ScienceDirect
Download 0.73 Mb. Pdf ko'rish
|
An Efficient Homomorphic Medical Image Encryption
4. Simulation and Analysis
The efficiency of an image encryption process can be observed only by performing certain test analysis.In this paper the following analysis are performed. 4.1 Key Space Analysis In this work, the secret key is 150-bits long, the key space is about 2 150 .The encrypted image with a key size of 2 150 is not easily affected by the brute force attack. Therfore this key size is sufficient.In hardware implementation the number of bits for the keys can be increased. However, by performing this the speed of the system may be decreased and volume of the hardware is increased[11]. 4.2 Histogram Analysis The way in which the pixels are distributed in an image can be found by performing histogram analysis. The statistical properties of the encrypted image is given by this security analysis.A perfect encrypted image must have uniformly distributed histogram.Therefore by performing this analysis we can obtain a graph with streaks distributed randomly. By looking at this graph we can come into a conclusion that the applied algorithm encrypts the image completely or is there any part of the image which is not properly encrypted. In this paper we have taken several DICOM images and their encrypted images. In Figure 2 shows the histogram of the original image.We concluded that the distribution of pixels are not uniform. It also shows the histogram of encrypted image where the pixel distribution is uniform. It is fairly uniform which makes it difficult to extract the pixels statistical nature of the plain imag. By performing this histogram analysis it has been proven that a good cipher image generates a uniform histogram [23]. Fig 2. Histogram of medical images original and decrypted 648 A.M. Vengadapurvaja et al. / Procedia Computer Science 115 (2017) 643–650 6 A.M.Vengadapurvaja,G.Nisha,R.Aarthy,N.Sasikaladevi/ Procedia Computer Science 00 (2017) 000–000 Download 0.73 Mb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling