Non-Performance of Pearson Correlation Coefficient for Evaluating Image Encryption Security

Document Type : Original Article

Authors

Abstract

In this paper, we described Pearson's correlation coefficient inefficiency for analyzing the relationship between an image and encrypted one. Also, the information index was investigated as a suitable substitute for Pearson correlation coefficient. This weakness is independent of the encryption system of the image en-cryption; however, two encryption algorithms such as modified AES and W7 stream cipher have been used for laboratory calculations. In addition, by quantitative and qualitative examination of other standards for encryption analyzing of the image, the information index, in comparison with the Pearson correlation coef-ficient, shows the strengths and weaknesses of the image encryption algorithms better.

Keywords


   [1]      A. Mirghadri and A. Jolfaei, “Survey: Image Encryption Using Salsa20,” IJCSI International Journal of Computer Science Issues, vol. 7, Issue .5, pp. 0814-1694, September 2010.##
   [2]      B. K. Singh, N. Sharma, N. Singla, N. Sharma, and N. Choudhary, “Image Encryption Using Block-Based Transformation Algorithm,” IJISET International Journal of Innovative Science, Engineering & Technology, vol. 1 Issue 3, May 2014.##
   [3]      M .A. Bani Younes and A. Jantan, “An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption,” IJCSNS International Journal of Computer Science and Network Security, vol. 8 no. 4,  April 2008.##
   [4]      A. Mirghadri and A. Jolfaei, “A Novel Image Encryption Scheme Using Chaotic Maps,” IHU Passive Defence Sci. & Tech., vol. 2, pp. 111-124, 2011. (In Persian)##
   [5]      A. Mirghadri and A. Jolfaei, “An image encryption approach using chaos and stream cipher,” Journal of Theoretical and Applied Information Technology, Sep. 2010.##
   [6]      B. Norouzi, S. Mirzakuchaki, S. M. Seyedzadeh and M. R. Mosavi, “A simple sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process,” Multimedia tools and applications, vol. 71, pp. 1469-1497, 2014.##
   [7]      Gh. R. Karamali and E. Kavand, “Designing Fast Algorithm to Encrypt Images Using The Chinese Remainder Theorem and Elliptic Curve,” Journal of Electronical & Cyber Defence, vol. 5, no. 3, Serial no. 19, 2017. (In Persian)##
   [8]      B. Fathi Vajargah, R. Asghari, and J. Vahidi, “Design and Analysis of a Novel Synchronous Stream Cipher Using Secure Pseudo Random Number Generator,” Journal of Electronical &Cyber Defence, vol. 4, no. 1, Serial no. 13, 2016. (In Persian)##
   [9]      F. Galton, “Regression towards mediocrity in hereditary stature,” Journal of the Anthropological Institute of Great Britain and Ireland, vol. 15, pp. 246-263, 1986.##
[11]      N. Ebrahimi, N. Y. Jalali, and E. Soofi, “Comparison, utility, and partition of dependence under absolutely continuous and singular distributions,” Journal of Multivariate Analysis, vol. 131, pp. 32-50, Oct. 2014.##
[12]      J. Daemen and V. Rijmen, “The block cipher Rijindael,” Proceedings of the Third Conference on smart card International Research and Applications, CARDIS’98, Lecture Notes in computer Science, vol. 1820, Springer, Berlin, 2000.##
[13]      A. Canteaut and E. Filiol, “Ciphertext Only Reconstruction of LFSRbased Stream Ciphers,” Institute National de Recherche en Informatique et en Automatique (INRIA), Technical report no. 3887, Feb. 2000.##
[14]      S. Thomas, D. Anthony, T. Berson, and G. Gong, “The W7 Stream Cipher Algorithm Internet Draft,” Apr. 2002.##
[15]      J. Behboudian, “Non Parametric Statistic,” Shiraz University, 2004. (In Persian )##
[16]      J. L. Rodgers and W.A. Nicewander, “Thirteen ways to look at the correlation coefficient,” The Amer. Statistician, vol. 42, pp. 59-66, Feb. 1988.##
[17]      O. J. Dunn and V. A. Clark, “Applied Statistics: Analysis of Variance and Regression,” New York: Wiley, 1974.##
[18]      E. K. Yen and R. G. Johnston,  “The Ineffectiveness of the Correlation Coefficient for Image Comparisons,” Los Alamos National Laboratory, LA-UR-96-2474.##
[19]      J. N. Kapur and M. Dhande, “On the entropy measure of stochastic dependence,” Indian journal of pure and applied mathematics, vol. 5(17), pp. 581-595, 1986.##
[20]      T. M. Cover and J. A. Thomas, “Elements of Information Theory, 2nd ed,” John Wiley & Sons, Inc. Hoboken, NJ, USA, 2005.##
[21]      D. J. C MacKay, “Information Theory, Inference, and Learning Algorithms,” 4th ed., Cambridge University Press: Cambridge, UK, 2003.##
[22]      S. Kullback and R. A. Leibler, “On information and sufficiency,” Annals of Mathematical Statistics, vol. 22 (1), pp. 79–86, 1951.##
[23]      S. Kullback, “Information Theory and Statistics,” Dover Publications, Inc. , 1968.##
[24]      J. N. Kapur and  M. Dhande, “On a family of normalized measure of inter dependence,” acta ciendica vol. XVI, M, 2, pp. 193-198, 1990.##
[25]      H. J. Kim, “On information theoretic index for measuring the stochastic dependence among sets of variate,” Journal of Korean Stat. Society, vol. 26(1), pp. 131-146, 1997.##
[26]      J. N. Kapur, “New measure of stochastic dependence,” IIT/ kapur  Res. Rep. No. 243-109-1985.##
[27]      J. N. Kapur, “Normalized measure of stochastic dependence,” IIT/kapur. Res. Rep. No. 279-110-1985.##
[28]      H. Noura, L. Sleem, M. Noura, M. Mansour1, A. Chehab1, and R. Couturier, “A New Efficient Lightweight and Secure Image Cipher Scheme,” Multimedia Tools and Applications, Aug. 2017.##
[29]      Fawaz.Z, Noura.H, and Mostefaoui.A, “An efficient and secure cipher scheme for images confidentiality preservation”, Signal Processing: Image Communication ,42,90–.108-.2016##
  • Receive Date: 06 October 2017
  • Revise Date: 20 February 2019
  • Accept Date: 19 September 2018
  • Publish Date: 23 July 2018