Advertisement

A new efficient and configurable image encryption structure for secure transmission

  • Walid I. KhedrEmail author
Article
  • 30 Downloads

Abstract

This paper presents a novel robust symmetric image encryption structure (IES) based on stream ciphers and perceptual hashing for secure image transmission over public networks. The main design objectives of the proposed structure are to utilize, without modifications, any stream ciphers, and perceptual hash functions, easy replaceability of both stream cipher and hashing algorithms, preserve the original performance of the embedded algorithms and to retain all the security of the underlying algorithms. In the proposed structure, a one-time session key is generated from both the image and a pre-shared key between the sender and the recipient of the image. This one-time session key is used by a stream cipher to encrypt the image, which achieves high plaintext sensitivity (diffusion) and high key sensitivity (confusion). To achieve the robustness property of the proposed structure against incidental modifications of the encrypted image, a one-time key encryption key (KEK) is generated from both the perceptual hash of the encrypted image and the pre-shared key. The KEK is used to encrypt the one-time session key which is then embedded into the encrypted image. To demonstrate the efficiency and the robustness of the proposed IES, an image encryption algorithm based on the IES is proposed. Experimental results demonstrate the high security, low complexity and high speed of the proposed IES.

Keywords

Image encryption Stream ciphers Image hashing Privacy Security 

Notes

References

  1. 1.
    (2017) Security analysis of ChaCha20-Poly1305 AEAD. Technical Report. KDDI Research, Inc. http://www.cryptrec.go.jp/estimation/cryptrec-ex-2601-2016.pdf. Accessed 17 Nov 2018
  2. 2.
    Aissa B, Nadir D, Ammar M (2014) An approach using stream cipher algorithm for image encryption and decryption. In: 2014 15th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA), p 498–503Google Scholar
  3. 3.
    Ashur T, Dunkelman O, Luykx A (2017) Boosting authenticated encryption robustness with minimal modifications. Springer International Publishing, Cham, p 3–33Google Scholar
  4. 4.
    Aumasson J-P, Meier W, Phan RC-W, Henzen L (2014) The hash function BLAKE. Springer, BerlinCrossRefGoogle Scholar
  5. 5.
    Bahrami S, Naderi M (2012) Image encryption using a lightweight stream encryption algorithm. Advances in Multimedia 2012:8.  https://doi.org/10.1155/2012/767364
  6. 6.
    Boyd C, Mathuria A (2013) Protocols for authentication and key establishment. Springer Science & Business Media, BerlinzbMATHGoogle Scholar
  7. 7.
    Chen Z, Hu T (2014) Statistical test for bivariate uniformity. Advances in Statistics 2014:1–6.  https://doi.org/10.1155/2014/740831
  8. 8.
    Chen J-x, Zhu Z-l, Yu H (2014) A fast chaos-based symmetric image cryptosystem with an improved diffusion scheme. Optik 125:2472–2478CrossRefGoogle Scholar
  9. 9.
    Chen J-x, Zhu Z-l, Fu C, Zhang L-b, Zhang Y (2015) An efficient image encryption scheme using lookup table-based confusion and diffusion. Nonlinear Dynamics 81(3):1151–1166.  https://doi.org/10.1007/s11071-015-2057-6
  10. 10.
    Cheng H, Huang C, Ding Q, Chu S-C (2014) An efficient image encryption scheme based on ZUC stream cipher and chaotic logistic map. In: J.-S. Pan, V. Snasel, E. S. Corchado, A. Abraham, & S.-L. Wang Intelligent Data analysis and its Applications, Volume II. Springer InternationalPublishing, Cham, p 301–310Google Scholar
  11. 11.
    Chunguang H, Hai C, Yu S, Qun D (2015) Permutation of image encryption system based on block cipher and stream cipher encryption algorithm. In: Third International Conference on Robot, Vision and Signal Processing (RVSP), p 163–166Google Scholar
  12. 12.
    Daemen J, Rijmen V (2013) The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media, BerlinzbMATHGoogle Scholar
  13. 13.
    Das A (2015) Guide to signals and patterns in image processing: foundations, methods and applications. Springer, BerlinCrossRefGoogle Scholar
  14. 14.
    Diab H (2018) An efficient chaotic image cryptosystem based on simultaneous permutation and diffusion operations. IEEE Access 6:42227–42244.  https://doi.org/10.1109/ACCESS.2018.2858839
  15. 15.
    Etemadi Borujeni S, Eshghi M (2013) Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommun Syst 52:525–537Google Scholar
  16. 16.
    Faragallah OS, El-Samie FEA, Ahmed HEH, Elashry IF, Shahieen MH, El-Rabaie E-SM et al (2013) Image encryption: a communication perspective. CRC Press, Boca RatonGoogle Scholar
  17. 17.
    Fei M, Ju Z, Zhen X, Li J (2017) Real-time visual tracking based on improved perceptual hashing. Multimed Tools Appl 76:4617–4634CrossRefGoogle Scholar
