Skip to main content
Top

2016 | OriginalPaper | Chapter

A Secure Image Encryption Algorithm Using LFSR and RC4 Key Stream Generator

Authors : Bhaskar Mondal, Nishith Sinha, Tarni Mandal

Published in: Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics

Publisher: Springer India

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The increasing importance of security of multimedia data has prompted greater attention towards secure image encryption algorithms. In this paper, the authors propose a highly secure encryption algorithm with permutation-substitution architecture. In the permutation step, image pixels of the plain image are shuffled using Linear Feedback Shift Register (LFSR). The output of this step is an intermediary cipher image which is of the same size as that of the plain image. In the substitution step, sequence of random numbers is generated using the RC4 key stream generator which is XORed with the pixel value of the intermediary cipher image to produce the final cipher image. Experimental results and security analysis of the proposed scheme show that the proposed scheme is efficient and secure.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ayinala, M., Parhi, K.K.: High-speed parallel architectures for linear feedback shift registers. IEEE Trans. Sig. Process. 59(9), 4459–4469 (2011)MathSciNetCrossRef Ayinala, M., Parhi, K.K.: High-speed parallel architectures for linear feedback shift registers. IEEE Trans. Sig. Process. 59(9), 4459–4469 (2011)MathSciNetCrossRef
2.
go back to reference Fu, C., Chen, J.J., Zou, H., Meng, W.H., Zhan, Y.F., Yu, Y.W.: A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt. Express 20(3), 2363–2378 (2012) Fu, C., Chen, J.J., Zou, H., Meng, W.H., Zhan, Y.F., Yu, Y.W.: A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt. Express 20(3), 2363–2378 (2012)
3.
go back to reference Kwok, S.H.M., Lam, E.Y.: Effective uses of fpgas for brute-force attack on rc4 ciphers. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 16(8), 1096–1100 (2008) Kwok, S.H.M., Lam, E.Y.: Effective uses of fpgas for brute-force attack on rc4 ciphers. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 16(8), 1096–1100 (2008)
4.
go back to reference Lamba, C.S.: Design and analysis of stream cipher for network security. In: Communication Software and Networks, 2010. ICCSN’10. Second International Conference on, pp. 562–567 (2010) Lamba, C.S.: Design and analysis of stream cipher for network security. In: Communication Software and Networks, 2010. ICCSN’10. Second International Conference on, pp. 562–567 (2010)
5.
go back to reference Lima, J.B., Lima, E.A.O., Madeiro, F.: Image encryption based on the finite field cosine transform. Sig. Process. Image Commun. 28(10), 1537–1547 (2013)CrossRef Lima, J.B., Lima, E.A.O., Madeiro, F.: Image encryption based on the finite field cosine transform. Sig. Process. Image Commun. 28(10), 1537–1547 (2013)CrossRef
6.
go back to reference Mirzaei, O., Yaghoobi, M., Irani, H.: A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn. 67(1), 557–566 (2012)MathSciNetCrossRef Mirzaei, O., Yaghoobi, M., Irani, H.: A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn. 67(1), 557–566 (2012)MathSciNetCrossRef
7.
go back to reference Mondal, B., Priyadarshi, A., Hariharan, D.: An improved cryptography scheme for secure image communication. Int. J. Comput. Appl. 67(18), 23–27 (2013). Published by Foundation of Computer Science, New York, USA Mondal, B., Priyadarshi, A., Hariharan, D.: An improved cryptography scheme for secure image communication. Int. J. Comput. Appl. 67(18), 23–27 (2013). Published by Foundation of Computer Science, New York, USA
8.
go back to reference Mondal, B., Singh, S.K.: A highly secure steganography scheme for secure communication. Int. Conf. Comput. Commun. Adv. (IC3A), (2013) Mondal, B., Singh, S.K.: A highly secure steganography scheme for secure communication. Int. Conf. Comput. Commun. Adv. (IC3A), (2013)
9.
go back to reference Tawalbeh, L., Mowafi, M., Aljoby, W.: Use of elliptic curve cryptography for multimedia encryption. IET Inf. Secur. 7(2), 67–74 (2013)CrossRef Tawalbeh, L., Mowafi, M., Aljoby, W.: Use of elliptic curve cryptography for multimedia encryption. IET Inf. Secur. 7(2), 67–74 (2013)CrossRef
10.
go back to reference Wang, L.-T., McCluskey, E.J.: Linear feedback shift register design using cyclic codes. IEEE Trans. Comput. 37(10), 1302–1306 (1988) Wang, L.-T., McCluskey, E.J.: Linear feedback shift register design using cyclic codes. IEEE Trans. Comput. 37(10), 1302–1306 (1988)
11.
go back to reference Wang, X.-Y., Wang, T.: A novel algorithm for image encryption based on couple chaotic systems. Int. J. Mod. Phys. B 26(30), 1250175 (2012)CrossRef Wang, X.-Y., Wang, T.: A novel algorithm for image encryption based on couple chaotic systems. Int. J. Mod. Phys. B 26(30), 1250175 (2012)CrossRef
12.
go back to reference Wang, Y., Wong, K.-W., Liao, X., Chen, G.: A new chaos-based fast image encryption algorithm. Appl. Soft Comput. 11(1), 514–522 (2011)CrossRef Wang, Y., Wong, K.-W., Liao, X., Chen, G.: A new chaos-based fast image encryption algorithm. Appl. Soft Comput. 11(1), 514–522 (2011)CrossRef
13.
go back to reference Weerasinghe, T.D.B.: An effective RC4 stream cipher. In: Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on, pp. 69–74, Dec 2013 Weerasinghe, T.D.B.: An effective RC4 stream cipher. In: Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on, pp. 69–74, Dec 2013
14.
go back to reference Wong, K.-W., Kwok, B.S.-H., Law, W.-S.: A fast image encryption scheme based on chaotic standard map. Phys. Lett. A 372(15), 2645–2652 (2008)MATHCrossRef Wong, K.-W., Kwok, B.S.-H., Law, W.-S.: A fast image encryption scheme based on chaotic standard map. Phys. Lett. A 372(15), 2645–2652 (2008)MATHCrossRef
15.
go back to reference Ye, G.: Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn. Lett. 31(5), 347–354 (2010)CrossRef Ye, G.: Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn. Lett. 31(5), 347–354 (2010)CrossRef
16.
go back to reference Zadeh, A.A., Heys, H.M.: Simple power analysis applied to nonlinear feedback shift registers. IET Inf. Secur. 8(3), 188–198 (2014)CrossRef Zadeh, A.A., Heys, H.M.: Simple power analysis applied to nonlinear feedback shift registers. IET Inf. Secur. 8(3), 188–198 (2014)CrossRef
17.
go back to reference Zhu, C.: A novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun. 285(1), 29–37 (2012)CrossRef Zhu, C.: A novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun. 285(1), 29–37 (2012)CrossRef
Metadata
Title
A Secure Image Encryption Algorithm Using LFSR and RC4 Key Stream Generator
Authors
Bhaskar Mondal
Nishith Sinha
Tarni Mandal
Copyright Year
2016
Publisher
Springer India
DOI
https://doi.org/10.1007/978-81-322-2538-6_24

Premium Partner