Skip to main content
Top

2018 | OriginalPaper | Chapter

Grayscale Image Encryption Based on Symmetric-Key Latin Square Image Cipher (LSIC)

Authors : V. Pawan Kumar, A. R. Aswatha, Smitha Sasi

Published in: Computational Vision and Bio Inspired Computing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The increased computing power and improving technologies demand the necessity for stronger encryption algorithms. Here we are introducing a new encryption method, Latin Square Image Cipher (LSIC) for grayscale image. This includes Latin square whitening, S-box, P-box and also LSB noise embedding for probabilistic encryption. As a result, using all the above primitives, LSIC is constructed as a Substitution-Permutation Network (SPN) consisting of eight stages of whitening, substitution and permutation using different Latin squares of order 256 at each stage. The proposed method has a good resistance against brute-force attacks, ciphertext attacks and plaintext attacks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Yang, M., Bourbakis, N., Li, S.: Data-image-video encryption. Potentials, IEEE 23(3), 28–34 (2004)CrossRef Yang, M., Bourbakis, N., Li, S.: Data-image-video encryption. Potentials, IEEE 23(3), 28–34 (2004)CrossRef
2.
go back to reference Anderson, R., Schneier, B.: Description of a new variable-length key, 64-bit block cipher (Blowfish). ser. Lecture Notes in Computer Science, vol. 809, pp. 191–204. Springer Berlin, Heidelberg (1994) Anderson, R., Schneier, B.: Description of a new variable-length key, 64-bit block cipher (Blowfish). ser. Lecture Notes in Computer Science, vol. 809, pp. 191–204. Springer Berlin, Heidelberg (1994)
3.
go back to reference Schneier, B.: The two fish encryption algorithm: a 128-bit block cipher. John Wiley (1999) Schneier, B.: The two fish encryption algorithm: a 128-bit block cipher. John Wiley (1999)
4.
go back to reference Data encryption standard: Federal Information Processing Standards Publication 46, (1977) Data encryption standard: Federal Information Processing Standards Publication 46, (1977)
5.
go back to reference Advanced encryption standard: Federal Information Processing Standards Publication 197, (2001) Advanced encryption standard: Federal Information Processing Standards Publication 197, (2001)
6.
go back to reference Stallings, W.: Cryptography and network security: Principles and practice. Upper Saddle River, N.J: Prentice Hall, Print (1999) Stallings, W.: Cryptography and network security: Principles and practice. Upper Saddle River, N.J: Prentice Hall, Print (1999)
7.
go back to reference Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (2010) (compilation and indexing terms, Copyright 2010 Elsevier Inc. 19490005984) Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (2010) (compilation and indexing terms, Copyright 2010 Elsevier Inc. 19490005984)
8.
go back to reference Wu, Y., Zhou, Y., J.P. Noonan, Agaian, S., Philip Chen, C.L.: A Novel Latin Square Image Cipher. (2013) Wu, Y., Zhou, Y., J.P. Noonan, Agaian, S., Philip Chen, C.L.: A Novel Latin Square Image Cipher. (2013)
11.
go back to reference Liao, X., Lai, S., Zhou, Q.: A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process. 90(9), 2714–2722 (2010)CrossRefMATH Liao, X., Lai, S., Zhou, Q.: A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process. 90(9), 2714–2722 (2010)CrossRefMATH
12.
go back to reference Zhu, Z., Zhang, W., Wong, K., Yu, H.: A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf. Sci. 181(6), 1171–1186 (2011) Zhu, Z., Zhang, W., Wong, K., Yu, H.: A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf. Sci. 181(6), 1171–1186 (2011)
Metadata
Title
Grayscale Image Encryption Based on Symmetric-Key Latin Square Image Cipher (LSIC)
Authors
V. Pawan Kumar
A. R. Aswatha
Smitha Sasi
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-71767-8_40