Abstract
This is an improved and extended version of the paper presented in CVIP 2020 conference. Stream ciphers are extensively used over a wide range of applications including security of digital data. In this paper, a method for securing different types of images (binary, gray scale, true color, and index) based on stream cipher (RC4A) and MDS (Maximum Distance Separable) matrix is proposed. The method adopts the framework of the Permutation-Substitution Network (PSN) of cryptography, and thus satisfies both confusion and diffusion properties required for a secure encryption algorithm. The proposed method encrypts a digital image into a random-like image from human visual as well as statistical point of view. Several encryption evaluation metrics, such as key sensitivity, chi-squared test, adjacent pixels correlation coefficient, irregular deviation, number of pixel change rate, unified averaged changed intensity, etc., are applied on test images taken from MATLAB IPT and USC-SIPI image database, to empirically assess the performance of the proposed method. The results of these statistical and security tests support the robustness of the proposed approach.













Similar content being viewed by others
Notes
USC-SIPI image database is available at, http://sipi.usc.edu/database/.
References
Briceno M, Goldberg I, Wagner D. A pedagogical implementation of A5/1. https://cryptome.org/jya/a51-pi.htm#PI. Accessed 15 July 2021 1999.
Fontaine C. E0 (Bluetooth). In: van Tilborg H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA, 2005. https://doi.org/10.1007/0-387-23483-7_117. Accessed 31 Aug 2021.
The 3rd Generation Partnership Project (3GPP), TS 35.216: specification of the 3GPP confidentiality and integrity algorithms UEA2 & UIA2; Document 2: SNOW 3G specification (Vol. 10.0.0). 2011. https://www.etsi.org/deliver/etsi_ts/135200_135299/135216/10.00.00_60/ts_135216v100000p.pdf. Accessed 15 Jul 2021.
The 3rd Generation Partnership Project (3GPP), TS 35.222: specification of the 3GPP confidentiality and integrity algorithms EEA3 & EIA3; Document 2: ZUC specification (Vol. 11.0.1). 2012. http://www.etsi.org/deliver/etsi_ts/135200_135299/135222/11.0-0.01_60/ts_135222v110001p.pdf. Accessed 15 Jul 2021.
The 3rd Generation Partnership Project (3GPP), TS 35.202: specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi specification (Vol. 10.0.0). 2011. http://www.etsi.org/deliver/etsi_ts/135200_135299/135202/10.0-0.00_60/ts_135202v100000p.pdf. Accessed 15 Jul 2021.
Fan X, Gong G. Specification of the stream cipher WG-16 based confidentiality and integrity algorithm. 2013. http://cacr.uwaterloo.ca/techreports/2013/cacr2013-06.pdf. Accessed 15 Jul 2021.
FIPS PUB 197, Advanced Encryption Standard (AES), National Institute of Standards and Technology (NIST). 2001. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf. Accessed 15 Jul 2021.
Paul S, Preneel B. A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher. In: FSE (Fast Software Encryption), LNCS, Springer. 2004;3017:245–259. https://doi.org/10.1007/978-3-540-25937-4_16.
Schneier B. Applied cryptography: protocols, algorithms and source code in C. 2nd ed. New York: Wiley; 1996.
Dierks T, Allen C. The TLS protocol, version 1.0, Internet Engineering Task Force (IETF). 1999. https://www.rfc-editor.org/rfc/rfc2246.txt. Accessed 15 Jul 2021.
Malik A, Dhall S, Gupta S. An improved bit plane image encryption technique using RC4 and quantum chaotic demeanour. Multimedia Tools Appl. 2021;80:7911–37. https://doi.org/10.1007/s11042-020-09973-5.
Joshi AB, Kumar D, Mishra DC. Security of digital images based on 3D Arnold cat map and elliptic curve. Int J Image Graph. 2021;21(1):2150006. https://doi.org/10.1142/s0219467821500066.
Susanto A, Setiadi DRI, Rachmawanto EH, Mulyono IUW, Sari CA, Sarker MK, Sazal MR. Triple layer image security using bit-shift, chaos and stream encryption. Bull Electr Eng Inf. 2020;9(3):980–7. https://doi.org/10.11591/eei.v9i3.2001.
Dena A, Salah A. Image encryption algorithm based on RC4 and Hénon map. J Theor Appl Inf Technol 2018; 96(21):7065–7076. https://www.researchgate.net/publication/345992561. Accessed 15 Jul 2021.
Sankaranarayanan C, Annadurai S. An optimized digital image encryption based SPIHT compression using RC4, Blowfish and UWT algorithm. TAGA J 2018;14:2014–2029. http://www.tagajournal.com/gallery/v14.186.pdf. Accessed 15 Jul 2021.
Hameed SM, Saadoon HA, Al-Ani M. Image encryption using DNA encoding and RC4 algorithm. Iraqi J Sci. 2018;59(1B):434–46. https://doi.org/10.24996/ijs.2018.59.1B.24.
Kumari M, Gupta S. A novel image encryption scheme based on intertwining chaotic maps and RC4 stream cipher. 3D Res. 2018;9:10. https://doi.org/10.1007/s13319-018-0162-2.
