Skip to main content
Log in

Securing Digital Images using Stream Cipher and MDS Matrix

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

This is an improved and extended version of the paper presented in CVIP 2020 conference. Stream ciphers are extensively used over a wide range of applications including security of digital data. In this paper, a method for securing different types of images (binary, gray scale, true color, and index) based on stream cipher (RC4A) and MDS (Maximum Distance Separable) matrix is proposed. The method adopts the framework of the Permutation-Substitution Network (PSN) of cryptography, and thus satisfies both confusion and diffusion properties required for a secure encryption algorithm. The proposed method encrypts a digital image into a random-like image from human visual as well as statistical point of view. Several encryption evaluation metrics, such as key sensitivity, chi-squared test, adjacent pixels correlation coefficient, irregular deviation, number of pixel change rate, unified averaged changed intensity, etc., are applied on test images taken from MATLAB IPT and USC-SIPI image database, to empirically assess the performance of the proposed method. The results of these statistical and security tests support the robustness of the proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Notes

  1. USC-SIPI image database is available at, http://sipi.usc.edu/database/.

  2. Available at, https://in.mathworks.com/matlabcentral/fileexchange/22089-iptimages.

References

  1. Briceno M, Goldberg I, Wagner D. A pedagogical implementation of A5/1. https://cryptome.org/jya/a51-pi.htm#PI. Accessed 15 July 2021 1999.

  2. Fontaine C. E0 (Bluetooth). In: van Tilborg H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA, 2005. https://doi.org/10.1007/0-387-23483-7_117. Accessed 31 Aug 2021.

  3. The 3rd Generation Partnership Project (3GPP), TS 35.216: specification of the 3GPP confidentiality and integrity algorithms UEA2 & UIA2; Document 2: SNOW 3G specification (Vol. 10.0.0). 2011. https://www.etsi.org/deliver/etsi_ts/135200_135299/135216/10.00.00_60/ts_135216v100000p.pdf. Accessed 15 Jul 2021.

  4. The 3rd Generation Partnership Project (3GPP), TS 35.222: specification of the 3GPP confidentiality and integrity algorithms EEA3 & EIA3; Document 2: ZUC specification (Vol. 11.0.1). 2012. http://www.etsi.org/deliver/etsi_ts/135200_135299/135222/11.0-0.01_60/ts_135222v110001p.pdf. Accessed 15 Jul 2021.

  5. The 3rd Generation Partnership Project (3GPP), TS 35.202: specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi specification (Vol. 10.0.0). 2011. http://www.etsi.org/deliver/etsi_ts/135200_135299/135202/10.0-0.00_60/ts_135202v100000p.pdf. Accessed 15 Jul 2021.

  6. Fan X, Gong G. Specification of the stream cipher WG-16 based confidentiality and integrity algorithm. 2013. http://cacr.uwaterloo.ca/techreports/2013/cacr2013-06.pdf. Accessed 15 Jul 2021.

  7. FIPS PUB 197, Advanced Encryption Standard (AES), National Institute of Standards and Technology (NIST). 2001. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf. Accessed 15 Jul 2021.

  8. Paul S, Preneel B. A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher. In: FSE (Fast Software Encryption), LNCS, Springer. 2004;3017:245–259. https://doi.org/10.1007/978-3-540-25937-4_16.

  9. Schneier B. Applied cryptography: protocols, algorithms and source code in C. 2nd ed. New York: Wiley; 1996.

    MATH  Google Scholar 

  10. Dierks T, Allen C. The TLS protocol, version 1.0, Internet Engineering Task Force (IETF). 1999. https://www.rfc-editor.org/rfc/rfc2246.txt. Accessed 15 Jul 2021.

  11. Malik A, Dhall S, Gupta S. An improved bit plane image encryption technique using RC4 and quantum chaotic demeanour. Multimedia Tools Appl. 2021;80:7911–37. https://doi.org/10.1007/s11042-020-09973-5.

    Article  Google Scholar 

  12. Joshi AB, Kumar D, Mishra DC. Security of digital images based on 3D Arnold cat map and elliptic curve. Int J Image Graph. 2021;21(1):2150006. https://doi.org/10.1142/s0219467821500066.

    Article  Google Scholar 

  13. Susanto A, Setiadi DRI, Rachmawanto EH, Mulyono IUW, Sari CA, Sarker MK, Sazal MR. Triple layer image security using bit-shift, chaos and stream encryption. Bull Electr Eng Inf. 2020;9(3):980–7. https://doi.org/10.11591/eei.v9i3.2001.

    Article  Google Scholar 

  14. Dena A, Salah A. Image encryption algorithm based on RC4 and Hénon map. J Theor Appl Inf Technol 2018; 96(21):7065–7076. https://www.researchgate.net/publication/345992561. Accessed 15 Jul 2021.

  15. Sankaranarayanan C, Annadurai S. An optimized digital image encryption based SPIHT compression using RC4, Blowfish and UWT algorithm. TAGA J 2018;14:2014–2029. http://www.tagajournal.com/gallery/v14.186.pdf. Accessed 15 Jul 2021.

  16. Hameed SM, Saadoon HA, Al-Ani M. Image encryption using DNA encoding and RC4 algorithm. Iraqi J Sci. 2018;59(1B):434–46. https://doi.org/10.24996/ijs.2018.59.1B.24.

    Article  Google Scholar 

  17. Kumari M, Gupta S. A novel image encryption scheme based on intertwining chaotic maps and RC4 stream cipher. 3D Res. 2018;9:10. https://doi.org/10.1007/s13319-018-0162-2.

