New Lightweight Conditional Encryption Schemes for Multimedia

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 258)

Abstract

The unprecedented advancement in multimedia technology and the upsurge of social networking as an indispensable part of day to day life, has brought forth an unimaginable necessitate for voluminous data transfer over inherently insecure networks. Besides security, another major aspect today is to design lightweight encryption schemes which can perform effectively on hand-held devices like mobiles and provide security as per the requirements of the applications. The standard encryption schemes address the security aspect of only plain textual data and are not suitable for securing voluminous real-time data transfers, having significant level of redundancies, over resource-constrained environments. Focusing on this requirement introduced as the need of the hour, the paper proposes novel lightweight encryption schemes, based on conditional approach, using simple S-Box look-ups, shifting, negation and XORing (standard Exclusive OR) as the basic building blocks. To address the issue of significant redundancy present in the plain text, pixel position has been introduced as one of the parameters in the encryption process. The results of empirical analysis demonstrate the strength of the proposed schemes and they perform equally well for worst case scenarios (white image). The comparative results demonstrate complete removal of redundancies in the proposed cipher with much higher computational efficiency as compared to the standard schemes like AES.

Keywords

Image encryption S-Box Computational efficiency Avalanche effect 

References

  1. 1.
    Stinson, D.R.: Cryptography: Theory and Practice, 3rd edn. Chapman & Hall, Boca Raton (2005)Google Scholar
  2. 2.
    Menezes, A. (ed.): Handbook of Applied Cryptography. CRC-Press, Boca Raton (1996)Google Scholar
  3. 3.
    Furht, B. (ed.): Encyclopedia of Multimedia. Springer, New York (2005)Google Scholar
  4. 4.
    Gonzalez, R.C., Woods R.E.: Digital Image Processing, 3rd edn. Prentice Hall, Upper Saddle River (2007)Google Scholar
  5. 5.
    Leitold, H., Markatos, E.: Communication & multimedia security: In: Proceedings of the 10th IFIP International Conference, LNCS, Springer (2006)Google Scholar
  6. 6.
    Stallings, W.: Cryptography & Network Security Principles and Practices, 3rd edn. Pearson Education (2004)Google Scholar
  7. 7.
    Lian, S., Zhang, Y.: Handbook of research on secure multimedia distribution, Information Science Reference, IGI Global (2009)Google Scholar
  8. 8.
    Lian, S.: Multimedia Content Encryption—Techniques and Applications, pp. 21–42. CRC Press, Taylor & Francis Group, New York (2009)Google Scholar
  9. 9.
    Kang, X., Peng, A., Xu, X., Cao, X.: Performing scalable lossy compression on pixel encrypted images. EURASIP J. Image Video Process. 2013, 32. http://jivp.eurasipjournals.com/content/2013/1/32
  10. 10.
    Agrawal, P., Rajpoot, M.: Partial encryption algorithm for secure transmission of multimedia messages. Int. J. Comp. Sci. 3(1), 467–470 (2012)Google Scholar
  11. 11.
    Lini, A., Neenu, D.: Secure image encryption algorithms: a review. Int. J.Sci. Technol. Res. 2(4) (2013) ISSN 2277-8616 Google Scholar
  12. 12.
    Ahmed, F., Resch, C.L.: Characterizing cryptographic primitives for lightweight digital image encryption. In: Proceeding of Mobile Multimedia/Image Processing, Security, and Applications. SPIE 7351, 73510G, pp. 10G 1–11, (2009)Google Scholar
  13. 13.
    Dhall, S., Pal S.K.: Design of a new block cipher based on conditional encryption, ITNG 2010. IEEE Computer Society/CPS, IEEE Conference Publishing Services, Las Vegas, pp. 714–718 (2010)Google Scholar
  14. 14.
    Krishnamurthy, G.N., Ramaswamy, V.: Making AES stronger: AES with key dependent S-box. Int. J. Comput. Sci. Netw. Secur. 8(9), 388–398 (2009)Google Scholar
  15. 15.
    Abd-ElGhafar, I., Rohiem, A., Diaa, A., Mohammed, F.: Generation of AES key dependent S-boxes using RC4 algorithm. In: 13th International Conference on Aerospace Sciences & Aviation Technology (ASAT–13), 26–28 May 2009Google Scholar
  16. 16.
    Jing, F., Fei, H.: FAN transform in image scrambling encryption application. (2009) doi:978-1-4244-5668-0/09Google Scholar
  17. 17.
    Li, B., Xu, J.: Period of Arnold transformation & its application in image scrambling. J. Central South Univ. Technol. 12(1), 278–282 (2005)CrossRefGoogle Scholar
  18. 18.
    Wu, Y., Noonan, JP., Agaian, S.: NPCR and UACI randomness tests for image encryption, cyber journals: multidisciplinary journals in science and technology. J. Sel. Areas Telecommun. (2011)Google Scholar

Copyright information

© Springer India 2014

Authors and Affiliations

  1. 1.Jamia Millia Islamia UniversityNew DelhiIndia
  2. 2.Delhi Technological UniversityNew DelhiIndia
  3. 3.Scientific Analysis GroupDRDONew DelhiIndia

Personalised recommendations