RISC: a robust image symmetric cryptosystem

被引:6
作者
Becheikh, Rabei [1 ]
Omrani, Tasnime [1 ]
Rhouma, Rhouma [1 ]
Belghith, Safya [1 ]
机构
[1] Univ Tunis El Manar, ENIT, RISC Lab, Tunis, Tunisia
关键词
Image cryptosystem; Outer-phase; Inner-phase; Real time transmission; ENCRYPTION SCHEME; CHAOTIC MAPS;
D O I
10.1007/s11042-017-5575-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, AES is known as the excellent choice between the existing symmetric cryptosystems to encrypt binary or text data. However, this standard encryption algorithm is unsuitable for images regarding the particular features of these kinds of data such as high correlation, high redundancy, and voluminosity. Based on this fact, we have designed a new cryptosystem taking into account the aforementioned characteristics which provides high performance and security level. Actually, the cryposystem adopts a new structure named Outer-Inner structure. This new structure consists of two phases: Outer phase and Inner phase. In the former phase, the image is treated as a single block. The purpose of this phase is to address the correlation and the redundancy issue of images. In order to ensure the efficiency and to avoid the problem of treating an image as a single block where several image encryption algorithms suffer from it, this phase only involves lightweight operations. In the later phase the image is treated as a set of fixed blocks. The aim of this phase is to address the voluminosity issue. In fact, during this phase each block can be encrypted independently through an iterative function. The experiment results show that 7 rounds are sufficient to reach an acceptable security level.
引用
收藏
页码:24615 / 24642
页数:28
相关论文
共 16 条
[1]  
Abdullah Hikmat N., 2017, 2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT), P121, DOI 10.1109/CRCSIT.2017.7965545
[2]   Period of the discrete Arnold cat map and general cat map [J].
Bao, Jianghong ;
Yang, Qigui .
NONLINEAR DYNAMICS, 2012, 70 (02) :1365-1375
[3]  
Belazi A, 2015, INT WIREL COMMUN, P611, DOI 10.1109/IWCMC.2015.7289153
[4]   A fast image encryption algorithm based on chaotic map and lookup table [J].
Cheng, Pingguang ;
Yang, Huaqian ;
Wei, Pengcheng ;
Zhang, Wei .
NONLINEAR DYNAMICS, 2015, 79 (03) :2121-2131
[5]  
Feldhofer M., 2005, IEE Proceedings-Information Security, V152, P13, DOI 10.1049/ip-ifs:20055006
[6]  
Feldhofer M., 2004, STRONG AUTHENTICATIO, P357
[7]   A new image encryption scheme based on a chaotic function [J].
Francois, M. ;
Grosges, T. ;
Barchiesi, D. ;
Erra, R. .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2012, 27 (03) :249-259
[8]  
Hämäläinen P, 2006, DSD 2006: 9TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN: ARCHITECTURES, METHODS AND TOOLS, PROCEEDINGS, P577
[9]   Symmetric key image encryption using chaotic Rossler system [J].
Mandal, Mrinal K. ;
Kar, Madhumita ;
Singh, Sandesh K. ;
Barnwal, Vivek K. .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) :2145-2152
[10]   An intertwining chaotic maps based image encryption scheme [J].
Sam, I. Shatheesh ;
Devaraj, P. ;
Bhuvaneswaran, R. S. .
NONLINEAR DYNAMICS, 2012, 69 (04) :1995-2007