Page 177 - 2024-Vol20-Issue2
P. 177
173 | Muttashar & Fyath
Fig. 16. Results of the decrypted subscheme. (a) unscrambled Fig. 17. Histograms of the RGB encrypted images.
image, (b) de-fusion image, (c) decrypted Lena, (d) decrypted
baboon images.
TABLE I. correlation coefficients are almost zero. This highlights the
ENTROPY FOR VARIOUS COLOR IMAGES IN THE THREE effectiveness of the encryption process adopted in this work.
COLOR CHANNELS USED IN THE HDOE SCHEME. D. Noise Attack Analysis
During transmission, noise significantly impacts the quality
Entropy of the encrypted image. The results show that the noise at-
tack with various noise levels on the encrypted image yields
RGB Lena- Barbara- Sailboat- decrypted images that still maintain noise resistance and im-
Channels Peppers age retrieval well. This is illustrated in Fig. 22 where the
Red Baboon Airplane 7.9982 decrypted images of Lena, Baboon, sailboat, and peppers
Green 7.9975 are displayed when the corresponding encrypted images are
Blue 7.9987 7.9978 7.9961 affected by a Gaussian noise of standard deviation s . The
results are presented for s = 0.5, 5, 10, 15, and 20 in columns
7.9984 7.9971 a-e, respectively. The results show that the proposed scheme
resists noise attacks.
7.9986 7.9976
E. Cropping Attack Analysis
in Fig. 10, as shown in Fig. 18. To test the effectiveness of the proposed method against crop-
ping attacks, one can examine the performance of the en-
C. Correlation Coefficient Analysis crypted image after the cropped with various formats, as
A correlation coefficient measures the similarity or dissimi- shown in Fig. 23. Parts a-d of this figure show the encrypted
larity between adjacent image pixels along the vertical, hori- image cropped with size 32×32 from the upper left, with size
zontal, and diagonal directions. The correlation coefficient’s 64×64, with size 128×128 from the upper left, and with size
value falls between -1 and 1, with -1 denoting a negative 128×128 from the middle image right, respectively. The de-
correlation, +1 a positive correlation, and 0 denoting no corre- crypted versions of the corresponding images are displayed in
lation. In order to withstand statistical attacks, the encrypted parts (e)-(l) of the figure and show that the deciphered images
image must have a correlation coefficient between neighbor- are still recognizable and keep the majority of the original
ing pixels nearly equal to zero in all directions. The results are visual information. This indicates that the proposed method
depicted in Figs. 19 and 20, which present the three-channel of encryption is resistant to occlusion attacks.
correlation coefficients for the original images of Lena and
Baboon, respectively. As can be observed, the adjacent pixels
in the three directions (horizontal (HD), vertical (VD), and
diagonal (DD)) have a linear correlation characteristic. This
is in contrast to the correlation characteristics of the encrypted
images Lena-baboon as displayed in Fig. 21. Table II lists
the three-direction correlation coefficient for the used origi-
nal images. The encrypted image’s horizontal, vertical, and
diagonal correlation coefficients are also given in Table III. In-
vestigation of these results reveals that the encrypted images’