ve Mühendislik Bilimleri Dergisi 15, sy. 2 (Aralık 2022): 77-88. https://doi.org/10.20854/bujse.1114856.
EndNote Tiken C, Şamlı R (01 Aralık 2022) PERFORMANCE ANALYSIS APPLİCATIONS OF SOME IMAGE ENCRYPTION TECHNIQUES. Beykent Üniversitesi Fen ve Mühendislik Bilimleri Dergisi 15 2 77–88.
IEEE C. Tiken ve R. Şamlı, “PERFORMANCE ANALYSIS APPLİCATIONS OF SOME IMAGE ENCRYPTION TECHNIQUES”, BUJSE, c. 15, sy. 2, ss. 77–88, 2022, doi: 10.20854/bujse.1114856.
ISNAD Tiken, Cihan - Şamlı, Rüya. “PERFORMANCE ANALYSIS APPLİCATIONS OF SOME IMAGE ENCRYPTION TECHNIQUES”. Beykent Üniversitesi Fen ve Mühendislik Bilimleri Dergisi 15/2 (Aralık 2022), 77-88. https://doi.org/10.20854/bujse.1114856.
JAMA Tiken C, Şamlı R. PERFORMANCE ANALYSIS APPLİCATIONS OF SOME IMAGE ENCRYPTION TECHNIQUES. BUJSE. 2022;15:77–88.
MLA Tiken, Cihan ve Rüya Şamlı. “PERFORMANCE ANALYSIS APPLİCATIONS OF SOME IMAGE ENCRYPTION TECHNIQUES”. Beykent Üniversitesi Fen Ve Mühendislik Bilimleri Dergisi, c. 15, sy. 2, 2022, ss. 77-88, doi:10.20854/bujse.1114856.
Vancouver Tiken C, Şamlı R. PERFORMANCE ANALYSIS APPLİCATIONS OF SOME IMAGE ENCRYPTION TECHNIQUES. BUJSE. 2022;15(2):77-88.