Random-bit sequence generation from image data

被引:4
作者
Alsultanny, Yas Abbas [1 ]
机构
[1] Arabian Gulf Univ, Technol Management Programme, Coll Grad Studies, Manama, Bahrain
关键词
image encryption; randomness bit generation; CBC model; ECB mode;
D O I
10.1016/j.imavis.2007.07.008
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The random number generated is very important in constructing encryption keys together with the other algorithm parameters. A new approach is proposed to generate a random-bit sequence with a high level of randomness. The five statistical test, Frequency, Serial, Poker, Runs and Autocorrelation are used to test the proposed algorithm, the results showed that 79% of the generated sequences can pass all of the five statistical tests together, and 94% of the generated sequences pass at least four of the statistical tests, which means the proposed algorithm can generate bit sequence with a high degree of randomness. The degree of encryption increased as the randomness level increased. Three hypotheses are suggested and tested in this paper. One of these hypotheses proved that by using CBC mode of encryption, the randomness level of the key have no significant effect on the degree of encryption. By using ECB mode, the encryption level has significant effect by using different levels of randomness key, the minimum key length gave good degree of encryption is 32 bit, which proved that the mode of image encryption determined the degree of image encryption, and some modes such as ECB of encryption depends on the level of randomness of the key, and this was proved by testing tens of images rated from simple images to complex images, such as the satellite image processed in this paper. (C) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:592 / 601
页数:10
相关论文
共 9 条
[1]  
Alfred J., 1997, HDB APPL CRYPTOGRAPH
[2]  
Alsultanny Y., 2005, JORDAN J APPL SCI
[3]  
ALSULTANNY Y, 2007, INT J INN COMP INF C, V1
[4]  
ALSULTANNY Y, 2004, EMB SIGN PROC C GSPX
[5]  
ALSULTANNY Y, 2004, P 1 INT C TECHN INF, P49
[6]  
Douglas R.S., 1995, CRYPTOGRAPHY THEORY
[7]  
JOHN E, 2003, CRYPTOGRAPHY DEMYSTI
[8]  
Schneier B, 1996, APPL CRYPTOGRAPHY
[9]  
Stallings W., 2003, CRYPTOGRAPHY NETWORK