Skip to main content
Top

2021 | OriginalPaper | Chapter

Generation of Random Binary Sequence Using Adaptive Row–Column Approach and Synthetic Color Image

Authors : C. Manikandan, N. Raju, K. Sai Siva Satwik, M. Chandrasekar, V. Elamaran

Published in: Computer Networks, Big Data and IoT

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The security of a communication model is defined by the strength of the encryption and key generation algorithm. To ensure security, in block cipher techniques, a complex computation process is used for encryption. But, in stream cipher techniques, complex key generation techniques are used. This paper proposes a novel and complex key generation algorithm for stream cipher techniques that generate 15,72,864-bit key from a synthetic color image using a pattern-based bit extraction technique. A segmented form of a generated key can be used as a dynamic key in block cipher techniques. The proposed algorithm randomly uses eight patterns to extract bits from a synthetic color image to generate the key. The generated key’s randomness is tested using the NIST statistical analysis tool and compared with the keys generated from existing techniques. The key length and keyspace are compared with existing methods.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Shiu YS, Chang SY, Wu HC, Huang SCH, Chen HH (2011) Physical layer security in wireless networks: a tutorial. IEEE Wirel Commun 18(2):66–74CrossRef Shiu YS, Chang SY, Wu HC, Huang SCH, Chen HH (2011) Physical layer security in wireless networks: a tutorial. IEEE Wirel Commun 18(2):66–74CrossRef
2.
go back to reference Liu Y, Chen HH, Wang L (2016) Physical layer security for next-generation wireless networks: theories, technologies, and challenges. IEEE Commun Surv Tutor 19(1):347–376CrossRef Liu Y, Chen HH, Wang L (2016) Physical layer security for next-generation wireless networks: theories, technologies, and challenges. IEEE Commun Surv Tutor 19(1):347–376CrossRef
3.
go back to reference Singh G (2013) A study of encryption algorithms (RSA, DES, 3DES, and AES) for information security. Int J Comput Appl 67(19) Singh G (2013) A study of encryption algorithms (RSA, DES, 3DES, and AES) for information security. Int J Comput Appl 67(19)
4.
go back to reference Erickson J (2008) Hacking: the art of exploitation. No starch press Erickson J (2008) Hacking: the art of exploitation. No starch press
5.
go back to reference Santhi B, Ravichandran KS, Arun AP, Chakkarapani L (2012) A novel cryptographic key generation method using image features. Res J Inf Technol 4(2):88–92 Santhi B, Ravichandran KS, Arun AP, Chakkarapani L (2012) A novel cryptographic key generation method using image features. Res J Inf Technol 4(2):88–92
6.
go back to reference Manikandan C, Neelamegam P, Kumar R, Babu V, Satwikkommi S (2019) Design of Secure and Reliable MU-MIMO Transceiver System for Vehicular Networks. Int J Comput Netw Commun 11:15–32 Manikandan C, Neelamegam P, Kumar R, Babu V, Satwikkommi S (2019) Design of Secure and Reliable MU-MIMO Transceiver System for Vehicular Networks. Int J Comput Netw Commun 11:15–32
7.
go back to reference Barhoom TS, Abusilmiyeh ZM (2013) A novel cryptography method based on image for key generation. In: Palestinian international conference on information and communication technology. IEEE, Gaza, Palestinian, pp 71–76 Barhoom TS, Abusilmiyeh ZM (2013) A novel cryptography method based on image for key generation. In: Palestinian international conference on information and communication technology. IEEE, Gaza, Palestinian, pp 71–76
8.
go back to reference Riddhi N, Gamit N (2015) An efficient algorithm for dynamic key generation for image encryption. In: International conference on computer, communication, and control. IEEE, Indore, India, pp 1–5 Riddhi N, Gamit N (2015) An efficient algorithm for dynamic key generation for image encryption. In: International conference on computer, communication, and control. IEEE, Indore, India, pp 1–5
9.
go back to reference Manikandan C, Kumar SR, Nikhith K, Gayathri MS, Neelamegam P (2019) Chaotic map based key generation and realistic power allocation technique for secure MU-MIMO wireless system. In: International conference on applications and techniques in information security, Springer, Singapore, pp 142–155 Manikandan C, Kumar SR, Nikhith K, Gayathri MS, Neelamegam P (2019) Chaotic map based key generation and realistic power allocation technique for secure MU-MIMO wireless system. In: International conference on applications and techniques in information security, Springer, Singapore, pp 142–155
10.
go back to reference Manikandan G, Ramakrishnan S, Rajaram R, Venkatesh V (2013) An image-based key generation for symmetric key cryptography. Int J Eng Technol 5(3):2807–2810 Manikandan G, Ramakrishnan S, Rajaram R, Venkatesh V (2013) An image-based key generation for symmetric key cryptography. Int J Eng Technol 5(3):2807–2810
11.
go back to reference Chinnusamy M, Sidharthan RK, Sivanandam V, Kommi SSS, Mallari Rao C, Periasamy N (2019) Optimal tracking of QR inspired LEA using particle filter for secured visual MIMO communication based vehicular network. Photonics 6(93):1–24 Chinnusamy M, Sidharthan RK, Sivanandam V, Kommi SSS, Mallari Rao C, Periasamy N (2019) Optimal tracking of QR inspired LEA using particle filter for secured visual MIMO communication based vehicular network. Photonics 6(93):1–24
12.
go back to reference Jawad LM, Sulong G (2015) A novel dynamic secret key generation for an efficient image encryption algorithm. Mod Appl Sci 9(13):85–97CrossRef Jawad LM, Sulong G (2015) A novel dynamic secret key generation for an efficient image encryption algorithm. Mod Appl Sci 9(13):85–97CrossRef
13.
go back to reference Yao J, Kang H (2011) FPGA implementation of dynamic key management for des encryption algorithm. In: International conference on electronic & mechanical engineering and information technology. IEEE, Harbin, China, pp 4795–4798 Yao J, Kang H (2011) FPGA implementation of dynamic key management for des encryption algorithm. In: International conference on electronic & mechanical engineering and information technology. IEEE, Harbin, China, pp 4795–4798
14.
go back to reference Singh AK, Varshney S (2014) Enhanced data encryption standard using variable size key (128 N Bits) and 96 bit subkey. Int J Comput Appl 98(8):11–14 Singh AK, Varshney S (2014) Enhanced data encryption standard using variable size key (128 N Bits) and 96 bit subkey. Int J Comput Appl 98(8):11–14
15.
go back to reference Chen L, Jordan S, Liu YK, Moody D, Peralta R, Perlner R, Smith-Tone D (2016) NIST: report on post-quantum cryptography. NIST, Tech. Rep. Chen L, Jordan S, Liu YK, Moody D, Peralta R, Perlner R, Smith-Tone D (2016) NIST: report on post-quantum cryptography. NIST, Tech. Rep.
16.
go back to reference Satwik KSS, Manikandan C, Elamaran V, Narasimhan K, Raju N (2017) An adaptive row-column least significant bit inlay approach for image steganography. Biomed Res 28(22):10216–10222 Satwik KSS, Manikandan C, Elamaran V, Narasimhan K, Raju N (2017) An adaptive row-column least significant bit inlay approach for image steganography. Biomed Res 28(22):10216–10222
17.
go back to reference Manikandan C, Rakesh Kumar S, Sai Siva Satwik K, Neelamegam P, Narasimhan K, Raju N (2018) An integrated object tracking and covert visual MIMO communication service for museum security system using single vision sensor. Appl Sci 8(10):1–25CrossRef Manikandan C, Rakesh Kumar S, Sai Siva Satwik K, Neelamegam P, Narasimhan K, Raju N (2018) An integrated object tracking and covert visual MIMO communication service for museum security system using single vision sensor. Appl Sci 8(10):1–25CrossRef
Metadata
Title
Generation of Random Binary Sequence Using Adaptive Row–Column Approach and Synthetic Color Image
Authors
C. Manikandan
N. Raju
K. Sai Siva Satwik
M. Chandrasekar
V. Elamaran
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-16-0965-7_10