Abstract
With the massive use of images over the Internet, the security of some of them has become critical. One of the most used encryption algorithms is AES. Although this algorithm provides high security for text data, it is not suitable for images in view of their characteristics including correlation and redundancy. To have a more suitable and efficient algorithm for the encryption of images, we have deeply studied the features of this kind of data as well as the weaknesses of the well-known cryptosystems designed for images. In addition, we have examined the common building blocks used in the design of a “good” image cipher. Based on this analysis, we propose some recommendations to construct a well-secured and efficient cryptosystem for images that can be easily extended or adapted to video streams.
Similar content being viewed by others
References
Banik, S., Bogdanov, A., Isobe, T., Shibutani, K., Hiwatari, H., Akishita, T., Regazzoni, F.: Midori: a block cipher for low energy. In: International Conference on the Theory and Application of Cryptology and Information Security, Springer, pp 411–436 (2014)
Bao, J., Yang, Q.: Period of the discrete arnold cat map and general cat map. Nonlinear Dyn. 70(2), 1365–1375 (2012)
Baset, S.A., Schulzrinne, H.: An analysis of the skype peer-to-peer internet telephony protocol. (2004). arXiv preprint arXiv:cs/0412017
Baysal, A., Sahin, S.: Roadrunner: a small and fast bitslice block cipher for low cost 8-bit processors. IACR Cryptol 2015, 906 (2015)
Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: Simon and speck: block ciphers for the internet of things. Cryptology ePrint Archive, Report 2015/585, (2015). http://eprint.iacr.org/2015/585
Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The simon and speck families of lightweight block ciphers. Cryptology ePrint Archive, Report 2013/404, (2013). http://eprint.iacr.org/2013/404
Becheikh, R., Omrani, T., Rhouma, R., Belghith, S.: RISC: a robust image symmetric cryptosystem. Multimed. Tools Appl. 77(19), 24615–24642 (2018)
Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher, pp 450–466 (2007)
Daemen, J., Rijmen, V.: AES proposal: Rijndael (1999)
Des: Data encryption standard. In: In FIPS PUB 46, Federal Information Processing Standards Publication, pp 46–52 (1977)
Dileep, A., Anusudha, K., T MAP: an efficient reversible data hiding technique in encrypted images based on chaotic map. In: 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), pp 539–543 (2015)
François, M., Grosges, T., Barchiesi, D., Erra, R.: A new image encryption scheme based on a chaotic function. Sig. Process. Image Commun. 27(3), 249–259 (2012)
Gong, Z., Nikova, S., Law, Y.W.: KLEIN: a new family of lightweight block ciphers, pp 1–18 (2012)
Hamalainen, P., Alho, T., Hannikainen, M., Hamalainen, T.D.: Design and implementation of low-area and lowpower aes encryption hardware core. In: 9th EUROMICRO Conference on Digital System Design (DSD’06), pp 577–583 (2006)
Heys, H.M.: A tutorial on linear and differential cryptanalysis. Cryptologia 26(3), 189–221 (2002)
Leander, G., Paar, C., Poschmann, A., Schramm, K.: New lightweight DES variants, pp. 196–210. Springer Berlin Heidelberg, Berlin, Heidelberg (2007)
Maniyath, S.R., M,S.: An uncompressed image encryption algorithm based on DNA sequences (2011)
Matsui, M.: Linear cryptanalysis method for des cipher. In: Workshop on the Theory and Application of of Cryptographic Techniques, Springer, pp 386–397 (1993)
Sam, I.S., Devaraj, P., Bhuvaneswaran, R.S.: A novel image cipher based on mixed transformed logistic maps. Multimed. Tools Appl. 56(2), 315–330 (2012)
Shatheesh, S.I., Devaraj, P., Bhuvaneswaran, R.S.: An intertwining chaotic maps based image encryption scheme. Nonlinear Dyn. 69(4), 1995–2007 (2012)
Skype: Does skype use encryption. (2017). https://support.skype.com/en/faq/FA31/does-skype-use-encryption
Viber: Viber encryption overview. (2016). https://www.viber.com/en/security-overview
WhatsApp: Encryption Overview. Technical white paper. (2016). https://www.whatsapp.com/security/WhatsApp-Security-Whitepaper.pdf
Wong, K.W., Kwok, B.S.H., Law, W.S.: A fast image encryption scheme based on chaotic standard map. Phys. Lett. A 372(15), 2645–2652 (2008)
Wu, W., Zhang, L.: LBlock: a lightweight block cipher. In: Applied Cryptography and Network Security. Springer, Berlin Heidelberg, pp 327–344 (2011)
Xu, L., Li, Z., Li, J., Hua, W.: A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 78, 17–25 (2016)
Zhang, W., Bao, Z., Lin, D., Rijmen, V., Yang, B., Verbauwhede, I.: Rectangle: a bit-slice lightweight block cipher suitable for multiple platforms. Sci. China Inf. Sci. 58(12), 1–15 (2015)
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by L. Zhou.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Omrani, T., Becheikh, R. & Rhouma, R. Towards a real-time image/video cryptosystem: problems, analysis and recommendations. Multimedia Systems 26, 339–362 (2020). https://doi.org/10.1007/s00530-019-00647-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00530-019-00647-3