Skip to main content

Advanced Image Encryption Scheme Using Snow Stream Cipher

  • Conference paper
  • First Online:
Emerging Trends in Electrical, Communications, and Information Technologies

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 569))

Abstract

Image encryption has evolved significantly over the years. This paper proposes an image encryption system using Arnold’s cat map transformation and Snow stream cipher. In our proposed scheme, the image is first scrambled using Arnold’s transformation and then the selected scrambled image pixels are XORed with the Snow cipher keystream sequence to produce the cipher image. Performance of the proposed scheme is analyzed based on several statistical properties. We have observed encouraging statistical properties of the cipher image bitstream making our encryption scheme suitable for applications that requires secured transportation of images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    NESSIE (New European Schemes for Signatures, Integrity and Encryption) was a renowned research project to classify strong cryptographic primitives.

References

  1. eStream: the ECRYPT stream cipher project. http://www.ecrypt.eu.org/stream/

  2. Aïssa B, Nadir D, Mohamed R (2013) Image encryption using stream cipher based on nonlinear combination generator with enhanced security. New Trends Math Sci 1(1):10–19

    Google Scholar 

  3. Arnol’d VI, Avez A (1968) Ergodic problems of classical mechanics

    Google Scholar 

  4. Chen J, Zhu Zl, Zhang LB, Zhang Y, Yang BQ (2018) Exploiting self-adaptive permutation—diffusion and dna random encoding for secure and efficient image encryption. Signal Process 142:340–353

    Article  Google Scholar 

  5. Das P, Deb S, Kar N, Bhattacharya B (2015) An improved DNA based dual cover steganography. Procedia Comput Sci 46:604–611

    Article  Google Scholar 

  6. Deb S, Bhuyan B (2018) Performance evaluation of grain family and espresso ciphers for applications on resource constrained devices. ICT Express 4(1):19–23

    Article  Google Scholar 

  7. Deb S, Bhuyan B, Gupta NC (2018) Design and analysis of LFSR-based stream cipher. In: Proceedings of the international conference on computing and communication systems. Springer, pp 631–639

    Google Scholar 

  8. Ekdahl P, Johansson T (2002) A new version of the stream cipher snow. In: International workshop on selected areas in cryptography. Springer, pp 47–61

    Google Scholar 

  9. Laiphrakpam DS, Khumanthem MS (2018) A robust image encryption scheme based on chaotic system and elliptic curve over finite field. Multimed Tools Appl 77(7):8629–8652

    Article  Google Scholar 

  10. Praveenkumar P, Amirtharajan R, Thenmozhi K, Rayappan JBB (2015) Triple chaotic image scrambling on RGB–a random image encryption approach. Secur Commun Netw 8(18):3335–3345

    Article  Google Scholar 

  11. Shah T, Hussain I, Gondal MA, Mahmood H (2011) Statistical analysis of S-box in image encryption applications based on majority logic criterion. Int J Phys Sci 6(16):4110–4127

    Google Scholar 

  12. Shannon C (1948) A mathematical theory of communication. Bell Syst Tech J 27:376–423, 623–656. Discrepancy and integration of continuous functions. J Approx Theory 52:121–131

    Article  MathSciNet  Google Scholar 

  13. Wang Y, Li T (2010) Study on image encryption algorithm based on arnold transformation and chaotic system. In: 2010 international conference on intelligent system design and engineering application (ISDEA), vol 2. IEEE, pp 449–451

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Subhrajyoti Deb .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Deb, S., Biswas, B., Bhuyan, B. (2020). Advanced Image Encryption Scheme Using Snow Stream Cipher. In: Hitendra Sarma, T., Sankar, V., Shaik, R. (eds) Emerging Trends in Electrical, Communications, and Information Technologies. Lecture Notes in Electrical Engineering, vol 569. Springer, Singapore. https://doi.org/10.1007/978-981-13-8942-9_67

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-8942-9_67

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-8941-2

  • Online ISBN: 978-981-13-8942-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics