Int. J. Communications, Network and System Sciences, 2014, 7, 43-52 Published Online January 2014 (http://www.scirp.org/journal/ijcns ) http://dx.doi.org/10.4236/ijcns.2014.71006 OPEN ACCESS IJCNS Image Encryption Scheme Based on Filter Bank and Lifting Saleh Saraireh 1 , Yazeed Al-Sbou 2 , Ja’afer Al-Saraireh 3 , Othman Alsmadi 4 1 Department of Communications and Electronic Engineering, Philadelphia University, Amman, Jordan 2 Department of Computer Engineering, Mu’tah University, Karak, Jordan 3 Department of Computer Science, Applied Science University, Amman, Jordan 4 Department of Electrical Engineering, The University of Jordan, Amman, Jordan Email: Saleh_53@yahoo.com Received November 27, 2013; revised December 27, 2013; accepted January 4, 2014 Copyright © 2014 Saleh Saraireh et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. In accor- dance of the Creative Commons Attribution License all Copyrights © 2014 are reserved for SCIRP and the owner of the intellectual property Saleh Saraireh et al. All Copyright © 2014 are guarded by law and by SCIRP as a guardian. ABSTRACT In this paper, the quality of image encryption using filter bank with lifting scheme has been studied and eva- luated. Many extensive techniques have been applied to examine the security of the image encryption using the filter bank cipher with one or two rounds. To analyze and evaluate the proposed scheme, many parameters have been employed, such as, histogram analysis, correlation coefficient, global entropy, block entropy, avalanche effect, number of pixel change rate (NPCR), unified average change intensity (UACI), compression friendliness, exhaustive key analysis, and key sensitivity test. The simulation results showed that, the quality of the image en- cryption passes all these tests. Moreover, it reaches or excels the current state-of-the-arts. So that, the proposed image encryption process produces random-like output from the statistical point of views. KEYWORDS Randomness Test; Image Encryption; Encryption Quality; Filter Bank; Entropy 1. Introduction Due to the rapid advances in computer and communica- tion networks and the recent progress in multimedia technologies (i.e. audio, video, image, etc.), multimedia information can easily be exchanged over different types of networks like the Internet. Usually, these networks are not secure. Therefore, users must pay more attention to the security of their networks and information transmis- sion against unauthorized users. Due to this, the multi- media information security has become a vital concern in military applications, audio and videoconferencing, im- aging, E-Commerce, and mobile phone applications [1,2]. Moreover, over these networks, people may be required to send personal and sensitive information or exchange important documents. In such situations; security, integr- ity, authenticity and confidentiality of digital data should be provided. Therefore, these applications must be se- cured from various kinds of attacks like interruption, interception, modification and fabrication [3,4]. As a result, it is essential to protect this information using some encryption and cryptography algorithms. Encryption (enciphering) is a procedure utilized for converting and scrambling of data to insure its security. Consequently, several security approaches have been proposed to insure the required protection [2]. The use of these security techniques allows the information trans- mission across insecure networks to prevent any danger of attack. Cryptology and cryptanalysis are two major kinds of cryptography, where the cryptology is to keep plaintext secret from eavesdropper while cryptanalysis is to conquer such techniques to reconstruct this information [3]. The process of encryption includes that the multimedia data is protected and a key is provide for decryption pro- cess (deciphering). The encrypted data are usually called the ciphertext and unencrypted data are called the plain-text. To decide whether one is allowed to view the encrypted data or not, a key is used. Based on this point, there are two main types of algorithms used for data encryption; symmetric-key algorithms and public key algorithms. In the symmetric