Bhowmick A, Sinha N, Arjunan RV, Kishore B. Permutation-Substitution architecture based image encryption algorithm using middle square and RC4 PRNG. In: Proceedings of international conference on inventive systems and control (ICISC), Coimbatore; 2017. pp. 1–6. https://doi.org/10.1109/ICISC.2017.8068729.
Mondal B, Sinha N, Mandal T. A secure image encryption algorithm using LFSR and RC4 key stream generator. In: Proceedings of 3rd international conference on advanced computing, networking and informatics (ICACNI), Springer; 2015. pp. 227–37. https://doi.org/10.1007/978-81-322-2538-6_24.
Ismael RS, Youail RS, Wahhab S. Image encryption by using RC4 algorithm. Eur Acad Res 2014;2(4):5833–5839. https://www.researchgate.net/publication/283548443. Accessed 15 Jul 2021.
Ginting RU, Dillak RY. Digital color image encryption using RC4 stream cipher and chaotic logistic map. In: Proceedings of international conference on information technology and electrical engineering (ICITEE), IEEE; 2013. pp. 101–5. https://doi.org/10.1109/ICITEED.2013.6676220.
Hanchinamani G, Kulkarni L. An efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher. 3D Res. 2015;6:30. https://doi.org/10.1007/s13319-015-0062-7.
Jin C, Tu Z. A novel color image encryption algorithm using chaotic map and improved RC4. In: Proceedings of advances in intelligent systems and computing. Springer, Cham, vol. 466; 2016. https://doi.org/10.1007/978-3-319-33389-2_1.
Joshi AB, Kumar D, Gaffar A, Mishra DC. Triple color image encryption based on 2D multiple parameter fractional discrete Fourier transform and 3D Arnold transform. Opt Lasers Eng. 2020;333:106139. https://doi.org/10.1016/j.optlaseng.2020.106139.
Joshi AB, Kumar D, Mishra DC, Guleria V. Colour image encryption based on 2D discrete wavelet transform and 3D logistic chaotic map. J Mod Opt. 2020;67(10):933–49. https://doi.org/10.1080/09500340.2020.1789233.
Thank you Bob Anderson, Cypherpunks (Mailing list). 1994. http://cypherpunks.venona.com/date/1994/09/msg00304.html. Accessed 15 Jul 2021.
Jenkins B. Re: RC4?, Newsgroup: sci.crypt. 1994. https://groups.google.com/forum/#!msg/sci.crypt/JsO3xEATGF-A/wO4ttv7BCYJ. Accessed 15 Jul 2021.
Knuth DE. The art of computer programming. Seminumerical algorithms, vol. 2. Boston: Addison-Wesley Publishing Company; 1981.
ECRYPT II yearly report on algorithms and keysizes (2011–2012), Editor Nigel Smart (BRIS). 2021.https://www.ecrypt.eu.org/ecrypt2/documents/D.SPA.20.pdf. Accessed 15 Jul 2021.
Stinson DR. Cryptography: theory and practice. Boca Raton: Chapman and Hall CRC; 2006.
Shannon CE. Communication theory of secrecy systems. Bell Syst Tech J. 1949;28(4):656–715.
Pearson K. Contributions to the mathematical theory of evolution-II. Skew variation in homogeneous material. Philos Trans R Soc A Math Phys Eng Sci. 1895;186:343–414. https://doi.org/10.1098/rsta.1895.0010.
Pearson K. On the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling. Philos Mag Ser. 1900;50(302):157–75. https://doi.org/10.1080/14786440009463897.
Cochran WG. The chi-square test of goodness of fit. Ann Math Stat. 1952;23(3):315–45. https://doi.org/10.1214/aoms/1177729380.
Fisher RA. Statistical methods for research workers. 13th ed. New York: Hafner; 1958.
Shannon CE. A mathematical theory of communication. Bell Syst Tech J. 1948;27(3):379–423. https://doi.org/10.1002/j.1538-7305.1948.tb01338.x.
Abd El-Samie FE, Ahmed HEH, Elashry IF, Shahieen MH, Faragallah OS, El-Rabaie EM, Alshebeili SA. Image encryption: a communication perspective. Boston: CRC Press, Taylor and Francis Group; 2013.
Wu Y, Noonan JP, Agaian S. NPCR and UACI randomness tests for image encryption. J Sel Areas Telecommun. 2011;2011:31–8.
Biham E, Shamir A. Differential cryptanalysis of the Data Encryption Standard (DES). Berlin: Springer; 1993.
Acknowledgements
The authors would like to thank everyone, who has contributed anyhow in the preparation of this manuscript.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This work was supported by UGC (University Grants Commission), New Delhi, India under Grant no. [415024].
This article is part of the topical collection “Progresses in Image Processing” guest-edited by P. Nagabhushan, Peter Peer, Partha Pratim Roy and Satish Kumar Singh.
Rights and permissions
About this article
Cite this article
Gaffar, A., Joshi, A.B. & Kumar, D. Securing Digital Images using Stream Cipher and MDS Matrix. SN COMPUT. SCI. 2, 462 (2021). https://doi.org/10.1007/s42979-021-00834-y
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-021-00834-y