The entropy of several example photos is
displayed in Figure 4. The ability of the suggested
cryptosystem to withstand entropy attacks has been
widely established. The lungs are the most entropic
organ in the body. This can be checked by comparing
the cypher images derived from a standard photo to
one derived from a picture with a single altered pixel.
Adjusted pixel count is the foundation of NPCR. The
NPCR value of several test photos is displayed in
Figure 4. Here, the NPCR and UACI values in bone
are the highest.
Figure 4: Different evaluation parameter comparison.
5 CONCLUSION
Substitution systems were used in the selective image
encryption. The majority of critiques in this field rely
on confusing pixel-based substitution schemes and
other forms of random substitution. While effective,
such encryption methods are unlikely to provide as
much protection as do conventional numbers, which
are less vulnerable to attacks. Therefore, specific
encryption of restorative images based on
substitution computation is a better trade-off between
security and efficiency.
This work presents a hybrid confusion-based
strategy for selective picture encryption that makes
use of bounded boxes. There was a significant
decrease in required processing time and a noticeable
improvement in security. The proposed approach
promises a universally applicable selective
encryption algorithm that may be implemented across
a wide variety of computer distributed systems for
safe, scalable cloud data storage.
REFERENCES
Dworak, K, Nalepa, J, Boryczka, U & Kawulok, M (2016),
‘Cryptanalysis of SDES using genetic and memetic
algorithms’, Springer Computational Intelligence, vol.
642, no. 18, pp. 3-14.
Enayatifara, R, Abdullahb, AH, Isninb, IF, Altameemc, A
& Leed, M (2017), ‘Image encryption using a
synchronous permutation-diffusion technique’, Optics
and Laser in Engineering, vol. 90, no. 2, pp. 146-154.
Erdem Yavuz & Rifat Yazici (2016), ‘A chaos-based image
encryption algorithm with simple logical functions’,
Computers and Electrical Engineering, vol. 54, no. 1,
pp. 471 - 483.
Faragallah, OS (2013), ‘Efficient video watermarking
based on singular value decomposition in the discrete
wavelet transform domain’, International Journal of
Electronics and Communication, vol. 67, no. 3, pp.
189-196.
Fister, I & Tepeh (2016), ‘Epistatic arithmetic crossover
based on Cartesian graph product in ensemble
differential evolution’, Applied Mathematics
Computation, vol. 283, no. 18, pp. 181-194.
Gai-Ge Wang, Suash Deb & Xinchao Zhao (2016), ‘A new
monarch butterfly optimization with an improved
crossover operator’, Springer, vol. 18, no. 3, pp. 731-
755.
Guosheng Gu & Jie Ling (2014), ‘A fast image encryption
method by using chaotic 3D cat maps’, Elsevier-Optik,
vol. 125, no. 17, pp. 4700-4705.
Hang Chen, Camel Tanougast, Zhengjun Liu & Loic Sieler
(2017), ‘Asymmetric optical cryptosystem for color
image based equal modulus decomposition in gyrator
transform domains’, Optics and Laser Engineering, vol.
93, no. 1, pp. 1-8.
Hang Chen, Jiguang Zhao, Zhengjun Liu & Xiaoping Du
(2015), ‘Optodigital spectrum encryption by using
Baker mapping and gyrator transform’, Optics and
Lasers in Engineering, vol. 66, no. 1, pp. 285-293.
Jinhua Shi, Hui Lu & Kefei Mao (2016), ‘Solving the Test
Task Scheduling Problem with a Genetic Algorithm
Based on the Scheme Choice Rule’, Springer, vol.
9713, no. 1, pp. 19-27.
Jolfaei, A & Mirghdri, A (2011), ‘Image encryption using
chaos and block cipher’, Computer and Information
Science’, vol. 4, no. 1, pp. 172-185.
Jun Lang (2015), ‘Color image encryption based on color
blend and chaos permutation in the reality-preserving
multiple-parameter fractional Fourier transform
domain’, Optics Communications, vol. 338, no. 1, pp.
181-192.
Kai Wang, WJ, Pei, LH, Zou, Aiguo Song & Zhenya He
(2015), ‘On the security of 3D Cat map based
symmetric image encryption scheme’, Physics Letter
A, vol. 343, no. 6, pp. 432-439.
Li, C (2016), ‘Cracking a hierarchical chaotic image
encryption algorithm based on permutation’, Signal
Processing, vol. 118, no. 2, pp. 203-210.
Liansheng Su & Bo Gao (2013), ‘Single-channel color
image encryption based on iterative fractional Fourier
0
50
100
Lungs
Eye
Heart
Bone
Evaluation parameters Entropy
Evaluation parameters NPCR
Evaluation parameters UACI
An Investigation into the Usage of Bounding Boxes in Discriminating Image Encryption Algorithms
401