عدم کارایی ضریب همبستگی پیرسن برای سنجش امنیت رمز نگاری تصویر

نویسندگان

1 دانشگاه دامغان

2 دانشگاه علم و صنعت

چکیده

در این مقاله عدم کارایی ضریب همبستگی پیرسن برای تحلیل ارتباط بین یک تصویر و تصویر رمز‌شده آن نشان داده شد. همچنین ضریب اطلاع به‌عنوان جایگزین مناسب برای ضریب همبستگی پیرسن مورد بررسی قرار گرفته شد. هر چند این ضعف مستقل از سامانه رمز استفاده‌شده در رمزنگاری تصویر می‌باشد، ولی دو الگوریتم رمز AES اصلاح‌شده و رمز جریانی W7 برای محاسبات آزمایشگاهی استفاده و همچنین با بررسی کمی و کیفی استانداردهای دیگر تحلیل رمزنگاری تصویر نشان داده می‌شود که ضریب اطلاع در مقایسه با ضریب همبستگی پیرسن نقاط قوت و ضعف الگوریتم‌های رمزنگاری تصویر را بهتر نشان می‌دهد.

کلیدواژه‌ها


   [1]      A. Mirghadri and A. Jolfaei, “Survey: Image Encryption Using Salsa20,” IJCSI International Journal of Computer Science Issues, vol. 7, Issue .5, pp. 0814-1694, September 2010.##

   [2]      B. K. Singh, N. Sharma, N. Singla, N. Sharma, and N. Choudhary, “Image Encryption Using Block-Based Transformation Algorithm,” IJISET International Journal of Innovative Science, Engineering & Technology, vol. 1 Issue 3, May 2014.##

   [3]      M .A. Bani Younes and A. Jantan, “An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption,” IJCSNS International Journal of Computer Science and Network Security, vol. 8 no. 4,  April 2008.##

   [4]      A. Mirghadri and A. Jolfaei, “A Novel Image Encryption Scheme Using Chaotic Maps,” IHU Passive Defence Sci. & Tech., vol. 2, pp. 111-124, 2011. (In Persian)##

   [5]      A. Mirghadri and A. Jolfaei, “An image encryption approach using chaos and stream cipher,” Journal of Theoretical and Applied Information Technology, Sep. 2010.##

   [6]      B. Norouzi, S. Mirzakuchaki, S. M. Seyedzadeh and M. R. Mosavi, “A simple sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process,” Multimedia tools and applications, vol. 71, pp. 1469-1497, 2014.##

   [7]      Gh. R. Karamali and E. Kavand, “Designing Fast Algorithm to Encrypt Images Using The Chinese Remainder Theorem and Elliptic Curve,” Journal of Electronical & Cyber Defence, vol. 5, no. 3, Serial no. 19, 2017. (In Persian)##

   [8]      B. Fathi Vajargah, R. Asghari, and J. Vahidi, “Design and Analysis of a Novel Synchronous Stream Cipher Using Secure Pseudo Random Number Generator,” Journal of Electronical &Cyber Defence, vol. 4, no. 1, Serial no. 13, 2016. (In Persian)##

   [9]      F. Galton, “Regression towards mediocrity in hereditary stature,” Journal of the Anthropological Institute of Great Britain and Ireland, vol. 15, pp. 246-263, 1986.##

[10]      F. Galton, “The British Association: Section II, Anthropology: Opening address by Francis Galton, F.R.S., etc., President of the Anthropological Institute, President of the Section,” Nature, vol. 32 (830), pp. 507-510, Sep.  1985.##

[11]      N. Ebrahimi, N. Y. Jalali, and E. Soofi, “Comparison, utility, and partition of dependence under absolutely continuous and singular distributions,” Journal of Multivariate Analysis, vol. 131, pp. 32-50, Oct. 2014.##

[12]      J. Daemen and V. Rijmen, “The block cipher Rijindael,” Proceedings of the Third Conference on smart card International Research and Applications, CARDIS’98, Lecture Notes in computer Science, vol. 1820, Springer, Berlin, 2000.##

[13]      A. Canteaut and E. Filiol, “Ciphertext Only Reconstruction of LFSRbased Stream Ciphers,” Institute National de Recherche en Informatique et en Automatique (INRIA), Technical report no. 3887, Feb. 2000.##

[14]      S. Thomas, D. Anthony, T. Berson, and G. Gong, “The W7 Stream Cipher Algorithm Internet Draft,” Apr. 2002.##

[15]      J. Behboudian, “Non Parametric Statistic,” Shiraz University, 2004. (In Persian )##

[16]      J. L. Rodgers and W.A. Nicewander, “Thirteen ways to look at the correlation coefficient,” The Amer. Statistician, vol. 42, pp. 59-66, Feb. 1988.##

[17]      O. J. Dunn and V. A. Clark, “Applied Statistics: Analysis of Variance and Regression,” New York: Wiley, 1974.##

[18]      E. K. Yen and R. G. Johnston,  “The Ineffectiveness of the Correlation Coefficient for Image Comparisons,” Los Alamos National Laboratory, LA-UR-96-2474.##

[19]      J. N. Kapur and M. Dhande, “On the entropy measure of stochastic dependence,” Indian journal of pure and applied mathematics, vol. 5(17), pp. 581-595, 1986.##

[20]      T. M. Cover and J. A. Thomas, “Elements of Information Theory, 2nd ed,” John Wiley & Sons, Inc. Hoboken, NJ, USA, 2005.##

[21]      D. J. C MacKay, “Information Theory, Inference, and Learning Algorithms,” 4th ed., Cambridge University Press: Cambridge, UK, 2003.##

[22]      S. Kullback and R. A. Leibler, “On information and sufficiency,” Annals of Mathematical Statistics, vol. 22 (1), pp. 79–86, 1951.##

[23]      S. Kullback, “Information Theory and Statistics,” Dover Publications, Inc. , 1968.##

[24]      J. N. Kapur and  M. Dhande, “On a family of normalized measure of inter dependence,” acta ciendica vol. XVI, M, 2, pp. 193-198, 1990.##

[25]      H. J. Kim, “On information theoretic index for measuring the stochastic dependence among sets of variate,” Journal of Korean Stat. Society, vol. 26(1), pp. 131-146, 1997.##

[26]      J. N. Kapur, “New measure of stochastic dependence,” IIT/ kapur  Res. Rep. No. 243-109-1985.##

[27]      J. N. Kapur, “Normalized measure of stochastic dependence,” IIT/kapur. Res. Rep. No. 279-110-1985.##

[28]      H. Noura, L. Sleem, M. Noura, M. Mansour1, A. Chehab1, and R. Couturier, “A New Efficient Lightweight and Secure Image Cipher Scheme,” Multimedia Tools and Applications, Aug. 2017.##

[29]      Fawaz.Z, Noura.H, and Mostefaoui.A, “An efficient and secure cipher scheme for images confidentiality preservation”, Signal Processing: Image Communication ,42,90–.108-.2016##