    Article  Google Scholar 

  18. Bhowmick A, Sinha N, Arjunan RV, Kishore B. Permutation-Substitution architecture based image encryption algorithm using middle square and RC4 PRNG. In: Proceedings of international conference on inventive systems and control (ICISC), Coimbatore; 2017. pp. 1–6. https://doi.org/10.1109/ICISC.2017.8068729.

  19. Mondal B, Sinha N, Mandal T. A secure image encryption algorithm using LFSR and RC4 key stream generator. In: Proceedings of 3rd international conference on advanced computing, networking and informatics (ICACNI), Springer; 2015. pp. 227–37. https://doi.org/10.1007/978-81-322-2538-6_24.

  20. Ismael RS, Youail RS, Wahhab S. Image encryption by using RC4 algorithm. Eur Acad Res 2014;2(4):5833–5839. https://www.researchgate.net/publication/283548443. Accessed 15 Jul 2021.

  21. Ginting RU, Dillak RY. Digital color image encryption using RC4 stream cipher and chaotic logistic map. In: Proceedings of international conference on information technology and electrical engineering (ICITEE), IEEE; 2013. pp. 101–5. https://doi.org/10.1109/ICITEED.2013.6676220.

  22. Hanchinamani G, Kulkarni L. An efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher. 3D Res. 2015;6:30. https://doi.org/10.1007/s13319-015-0062-7.

    Article  Google Scholar 

  23. Jin C, Tu Z. A novel color image encryption algorithm using chaotic map and improved RC4. In: Proceedings of advances in intelligent systems and computing. Springer, Cham, vol. 466; 2016. https://doi.org/10.1007/978-3-319-33389-2_1.

  24. Joshi AB, Kumar D, Gaffar A, Mishra DC. Triple color image encryption based on 2D multiple parameter fractional discrete Fourier transform and 3D Arnold transform. Opt Lasers Eng. 2020;333:106139. https://doi.org/10.1016/j.optlaseng.2020.106139.

    Article  Google Scholar 

  25. Joshi AB, Kumar D, Mishra DC, Guleria V. Colour image encryption based on 2D discrete wavelet transform and 3D logistic chaotic map. J Mod Opt. 2020;67(10):933–49. https://doi.org/10.1080/09500340.2020.1789233.

    Article  MathSciNet  Google Scholar 

  26. Thank you Bob Anderson, Cypherpunks (Mailing list). 1994. http://cypherpunks.venona.com/date/1994/09/msg00304.html. Accessed 15 Jul 2021.

  27. Jenkins B. Re: RC4?, Newsgroup: sci.crypt. 1994. https://groups.google.com/forum/#!msg/sci.crypt/JsO3xEATGF-A/wO4ttv7BCYJ. Accessed 15 Jul 2021.

  28. Knuth DE. The art of computer programming. Seminumerical algorithms, vol. 2. Boston: Addison-Wesley Publishing Company; 1981.

    MATH  Google Scholar 

  29. ECRYPT II yearly report on algorithms and keysizes (2011–2012), Editor Nigel Smart (BRIS). 2021.https://www.ecrypt.eu.org/ecrypt2/documents/D.SPA.20.pdf. Accessed 15 Jul 2021.

  30. Stinson DR. Cryptography: theory and practice. Boca Raton: Chapman and Hall CRC; 2006.

    MATH  Google Scholar 

  31. Shannon CE. Communication theory of secrecy systems. Bell Syst Tech J. 1949;28(4):656–715.

    Article  MathSciNet  Google Scholar 

  32. Pearson K. Contributions to the mathematical theory of evolution-II. Skew variation in homogeneous material. Philos Trans R Soc A Math Phys Eng Sci. 1895;186:343–414. https://doi.org/10.1098/rsta.1895.0010.

    Article  Google Scholar 

  33. Pearson K. On the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling. Philos Mag Ser. 1900;50(302):157–75. https://doi.org/10.1080/14786440009463897.

    Article  MATH  Google Scholar 

  34. Cochran WG. The chi-square test of goodness of fit. Ann Math Stat. 1952;23(3):315–45. https://doi.org/10.1214/aoms/1177729380.

    Article  MATH  Google Scholar 

  35. Fisher RA. Statistical methods for research workers. 13th ed. New York: Hafner; 1958.

    MATH  Google Scholar 

  36. Shannon CE. A mathematical theory of communication. Bell Syst Tech J. 1948;27(3):379–423. https://doi.org/10.1002/j.1538-7305.1948.tb01338.x.

    Article  MathSciNet  MATH  Google Scholar 

  37. Abd El-Samie FE, Ahmed HEH, Elashry IF, Shahieen MH, Faragallah OS, El-Rabaie EM, Alshebeili SA. Image encryption: a communication perspective. Boston: CRC Press, Taylor and Francis Group; 2013.

    Book  Google Scholar 

  38. Wu Y, Noonan JP, Agaian S. NPCR and UACI randomness tests for image encryption. J Sel Areas Telecommun. 2011;2011:31–8.

    Google Scholar 

  39. Biham E, Shamir A. Differential cryptanalysis of the Data Encryption Standard (DES). Berlin: Springer; 1993.

    Book  Google Scholar 

Download references

Acknowledgements

The authors would like to thank everyone, who has contributed anyhow in the preparation of this manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdul Gaffar.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This work was supported by UGC (University Grants Commission), New Delhi, India under Grant no. [415024].

This article is part of the topical collection “Progresses in Image Processing” guest-edited by P. Nagabhushan, Peter Peer, Partha Pratim Roy and Satish Kumar Singh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gaffar, A., Joshi, A.B. & Kumar, D. Securing Digital Images using Stream Cipher and MDS Matrix. SN COMPUT. SCI. 2, 462 (2021). https://doi.org/10.1007/s42979-021-00834-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-021-00834-y

Keywords

Navigation