All Title Author
Keywords Abstract


Image Encryption Using a Lightweight Stream Encryption Algorithm

DOI: 10.1155/2012/767364

Full-Text   Cite this paper   Add to My Lib

Abstract:

Security of the multimedia data including image and video is one of the basic requirements for the telecommunications and computer networks. In this paper, we consider a simple and lightweight stream encryption algorithm for image encryption, and a series of tests are performed to confirm suitability of the described encryption algorithm. These tests include visual test, histogram analysis, information entropy, encryption quality, correlation analysis, differential analysis, and performance analysis. Based on this analysis, it can be concluded that the present algorithm in comparison to A5/1 and W7 stream ciphers has the same security level, is better in terms of the speed of performance, and is used for real-time applications. 1. Introduction Nowadays, multimedia data such as image and video is expanding in communications and computer networks [1]. Due to widespread use of multimedia data and despite widespread threats and attacks in communication systems, security of this data is necessary [2, 3]. Multimedia encryption challenges originate from two realities. Firstly, multimedia data have great volumes. Secondly, they need real-time uses [4]. So using encryption for security results in additional computations for information processing. As a result, a balance between security and synchronization requirement is necessary [5]. To reach this aim, we use lightweight and high-speed encryption algorithms. One of the methods to ensure security is considering all data as binary strings and encrypt them using block encryption algorithms such as DES. These algorithms are very complex and involve large amounts of computations, and their software implement is not fast enough for high-volume multimedia data [6]. Commonly stream encryption algorithms are used for image encryption [5, 7–9]. Stream ciphers are built using a pseudorandom key sequence, and then this sequence is combined with the original text through exclusive-or operator. Generally, stream encryption systems have suitable performance when speed and error probability of data transmission are high. In this paper, the simple and lightweight stream encryption algorithm is used for multimedia applications such as image, and also various statistical tests are performed in order to assure the security of the algorithm and compared to A5/1 and W7 stream cipher. The notable point in this algorithm is producing the key sequence by AES block cipher in order to enhance the security. A5/1 and W7 stream cipher algorithms are used for the key production from the linear feedback shift registers. A5/1 algorithm has

References

[1]  A. Uhl and A. Pommer, “Application scenarios for the encryption of still visual data,” in Image and video encryption from Digital Rights Management to secured personal communication, Advances in Information Security, vol. 15, pp. 31–43, Springer, 2005.
[2]  S. Lian and X. Chen, “On the design of partial encryption scheme for multimedia content,” Mathematical and Computer Modelling. In press.
[3]  N. Taneja, B. Raman, and I. Gupta, “Combinational domain encryption for still visual data,” Multimedia Tools and Applications, vol. 59, no. 3, pp. 775–793, 2012.
[4]  S. S. Agaian, R. G. R. Rudraraju, and R. C. Cherukuri, “Logical transform based encryption for multimedia systems,” in Proceedings of the IEEE International Conference on Systems, Man and Cybernetics (SMC '10), pp. 1953–1957, October 2010.
[5]  F. Bao and R. H. Deng, “Light-weight encryption schemes for multimedia data and high-speed networks,” in Proceedings of the 50th Annual IEEE Global Telecommunications Conference (GLOBECOM '07), pp. 188–192, November 2007.
[6]  C. Li, S. Li, M. Asim, J. Nunez, G. Alvarez, and G. Chen, “On the security defects of an image encryption scheme,” Image and Vision Computing, vol. 27, no. 9, pp. 1371–1381, 2009.
[7]  A. Jolfaei and A. Mirghadri, “Survey: image Encryption Using A5/1 and W7,” vol. 2, no. 8.
[8]  N. Thomas, D. Redmill, and D. Bull, “Secure transcoders for single layer video data,” Signal Processing, vol. 25, no. 3, pp. 196–207, 2010.
[9]  F. Liu and H. Koenig, “A survey of video encryption algorithms,” Computers and Security, vol. 29, no. 1, pp. 3–15, 2010.
[10]  G. Alvarez and S. Li, “Some basic cryptographic requirements for chaos-based cryptosystems,” International Journal of Bifurcation and Chaos, vol. 16, no. 8, pp. 2129–2151, 2006.
[11]  A. Pande and J. Zambreno, “The secure wavelet transform,” Journal of Real-Time Image Processing, vol. 18, no. 3, pp. 844–856, 2010.
[12]  C. N. Raju, G. Umadevi, K. Srinathan, and C. V. Jawahar, “Fast and secure real-time video encryption,” in Proceedings of the 6th Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP '08), pp. 257–264, December 2008.
[13]  J. Zhou, Z. Liang, Y. Chen, and O. C. Au, “Security analysis of multimedia encryption schemes based on multiple Huffman table,” IEEE Signal Processing Letters, vol. 14, no. 3, pp. 201–204, 2007.
[14]  W. Li and N. Yu, “A robust chaos-based image encryption scheme,” in Proceedings of the IEEE International Conference on Multimedia and Expo (ICME '09), pp. 1034–1037, July 2009.
[15]  R. C. Luo, L. Y. Chung, and C. H. Lien, “A novel symmetric cryptography based on the hybrid haar wavelets encoder and chaotic masking scheme,” IEEE Transactions on Industrial Electronics, vol. 49, no. 4, pp. 933–944, 2002.
[16]  G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solitons and Fractals, vol. 21, no. 3, pp. 749–761, 2004.
[17]  C. E. Shannon, “Communication theory of secrecy systems,” Bell Systems Technical Journal, vol. 28, pp. 656–715, 1949.
[18]  H. E. D. H. Ahmed, H. M. Kalash, and O. S. Farag Allah, “Encryption quality analysis of the RC5 block cipher algorithm for digital images,” Optical Engineering, vol. 45, no. 10, Article ID 107003, 2006.

Full-Text

comments powered by Disqus