Skip to main content
Log in

Digital Image Encryption Based on the RC5 Block Cipher Algorithm

  • Original Paper
  • Published:
Sensing and Imaging: An International Journal Aims and scope Submit manuscript

Abstract

Implementation of the RC5 block cipher algorithm for digital images in different modes of operation and its detailed encryption efficiency analysis are dealt with in this paper. The encryption efficiency analysis of the RC5 block cipher algorithm for digital images is investigated using several metrics including visual testing, maximum deviation, irregular deviation, information entropy, correlation coefficients, avalanche effect, histogram uniformity and key space analysis. The evaluation consists of theoretical derivations and practical experimentation. Experimental results have proved that the RC5 block cipher algorithm can be implemented efficiently for encryption of real-time digital images and demonstrated that the RC5 block cipher algorithm is highly secure from the strong cryptographic viewpoint.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Furht, B., & Socek, D. (2003). A survey of multimedia security technical report, pp. 1–24, August 21.

  2. Tosun, S., & Feng, W. C. (2001). Lightweight security mechanisms for wireless video transmission. In Proceedings of IEEE International Conference on Information Technology: Coding and Computing (pp. 157–161).

  3. Ahmed, H. E. H., Kalash, H. M., & Allah, O. S. F. (2007). An efficient chaos-based feedback stream cipher (ECBFSC) for image encryption and decryption. International Journal of Computer Information, 31, 121–129.

    Google Scholar 

  4. Furht, B., & Socek, D. (2004). Multimedia security: Encryption techniques. In IEC Comprehensive Report on Network Security, International Engineering Consortium (pp. 335–349). Chicago, IL.

  5. Rivest, R. L. (1995). RC5 encryption algorithm. Dr Dobbs Journal, 226, 146–148.

    Google Scholar 

  6. Rivest, R. L. (1997). The RC5 encryption algorithm. MIT Laboratory for Computer Science, 545 Technology square, Cambridge, Mass. 02139 (Revised March 20, 1997). Available at: http://theory.lcs.mit.edu/~rivest/Rivest-rc5rev.pdf.

  7. Baldwin, R., & Rivest, R. (1996). RFC 2040: The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS algorithms, Oct. 30, 1996, available at ftp://ds.internic.net/rfc/rfc2040.txt.

  8. Kaliski, B. S., & Yin, Y. L. (1998). On the security of the RC5 encryption algorithm. RSA Laboratories Technical Report TR-602, version 1.0, RSA Laboratories, September, 1998.

  9. Ahmed, H. E., Kalash, H. M., & Allah, O. S. F. (2006). Encryption quality analysis of RC5 block cipher algorithm for digital images. Journal of Optical Engineering, 45(10), 107003/1–107003/7.

    Google Scholar 

  10. Ziedan, I. E., Fouad, M. M., & Salem, D. H. (2003). Application of data encryption standard to bitmap and JPEG images. In Proceedings of 12th National Radio Science Conference (NRSC2003) (pp. C16/1–C16/8).

  11. Li, S. J., Chen, G. R., & Zheng, X. (2004). Chaos-based encryption for digital images and videos. In: Multimedia Security Handbook, Chapter 4.

  12. Mao, Y. B., Chen, G. R., & Lian, S. G. (2004). A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals, 21, 749–761.

    Article  MathSciNet  MATH  Google Scholar 

  13. Amin, M., Allah, O. S. F., & Abd El-Latif, A. A. (2010). A chaotic block cipher algorithm for image cryptosystems. Communications in Nonlinear Science and Numerical Simulation, 15, 3484–3497.

    Article  MathSciNet  MATH  Google Scholar 

  14. Elkamchouchi, H., & Makar, M. A. (2005). Measuring encryption quality of Bitmap images encrypted with Rijndael and KAMKAR block ciphers. In Proceedings of Twenty second National Radio Science Conference (NRSC 2005) Cairo, Egypt (pp. C11). Mar. 15–17.

  15. Yen, J. C., & Guo, J. I. (2000). A new chaotic key-based design for image encryption and decryption. In Proceedings of IEEE International Conference on Circuits and Systems (Vol. 4, pp. 49–52).

  16. Lian, S. (2009). Multimedia content encryption: Techniques and applications. London: Taylor & Francis Group, LLC.

    Google Scholar 

  17. Ahmed, H. E. H., Kalash, H. M., & Allah, O. S. F. (2007). An efficient chaos-based feedback stream cipher (ECBFSC) for image encryption and decryption. An International Journal of Computing and Informatics, 31(1), 121–129.

    Google Scholar 

  18. Shannon, C. E. (1949). Communication theory of secrecy system. Bell System Technical Journal, 28, 656–715.

    MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Osama S. Faragallah.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Faragallah, O.S. Digital Image Encryption Based on the RC5 Block Cipher Algorithm. Sens Imaging 12, 73–94 (2011). https://doi.org/10.1007/s11220-011-0062-5

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11220-011-0062-5

Keywords

Navigation