  18. 18.
    Hadmi A, Puech W, Said BAE, Ouahman AA (2012) Perceptual image hashing. Watermarking, Mithun Das Gupta, IntechOpen.  https://doi.org/10.5772/37435. Available from: https://www.intechopen.com/books/watermarking-volume-2/perceptual-image-hashing. Accessed 17 Nov 2018
  19. 19.
    ISO-16684-1 (2012) Graphic technology -- extensible metadata platform (XMP) specification -- Part 1: Data model, serialization and core propertiesGoogle Scholar
  20. 20.
    Jallouli O, Assad SE, Chetto M, Lozi R (2018) Design and analysis of two stream ciphers based on chaotic coupling and multiplexing techniques. Multimed Tools Appl 77:13391–13417CrossRefGoogle Scholar
  21. 21.
    Kaur M, Kumar V (2018) Adaptive differential evolution-based Lorenz chaotic system for image encryption. Arab J Sci Eng 43(12):8127–8144.  https://doi.org/10.1007/s13369-018-3355-3
  22. 22.
    Kim H, Han J, Cho S (2007) An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices. Presented at the Proceedings of the 2007 ACM symposium on Applied computing, Seoul, KoreaGoogle Scholar
  23. 23.
    Klinger E, Starkweather D (2018) pHash–the open source perceptual hash library. Available: www.phash.org
  24. 24.
    Kumari M, Gupta S (2018) A novel image encryption scheme based on intertwining chaotic maps and RC4 stream cipher. 3D Res 9:10CrossRefGoogle Scholar
  25. 25.
    Kunze J, Baker T (2007) The Dublin core metadata element set: RFC 5013. IETF, CaliforniaCrossRefGoogle Scholar
  26. 26.
    Kwok HS, Tang WKS (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons Fractals 32:1518–1529MathSciNetCrossRefGoogle Scholar
  27. 27.
    Liu H, Xiao D, Xiao Y, Zhang Y (2016) Robust image hashing with tampering recovery capability via low-rank and sparse representation. Multimed Tools Appl 75(13):7681–7696.  https://doi.org/10.1007/s11042-015-2688-0
  28. 28.
    Nir Y, Langley A (2015) RFC 7539: ChaCha20 and Poly1305 for IETF ProtocolsGoogle Scholar
  29. 29.
    Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2014) A novel image encryption based on hash function with only two-round diffusion proces. Multimedia Systems 20:45–64CrossRefGoogle Scholar
  30. 30.
    Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2015) A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed Tools Appl 74:781–811CrossRefGoogle Scholar
  31. 31.
    Saarinen M-J, Aumasson J-P (2015) The BLAKE2 cryptographic hash and message authentication code (MAC):IETF RFC 7693. Internet Engineering Task Force.  https://doi.org/10.17487/RFC7693
  32. 32.
    Saraswathi PV, Venkatesulu M (2017) A novel stream cipher using pesudo random binary sequence generator for medical image encryption. In: 2017 International Conference on Trends in Electronics and Informatics (ICEI), p 425–429Google Scholar
  33. 33.
    Sreelaja NK, Vijayalakshmi Pai GA (2012) Stream cipher for binary image encryption using ant Colony optimization based key generation. Appl Soft Comput 12:2879–2895CrossRefGoogle Scholar
  34. 34.
    Stallings W (2016) Cryptography and network security: principles and practice. Pearson, LondonGoogle Scholar
  35. 35.
    Wang X, Zhu X, Zhang Y (2018) An image encryption algorithm based on Josephus traversing and mixed chaotic map. IEEE Access 6:23733–23746.  https://doi.org/10.1109/ACCESS.2018.2805847
  36. 36.
    Watson AB (1994) Image compression using the discrete cosine transform. Mathematica Journal 4(1):81Google Scholar
  37. 37.
    Weber A The USC-SIPI image database volume 3: miscellaneous [Online]. Available: http://sipi.usc.edu/database/database.php?volume=misc
  38. 38.
    Wong K-W, Kwok BS-H, Law W-S (2008) A fast image encryption scheme based on chaotic standard map. Phys Lett A 372:2645–2652CrossRefGoogle Scholar
  39. 39.
    Wong K-W, Kwok BS-H, Yuen C-H (2009) An efficient diffusion approach for chaos-based image encryption. Chaos, Solitons Fractals 41:2652–2663CrossRefGoogle Scholar
  40. 40.
    www.bouncycastle.org (2018) The Legion of the Bouncy Castle Java cryptography APIsGoogle Scholar
  41. 41.
    Xiao D, Chang Y, Xiang T, Bai S (2017) A watermarking algorithm in encrypted image based on compressive sensing with high quality image reconstruction and watermark performance. Multimed Tools Appl 76:9265–9296CrossRefGoogle Scholar
  42. 42.
    Xu M, Tian Z (2018) A novel image encryption algorithm based on self-orthogonal Latin squares. Optik 171:891–903CrossRefGoogle Scholar
  43. 43.
    Zhang Y, Tang Y (2018) A plaintext-related image encryption algorithm based on chaos. Multimed Tools Appl 77:6647–6669CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Faculty of Computers and InformaticsZagazig UniversityZagazigEgypt

Personalised recommendations