Skip to main content

New Lightweight Conditional Encryption Schemes for Multimedia

  • Conference paper
  • First Online:
Proceedings of the Third International Conference on Soft Computing for Problem Solving

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 258))

Abstract

The unprecedented advancement in multimedia technology and the upsurge of social networking as an indispensable part of day to day life, has brought forth an unimaginable necessitate for voluminous data transfer over inherently insecure networks. Besides security, another major aspect today is to design lightweight encryption schemes which can perform effectively on hand-held devices like mobiles and provide security as per the requirements of the applications. The standard encryption schemes address the security aspect of only plain textual data and are not suitable for securing voluminous real-time data transfers, having significant level of redundancies, over resource-constrained environments. Focusing on this requirement introduced as the need of the hour, the paper proposes novel lightweight encryption schemes, based on conditional approach, using simple S-Box look-ups, shifting, negation and XORing (standard Exclusive OR) as the basic building blocks. To address the issue of significant redundancy present in the plain text, pixel position has been introduced as one of the parameters in the encryption process. The results of empirical analysis demonstrate the strength of the proposed schemes and they perform equally well for worst case scenarios (white image). The comparative results demonstrate complete removal of redundancies in the proposed cipher with much higher computational efficiency as compared to the standard schemes like AES.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Stinson, D.R.: Cryptography: Theory and Practice, 3rd edn. Chapman & Hall, Boca Raton (2005)

    Google Scholar 

  2. Menezes, A. (ed.): Handbook of Applied Cryptography. CRC-Press, Boca Raton (1996)

    Google Scholar 

  3. Furht, B. (ed.): Encyclopedia of Multimedia. Springer, New York (2005)

    Google Scholar 

  4. Gonzalez, R.C., Woods R.E.: Digital Image Processing, 3rd edn. Prentice Hall, Upper Saddle River (2007)

    Google Scholar 

  5. Leitold, H., Markatos, E.: Communication & multimedia security: In: Proceedings of the 10th IFIP International Conference, LNCS, Springer (2006)

    Google Scholar 

  6. Stallings, W.: Cryptography & Network Security Principles and Practices, 3rd edn. Pearson Education (2004)

    Google Scholar 

  7. Lian, S., Zhang, Y.: Handbook of research on secure multimedia distribution, Information Science Reference, IGI Global (2009)

    Google Scholar 

  8. Lian, S.: Multimedia Content Encryption—Techniques and Applications, pp. 21–42. CRC Press, Taylor & Francis Group, New York (2009)

    Google Scholar 

  9. Kang, X., Peng, A., Xu, X., Cao, X.: Performing scalable lossy compression on pixel encrypted images. EURASIP J. Image Video Process. 2013, 32. http://jivp.eurasipjournals.com/content/2013/1/32

  10. Agrawal, P., Rajpoot, M.: Partial encryption algorithm for secure transmission of multimedia messages. Int. J. Comp. Sci. 3(1), 467–470 (2012)

    Google Scholar 

  11. Lini, A., Neenu, D.: Secure image encryption algorithms: a review. Int. J.Sci. Technol. Res. 2(4) (2013) ISSN 2277-8616

    Google Scholar 

  12. Ahmed, F., Resch, C.L.: Characterizing cryptographic primitives for lightweight digital image encryption. In: Proceeding of Mobile Multimedia/Image Processing, Security, and Applications. SPIE 7351, 73510G, pp. 10G 1–11, (2009)

    Google Scholar 

  13. Dhall, S., Pal S.K.: Design of a new block cipher based on conditional encryption, ITNG 2010. IEEE Computer Society/CPS, IEEE Conference Publishing Services, Las Vegas, pp. 714–718 (2010)

    Google Scholar 

  14. Krishnamurthy, G.N., Ramaswamy, V.: Making AES stronger: AES with key dependent S-box. Int. J. Comput. Sci. Netw. Secur. 8(9), 388–398 (2009)

    Google Scholar 

  15. Abd-ElGhafar, I., Rohiem, A., Diaa, A., Mohammed, F.: Generation of AES key dependent S-boxes using RC4 algorithm. In: 13th International Conference on Aerospace Sciences & Aviation Technology (ASAT–13), 26–28 May 2009

    Google Scholar 

  16. Jing, F., Fei, H.: FAN transform in image scrambling encryption application. (2009) doi:978-1-4244-5668-0/09

    Google Scholar 

  17. Li, B., Xu, J.: Period of Arnold transformation & its application in image scrambling. J. Central South Univ. Technol. 12(1), 278–282 (2005)

    Article  Google Scholar 

  18. Wu, Y., Noonan, JP., Agaian, S.: NPCR and UACI randomness tests for image encryption, cyber journals: multidisciplinary journals in science and technology. J. Sel. Areas Telecommun. (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sakshi Dhall .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Dhall, S., Pal, S.K., Sharma, K. (2014). New Lightweight Conditional Encryption Schemes for Multimedia. In: Pant, M., Deep, K., Nagar, A., Bansal, J. (eds) Proceedings of the Third International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 258. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1771-8_32

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1771-8_32

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1770-1

  • Online ISBN: 978-81-322-1771-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics