Research Article
BibTex RIS Cite

Comparative study on most used modern symmetric encryption algorithms for breast cancer ultrasound images

Year 2025, Volume: 9 Issue: 3, 211 - 220, 25.12.2025
https://doi.org/10.35860/iarej.1681592

Abstract

In this study, several prominent symmetric encryption algorithms, including AES, Blowfish, DES, 3DES, and RC4, were applied to encrypt breast ultrasound images. These algorithms were further compared with RSA, a representative asymmetric encryption method. Three different breast ultrasound images, categorized as benign tumor, malignant tumor, and normal tissue, were used in the encryption process. Each image was provided in two file formats (PNG and BMP) and at two resolutions (256 × 256 and 512 × 512 pixels). The performance of the algorithms was evaluated using metrics such as the Number of Pixel Change Rate (NPCR), Unified Average Changing Intensity (UACI), histogram analysis, and encryption and decryption times. The experimental results demonstrated that symmetric encryption algorithms were more efficient than their asymmetric counterpart. Additionally, a comparative analysis of the symmetric algorithms was conducted, along with a discussion of their relative performance.

References

  • 1. Cluley, G., 750,000 patients' medical records exposed after data breach at French hospital. Tripwire State of Security, 2024. [cited 2024 Dec 7]; Available from: https://www.tripwire.com/state-of-security/750000-patients-medical-records-exposed-after-data-breach-french-hospital.
  • 2. Korkut, A.S., ABD merkezli hastanenin 790 bin müşterisinin verileri çalındı: Türkiye'den müşteriler de var. Free Web Turkey, 2024. [cited 2024 Dec 7]; Available from: https://www.freewebturkey.com/abd-merkezli-hastanenin-790-bin-musterisinin-verileri-calindi-turkiye-den-musteriler-de-var.
  • 3. Casey, I., NHS confirms patient data stolen in cyber attack. BBC News, 2024. [cited 2024 Dec 7]; Available from: https://bbc.com/news/articles/c9777v4m8zdo.
  • 4. Pandya, D., K.R. Narayan, S. Thakkar, T. Madhekar, and B.S. Thakare, Brief history of encryption. International Journal of Computer Applications, 2015. 131(9): p. 28-31.
  • 5. Yerlikaya, T., E. Buluş, and N. Buluş, Asimetrik şifreleme algoritmalarında anahtar değişim sistemleri. Akademik Bilişim. 2006. p. 9-11.
  • 6. Morkel, T., and J.H.P. Eloff, Encryption techniques: a timeline approach. Information and Computer Security Architecture (ICSA) Research Group, University of Pretoria, 2004. 2.
  • 7. Panda, M., Performance analysis of encryption algorithms for security. in International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES). 2016. IEEE: p. 278-284.
  • 8. Wahid, M.N.A., A. Ali, B. Esparham, and M. Marwan, A comparison of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish for guessing attacks prevention. Journal of Computer Science Applications and Information Technology, 2018. 3(2): p. 1-7.
  • 9. Olutola, A. and M. Olumuyiwa, Comparative analysis of encryption algorithms. European Journal of Technology, 2023. 7(1): p. 1-9.
  • 10. Hamouda, B.E.H.H., Comparative study of different cryptographic algorithms. Journal of Information Security, 2020. 11(3): p. 138-148.
  • 11. Marqas, R.B., S.M. Almufti, and R.R. Ihsan, Comparing symmetric and asymmetric cryptography in message encryption and decryption by using AES and RSA algorithms. Journal of Xi’an University of Architecture & Technology, 2020. 12(3): p. 3110-3116.
  • 12. Ghosh, A., Comparison of encryption algorithms: AES, Blowfish and Twofish for security of wireless networks. International Research Journal of Engineering Technology, 2020. 7: p. 4656-4658.
  • 13. Kaya, A. and İ. Türkoğlu, Simetrik ve asimetrik şifreleme algoritmalarının performans karşılaştırılması. Fırat Üniversitesi Mühendislik Bilimleri Dergisi, 2023. 35(2): p. 891-900.
  • 14. Yüksel, T. and B. Özgün, RSA ve RC4 algoritmalarının performans karşılaştırması. AURUM Journal of Engineering Systems and Architecture, 2021. 5(1): p. 29-40.
  • 15. Al-Dhabyani, W., M. Gomaa, H. Khaled, and A. Fahmy, Dataset of breast ultrasound images. Data in Brief, 2020. 28: 104863.
  • 16. Berent, A., Advanced encryption standard by example. ABI Software Development, 2013.
  • 17. Kuzu, E., Hesaplama ağırlıklı algoritmaların programlanmasında grafik işlemci (GPU) kullanımının incelenmesi. MSc Thesis in Information Technologies, Bahçeşehir University, Turkey, 2014.
  • 18. Abdullah, A.M., Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptography and Network Security, 2017. 16(1): p. 11.
  • 19. Parashar, A., and R. Arora, Secure user data in cloud computing using encryption algorithms. International Journal of Engineering Research and Applications, 2013. 3(4): p. 1922-1926.
  • 20. Princy, P., A comparison of symmetric key algorithms DES, AES, Blowfish, RC4, RC6: a survey. International Journal of Computer Science & Engineering Technology (IJCSET), 2015. 6(05).
  • 21. Awati, R., What is Blowfish and how is it used in cryptography? TechTarget SearchSecurity, 2022. [cited 2024 Dec 7]; Available from: https://www.techtarget.com/searchsecurity/definition/Blowfish.
  • 22. Kumari, S., R. Princy, and S. Kumari, Security in cloud computing using AES & DES. International Journal of Recent Innovations in Trends Computing and Communication, 2017. 5(4): p. 194-200.
  • 23. Adhie, R.P., Y. Hutama, A.S. Ahmar, and M.I. Setiawan, Implementation cryptography data encryption standard (DES) and triple data encryption standard (3DES) method in communication system based near field communication (NFC). in Journal of Physics: Conference Series. 2018. 954(1). IOP Publishing. p. 012009.
  • 24. Kutlay, 3DES (Triple DES) şifreleme uygulaması. Kodlama Merkezi, 2014. [cited 2024 Dec 7]; Available from: https://www.kodlamamerkezi.com/c-net/3des-triple-des-sifreleme-uygulamasi/.
  • 25. Guo, T., Y.Z. Feng, and Y.H. Fu, A new form of initialization vectors in the FMS attack of RC4 in WEP. Procedia Computer Science, 2021. 183: p. 456-461.
  • 26. Atalay, N.S., Ş. Doğan, T. Tuncer, and E. Akbal, İmge şifreleme yöntem ve algoritmaları. Dicle Üniversitesi Mühendislik Fakültesi Mühendislik Dergisi, 2019. 10(3): p. 815-831.
  • 27. Preetha, M. and M. Nithya, A study and performance analysis of RSA algorithm. International Journal of Computer Science and Mobile Computing, 2013. 2(6): p. 126-139.
  • 28. Seval, G. and M.C. Kasapbaşı, Görüntüler için kaotik şifreleme sistemi ve performans analizi. Avrupa Bilim ve Teknoloji Dergisi, 2022. (44): p. 13-20.
  • 29. Tuli, R., H.N. Soneji, and P. Churi, PixAdapt: a novel approach to adaptive image encryption. Chaos, Solitons & Fractals, 2022. 164: 112628.
  • 30. Naveenkumar, S.K. and H.T. Panduranga, Triple image encryption based on integer transform and chaotic map. in International Conference on Optical Imaging Sensor and Security (ICOSS). 2013. IEEE. p. 1-6.
  • 31. Doğan, N. and H. Çelik, Tarama modeli kullanan karma bir görüntü şifreleme yöntemi. Politeknik Dergisi, 2021. 25(4): p. 1475-1485.
There are 31 citations in total.

