Gulshan Saleem

Work place: Department of Computer Engineering, EME College, National University of Science and Technology, Pakistan

E-mail: gulshan.saleem14@ceme.nust.edu.pk

Website:

Research Interests: Image Compression, Image Manipulation, Information Security, Image Processing, Information Systems, Information Retrieval

Biography

Gulshan Saleem has done her MS Software Engineering from College of Electrical and Mechanical Engineering, National University of Science and Technology, Rawalpindi and her BS Software Engineeing from Fatima Jinnah Women University, Rawalpindi. Her areas of interest includes Machine Learning, Information Retrieval and Digital Image Processing.

Author Articles
A Benchmark for Performance Evaluation and Security Assessment of Image Encryption Schemes

By Nisar Ahmed Hafiz Muhammad Shahzad Asif Gulshan Saleem

DOI: https://doi.org/10.5815/ijcnis.2016.12.03, Pub. Date: 8 Dec. 2016

Digital images have become part of everyday life by demonstrating its usability in a variety of fields from education to space research. Confidentiality and security of digital images have grown significantly with increasing trend of information interchange over the public channel. Cryptography can be used as a successful technique to prevent image data from unauthorized access. Keeping the nature of image data in mind, several encryption techniques are presented specifically for digital images, in literature during past few years. These cryptographic algorithms lack a benchmark for evaluation of their performance, cryptographic security and quality analysis of recovered images. In this study, we have designed and developed a benchmark based on all the parameters necessary for a good image encryption scheme. Extensive studies have been made to categories all the parameters used by different researchers to evaluate their algorithms and an optimum benchmark for evaluation is formulated. This benchmark is used to evaluate three image encryption schemes. The results of evaluation have highlighted the specific application areas for these image encryption schemes.

[...] Read more.
Other Articles