Advertisement

Grayscale Image Encryption Based on Symmetric-Key Latin Square Image Cipher (LSIC)

  • V. Pawan KumarEmail author
  • A. R. Aswatha
  • Smitha Sasi
Conference paper
Part of the Lecture Notes in Computational Vision and Biomechanics book series (LNCVB, volume 28)

Abstract

The increased computing power and improving technologies demand the necessity for stronger encryption algorithms. Here we are introducing a new encryption method, Latin Square Image Cipher (LSIC) for grayscale image. This includes Latin square whitening, S-box, P-box and also LSB noise embedding for probabilistic encryption. As a result, using all the above primitives, LSIC is constructed as a Substitution-Permutation Network (SPN) consisting of eight stages of whitening, substitution and permutation using different Latin squares of order 256 at each stage. The proposed method has a good resistance against brute-force attacks, ciphertext attacks and plaintext attacks.

Keywords

LSIC Whitening S-box P-box SPN 

References

  1. 1.
    Yang, M., Bourbakis, N., Li, S.: Data-image-video encryption. Potentials, IEEE 23(3), 28–34 (2004)CrossRefGoogle Scholar
  2. 2.
    Anderson, R., Schneier, B.: Description of a new variable-length key, 64-bit block cipher (Blowfish). ser. Lecture Notes in Computer Science, vol. 809, pp. 191–204. Springer Berlin, Heidelberg (1994)Google Scholar
  3. 3.
    Schneier, B.: The two fish encryption algorithm: a 128-bit block cipher. John Wiley (1999)Google Scholar
  4. 4.
    Data encryption standard: Federal Information Processing Standards Publication 46, (1977)Google Scholar
  5. 5.
    Advanced encryption standard: Federal Information Processing Standards Publication 197, (2001)Google Scholar
  6. 6.
    Stallings, W.: Cryptography and network security: Principles and practice. Upper Saddle River, N.J: Prentice Hall, Print (1999)Google Scholar
  7. 7.
    Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (2010) (compilation and indexing terms, Copyright 2010 Elsevier Inc. 19490005984)Google Scholar
  8. 8.
    Wu, Y., Zhou, Y., J.P. Noonan, Agaian, S., Philip Chen, C.L.: A Novel Latin Square Image Cipher. (2013)Google Scholar
  9. 9.
    Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos, Solitons Fractals 21(3), 749–761 (2004).  https://doi.org/10.1016/j.chaos.2003.12.022 MathSciNetCrossRefzbMATHGoogle Scholar
  10. 10.
    Lin, M., Long, F., Guo, L.: Grayscale image encryption based on Latin square and cellular neural network. IEEE (2016). doi: https://doi.org/10.1109/CCDC.2016.7531456
  11. 11.
    Liao, X., Lai, S., Zhou, Q.: A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process. 90(9), 2714–2722 (2010)CrossRefzbMATHGoogle Scholar
  12. 12.
    Zhu, Z., Zhang, W., Wong, K., Yu, H.: A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf. Sci. 181(6), 1171–1186 (2011)Google Scholar

Copyright information

© Springer International Publishing AG  2018

Authors and Affiliations

  1. 1.Department of Telecommunication EngineeringDayananda Sagar College of EngineeringBangaloreIndia

Personalised recommendations