Table of Contents Author Guidelines Submit a Manuscript
Advances in Multimedia
Volume 2016, Article ID 6714164, 10 pages
Research Article

Image Encryption Performance Evaluation Based on Poker Test

School of Information Engineering, Chang’an University, Middle Section of Nan’er Huan Road, Xi’an 710064, China

Received 26 March 2016; Revised 24 May 2016; Accepted 5 June 2016

Academic Editor: Deepu Rajan

Copyright © 2016 Shanshan Li and Weiyang Sun. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. L. Tong, F. Dai, Y. Zhang, and J. Li, “Visual security evaluation for video encryption,” in Proceedings of the 18th ACM International Conference on Multimedia (MM '10), pp. 835–838, ACM, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. J. Ahmad and F. Ahmed, “Efficiency analysis and security evaluation of image encryption schemes,” Computing, vol. 23, p. 25, 2010. View at Google Scholar
  3. C. Chattopadhyay, B. Sarkar, and D. Mukherjee, “Encoding by DNA relations and randomization through chaotic sequences for image encryption,”
  4. X.-F. Zhang and J.-L. Fan, “Two new digital image encryption effect evaluation criterions,” Computer Science, vol. 37, no. 2, pp. 264–268, 2010. View at Google Scholar
  5. L. Wang, W. Meilin, D. Kui, and Z. Xuecheng, “Scalable truly random number generator,” in Proceedings of the World Congress on Engineering, vol. 1, London, UK, July 2015.
  6. A. H. M. Ragab, O. S. Farag Allah, A. Y. Noaman, and K. W. Magld, “Encryption quality evaluation of robust chaotic block cipher for digital imaging,” International Journal of Recent Technology and Engineering, vol. 2, no. 6, pp. 4–9, 2014. View at Google Scholar
  7. S. Chapaneri, R. Chapaneri, and T. Sarode, “Evaluation of chaotic map lattice systems for image encryption,” in Proceedings of the International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA '14), pp. 59–64, IEEE, Mumbai, India, April 2014. View at Publisher · View at Google Scholar · View at Scopus
  8. C. Yuganya, “2D cross correlation multi-modal image recognition,” Journal of Global Research in Computer Science, vol. 4, no. 4, pp. 13–17, 2013. View at Google Scholar
  9. E. Bofinger and V. J. Bofinger, “The gap test for random sequences,” The Annals of Mathematical Statistics, vol. 32, pp. 524–534, 1961. View at Publisher · View at Google Scholar · View at MathSciNet
  10. W. M. F. Abdel-Rehim, I. A. Ismail, and E. Morsy, “Testing randomness: the original poker approach acceleration using parallel MATLAB with OpenMP,” Computer Science and Engineering, vol. 5, no. 2, pp. 25–29, 2015. View at Google Scholar
  11. Federal Information Processing Standard (FIPS), “Security requirements for cryptographic modules,” PUB 140-2, 2001. View at Google Scholar
  12. S.-J. Xu, X.-B. Chen, R. Zhang, Y.-X. Yang, and Y.-C. Guo, “An improved chaotic cryptosystem based on circular bit shift and XOR operations,” Physics Letters A, vol. 376, no. 10-11, pp. 1003–1010, 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. R. Kadir and M. A. Maarof, “Randomness analysis of pseudorandom bit sequences,” in Proceedings of the International Conference on Computer Engineering and Applications (IPCSIT '11), vol. 2, Singapore, 2011.
  14. G. Peterson, “Arnold's cat map,” Math 45-Linear algebra, 1997,
  15. Z.-G. Ma and S.-S. Qiu, “An image cryptosystem based on general cat map,” Journal of China Institute of Communications, vol. 24, no. 2, pp. 51–57, 2003. View at Google Scholar
  16. A. Kanso and M. Ghebleh, “A novel image encryption algorithm based on a 3D chaotic map,” Communications in Nonlinear Science and Numerical Simulation, vol. 17, no. 7, pp. 2943–2959, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  17. S. Li, Y. Zhao, B. Qu, and J. Wang, “Image scrambling based on chaotic sequences and Veginère cipher,” Multimedia Tools and Applications, vol. 66, no. 3, pp. 573–588, 2013. View at Publisher · View at Google Scholar · View at Scopus