Details

Primary Language English
Subjects Computer Software
Journal Section Research Article
Authors

Kürşad Buğrahan Yapar 0009-0006-7666-6177

Nurettin Doğan 0000-0002-8267-8469

Submission Date May 20, 2025
Acceptance Date September 13, 2025
Publication Date December 25, 2025
Published in Issue Year 2025 Volume: 9 Issue: 3

Cite

APA Yapar, K. B., & Doğan, N. (2025). Comparative study on most used modern symmetric encryption algorithms for breast cancer ultrasound images. International Advanced Researches and Engineering Journal, 9(3), 211-220. https://doi.org/10.35860/iarej.1681592
AMA 1.Yapar KB, Doğan N. Comparative study on most used modern symmetric encryption algorithms for breast cancer ultrasound images. Int. Adv. Res. Eng. J. 2025;9(3):211-220. doi:10.35860/iarej.1681592
Chicago Yapar, Kürşad Buğrahan, and Nurettin Doğan. 2025. “Comparative Study on Most Used Modern Symmetric Encryption Algorithms for Breast Cancer Ultrasound Images”. International Advanced Researches and Engineering Journal 9 (3): 211-20. https://doi.org/10.35860/iarej.1681592.
EndNote Yapar KB, Doğan N (December 1, 2025) Comparative study on most used modern symmetric encryption algorithms for breast cancer ultrasound images. International Advanced Researches and Engineering Journal 9 3 211–220.
IEEE [1]K. B. Yapar and N. Doğan, “Comparative study on most used modern symmetric encryption algorithms for breast cancer ultrasound images”, Int. Adv. Res. Eng. J., vol. 9, no. 3, pp. 211–220, Dec. 2025, doi: 10.35860/iarej.1681592.
ISNAD Yapar, Kürşad Buğrahan - Doğan, Nurettin. “Comparative Study on Most Used Modern Symmetric Encryption Algorithms for Breast Cancer Ultrasound Images”. International Advanced Researches and Engineering Journal 9/3 (December 1, 2025): 211-220. https://doi.org/10.35860/iarej.1681592.
JAMA 1.Yapar KB, Doğan N. Comparative study on most used modern symmetric encryption algorithms for breast cancer ultrasound images. Int. Adv. Res. Eng. J. 2025;9:211–220.
MLA Yapar, Kürşad Buğrahan, and Nurettin Doğan. “Comparative Study on Most Used Modern Symmetric Encryption Algorithms for Breast Cancer Ultrasound Images”. International Advanced Researches and Engineering Journal, vol. 9, no. 3, Dec. 2025, pp. 211-20, doi:10.35860/iarej.1681592.
Vancouver 1.Yapar KB, Doğan N. Comparative study on most used modern symmetric encryption algorithms for breast cancer ultrasound images. Int. Adv. Res. Eng. J. [Internet]. 2025 Dec. 1;9(3):211-20. Available from: https://izlik.org/JA25UL97UM



Creative Commons License

Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.