Skip to main content

2016 | OriginalPaper | Buchkapitel

A Secure Image Encryption Algorithm Using LFSR and RC4 Key Stream Generator

verfasst von : Bhaskar Mondal, Nishith Sinha, Tarni Mandal

Erschienen in: Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The increasing importance of security of multimedia data has prompted greater attention towards secure image encryption algorithms. In this paper, the authors propose a highly secure encryption algorithm with permutation-substitution architecture. In the permutation step, image pixels of the plain image are shuffled using Linear Feedback Shift Register (LFSR). The output of this step is an intermediary cipher image which is of the same size as that of the plain image. In the substitution step, sequence of random numbers is generated using the RC4 key stream generator which is XORed with the pixel value of the intermediary cipher image to produce the final cipher image. Experimental results and security analysis of the proposed scheme show that the proposed scheme is efficient and secure.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ayinala, M., Parhi, K.K.: High-speed parallel architectures for linear feedback shift registers. IEEE Trans. Sig. Process. 59(9), 4459–4469 (2011)MathSciNetCrossRef Ayinala, M., Parhi, K.K.: High-speed parallel architectures for linear feedback shift registers. IEEE Trans. Sig. Process. 59(9), 4459–4469 (2011)MathSciNetCrossRef
2.
Zurück zum Zitat Fu, C., Chen, J.J., Zou, H., Meng, W.H., Zhan, Y.F., Yu, Y.W.: A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt. Express 20(3), 2363–2378 (2012) Fu, C., Chen, J.J., Zou, H., Meng, W.H., Zhan, Y.F., Yu, Y.W.: A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt. Express 20(3), 2363–2378 (2012)
3.
Zurück zum Zitat Kwok, S.H.M., Lam, E.Y.: Effective uses of fpgas for brute-force attack on rc4 ciphers. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 16(8), 1096–1100 (2008) Kwok, S.H.M., Lam, E.Y.: Effective uses of fpgas for brute-force attack on rc4 ciphers. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 16(8), 1096–1100 (2008)
4.
Zurück zum Zitat Lamba, C.S.: Design and analysis of stream cipher for network security. In: Communication Software and Networks, 2010. ICCSN’10. Second International Conference on, pp. 562–567 (2010) Lamba, C.S.: Design and analysis of stream cipher for network security. In: Communication Software and Networks, 2010. ICCSN’10. Second International Conference on, pp. 562–567 (2010)
5.
Zurück zum Zitat Lima, J.B., Lima, E.A.O., Madeiro, F.: Image encryption based on the finite field cosine transform. Sig. Process. Image Commun. 28(10), 1537–1547 (2013)CrossRef Lima, J.B., Lima, E.A.O., Madeiro, F.: Image encryption based on the finite field cosine transform. Sig. Process. Image Commun. 28(10), 1537–1547 (2013)CrossRef
6.
Zurück zum Zitat Mirzaei, O., Yaghoobi, M., Irani, H.: A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn. 67(1), 557–566 (2012)MathSciNetCrossRef Mirzaei, O., Yaghoobi, M., Irani, H.: A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn. 67(1), 557–566 (2012)MathSciNetCrossRef
7.
Zurück zum Zitat Mondal, B., Priyadarshi, A., Hariharan, D.: An improved cryptography scheme for secure image communication. Int. J. Comput. Appl. 67(18), 23–27 (2013). Published by Foundation of Computer Science, New York, USA Mondal, B., Priyadarshi, A., Hariharan, D.: An improved cryptography scheme for secure image communication. Int. J. Comput. Appl. 67(18), 23–27 (2013). Published by Foundation of Computer Science, New York, USA
8.
Zurück zum Zitat Mondal, B., Singh, S.K.: A highly secure steganography scheme for secure communication. Int. Conf. Comput. Commun. Adv. (IC3A), (2013) Mondal, B., Singh, S.K.: A highly secure steganography scheme for secure communication. Int. Conf. Comput. Commun. Adv. (IC3A), (2013)
9.
Zurück zum Zitat Tawalbeh, L., Mowafi, M., Aljoby, W.: Use of elliptic curve cryptography for multimedia encryption. IET Inf. Secur. 7(2), 67–74 (2013)CrossRef Tawalbeh, L., Mowafi, M., Aljoby, W.: Use of elliptic curve cryptography for multimedia encryption. IET Inf. Secur. 7(2), 67–74 (2013)CrossRef
10.
Zurück zum Zitat Wang, L.-T., McCluskey, E.J.: Linear feedback shift register design using cyclic codes. IEEE Trans. Comput. 37(10), 1302–1306 (1988) Wang, L.-T., McCluskey, E.J.: Linear feedback shift register design using cyclic codes. IEEE Trans. Comput. 37(10), 1302–1306 (1988)
11.
Zurück zum Zitat Wang, X.-Y., Wang, T.: A novel algorithm for image encryption based on couple chaotic systems. Int. J. Mod. Phys. B 26(30), 1250175 (2012)CrossRef Wang, X.-Y., Wang, T.: A novel algorithm for image encryption based on couple chaotic systems. Int. J. Mod. Phys. B 26(30), 1250175 (2012)CrossRef
12.
Zurück zum Zitat Wang, Y., Wong, K.-W., Liao, X., Chen, G.: A new chaos-based fast image encryption algorithm. Appl. Soft Comput. 11(1), 514–522 (2011)CrossRef Wang, Y., Wong, K.-W., Liao, X., Chen, G.: A new chaos-based fast image encryption algorithm. Appl. Soft Comput. 11(1), 514–522 (2011)CrossRef
13.
Zurück zum Zitat Weerasinghe, T.D.B.: An effective RC4 stream cipher. In: Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on, pp. 69–74, Dec 2013 Weerasinghe, T.D.B.: An effective RC4 stream cipher. In: Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on, pp. 69–74, Dec 2013
14.
Zurück zum Zitat Wong, K.-W., Kwok, B.S.-H., Law, W.-S.: A fast image encryption scheme based on chaotic standard map. Phys. Lett. A 372(15), 2645–2652 (2008)MATHCrossRef Wong, K.-W., Kwok, B.S.-H., Law, W.-S.: A fast image encryption scheme based on chaotic standard map. Phys. Lett. A 372(15), 2645–2652 (2008)MATHCrossRef
15.
Zurück zum Zitat Ye, G.: Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn. Lett. 31(5), 347–354 (2010)CrossRef Ye, G.: Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn. Lett. 31(5), 347–354 (2010)CrossRef
16.
Zurück zum Zitat Zadeh, A.A., Heys, H.M.: Simple power analysis applied to nonlinear feedback shift registers. IET Inf. Secur. 8(3), 188–198 (2014)CrossRef Zadeh, A.A., Heys, H.M.: Simple power analysis applied to nonlinear feedback shift registers. IET Inf. Secur. 8(3), 188–198 (2014)CrossRef
17.
Zurück zum Zitat Zhu, C.: A novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun. 285(1), 29–37 (2012)CrossRef Zhu, C.: A novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun. 285(1), 29–37 (2012)CrossRef
Metadaten
Titel
A Secure Image Encryption Algorithm Using LFSR and RC4 Key Stream Generator
verfasst von
Bhaskar Mondal
Nishith Sinha
Tarni Mandal
Copyright-Jahr
2016
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-2538-6_24

Premium Partner