Skip to main content

Advertisement

Log in

Symmetric synchronous stream encryption using images

  • Original Paper
  • Published:
Signal, Image and Video Processing Aims and scope Submit manuscript

Abstract

In this paper, a symmetric synchronous stream encryption technique is suggested. The proposed technique utilizes a selected block from the parity bit plane of a public image as a nonlinear function to confuse the relation between the ciphered bits and the key stream. Using the proposed technique, any sort of message like text or image can be encrypted as well as decrypted bit by bit. Simulation results showed that ciphered gray scale images have flat histogram with entropy almost equal to eight and a correlation between pixels in all directions which is almost equal to zero. The technique is highly sensitive to any change in the starting pixel of the selected block or the initial condition of the pseudo-random generator.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Li, S., Chen, G., Zheng, X., in: Furht, B., Kirovski, D. (eds.) Multimedia Security Hand-book, Chapter 4, p. 133. CRC Press (2005)

  2. Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656–715 (1949)

    Article  MathSciNet  MATH  Google Scholar 

  3. Robshaw, M.J.B.: RSA Laboratories Technical, Report, TR-701(2) (1995)

  4. Menezes, A.J., Van Oorschot, P.C., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton, FL, USA (1996)

    Book  Google Scholar 

  5. Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. Assoc. Comput. Mach. 33(4), 792–807 (1986)

    Article  MathSciNet  Google Scholar 

  6. Wang, X., Zhao, J., Liu, H.: A new image encryption algorithm based on chaos. Opt. Commun. 285(5), 562–566 (2012)

    Article  Google Scholar 

  7. Zhu, C.: A novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun. 285(1), 29–37 (2012)

    Article  Google Scholar 

  8. Lian, S.: Efficient image or video encryption based on improved hyperchaotic sequences. Chaos, Solitons, Fractals 40(5), 2509–2519 (2009)

    Google Scholar 

  9. Gao, H., Zhang, Y., Liang, S., Li, D.: A new chaotic algorithm for image encryption. Chaos, Solitons, Fractals 29(2), 393–399 (2006)

    Article  MATH  Google Scholar 

  10. Gao, T., Chen, Z.: Image encryption based on a new total shuffling algorithm. Chaos, Solut Fractals 38(1), 213–220 (2008)

  11. Amin, M., Faragallah, O.S., Abd El-Latif, A.A.: A chaotic block cipher algorithm for image cryptosystems. Commun. Nonlinear Sci. Numer. Simul. 15(11), 3484–3497 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  12. Abd El-Latif, A.A., Niu, X., Wang, N.: Chaotic image encryption using Bezier curve in DCT domain scrambling. Commun. Comput. Inform. Sci. 194, 30–41 (2011)

    Article  Google Scholar 

  13. Patidar, V., Pareek, N.K., Purohit, G., Sud, K.K.: A robust and secure chaotic standard map based on pseudorandom permutation-substitution scheme for image encryption. Opt. Commun. 284, 4331–4339 (2011)

    Article  Google Scholar 

  14. Amin, M., Abd El-Latif, A.A.: Efficient modified RC5 based on chaos adapted to image encryption. J. Electron. Imaging 19(1) (2010)

  15. Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitions Fractals 21(3), 749–761 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  16. Akhshani, A., Behnia, S., Akhavan, A., Abu Hassan, H., Hassan, Z.: A novel scheme for image encryption based on 2D piecewise chaotic maps. Opt. Commun. 283(17), 3259–3266 (2010)

    Article  Google Scholar 

  17. Yoon, J.W., Kim, H.: An image encryption scheme with a pseudorandom permutation based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 15, 3998–4007 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  18. Zhang, W., Wong, K., Yu, H., Zhu, Z.: An image encryption scheme using lightweight bit-level confusion and cascade cross circular diffusion. Opt. Commun. 285, 2343–2354 (2012)

    Article  Google Scholar 

  19. Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3), 749–761 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  20. De Santis, A.F., Ferrara, A.L., Masucci, B.: Unconditionally secure key assignment schemes. Disc. Appl. Math. 154, 234–252 (2006)

    Article  MATH  Google Scholar 

  21. Li, W.: On the relationship between complexity and entropy for Markov chains and regular languages. Complex Syst. 5, 381–399 (1991)

    MATH  Google Scholar 

  22. Zhang, G., Liu, Q.: A novel image encryption method based on total shuffling scheme. Opt. Commun. 284, 2775–2780 (2012)

    Article  Google Scholar 

  23. Bluman, A.G.: Elementary Statistics: A Step by Step Approach. McGraw-Hill, Boston (1997)

    Google Scholar 

  24. Stinson, D.: Cryptography: Theory and Practice, 2nd edn. CRC/C &H (2002)

  25. Schneier, B.: Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd edn. Wiley, New Jersey (1996)

    MATH  Google Scholar 

  26. Zhou, Q., Liao, X.: Collision-based flexible image encryption algorithm. J. Syst. Softw. 85, 400–407 (2012)

    Article  Google Scholar 

  27. Behnia, S., Akshani, A., Mahmodi, H., Akhavan, A.: A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitions Fractals 35, 408–419 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vishwanath Ullagaddi.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ullagaddi, V., Hassan, F. & Devabhaktuni, V. Symmetric synchronous stream encryption using images. SIViP 9, 1–8 (2015). https://doi.org/10.1007/s11760-012-0416-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11760-012-0416-z

Keywords

Navigation