Table 8 Analysis results for encrypted Peppers using the system key \({K}_{1}\).
From: A generalized framework for elliptic curves based PRNG and its utilization in image encryption
| Â | Pixel correlations | MSE | Entropy | Differential attack measures | ||||
|---|---|---|---|---|---|---|---|---|
Horz | Vert | Diag | MAE | NPCR (%) | UACI (%) | |||
R | − 0.0052 | − 0.0001 | − 0.0013 | 7703.80 | 7.9971 | 72.8052 | 99.6043 | 33.4037 |
G | − 0.0045 | 0.0008 | − 0.0015 | 11,068.50 | 7.9973 | 85.9236 | 99.6022 | 33.4538 |
B | − 0.0028 | − 0.0019 | 0.0001 | 11,467.20 | 7.9967 | 87.5722 | 99.6123 | 33.3678 |
Avg | 0.0042 | 0.0009 | 0.0010 | 10,079.84 | 7.9970 | 82.1003 | 99.6063 | 33.4085 |