Abstract
The unprecedented advancement in multimedia technology and the upsurge of social networking as an indispensable part of day to day life, has brought forth an unimaginable necessitate for voluminous data transfer over inherently insecure networks. Besides security, another major aspect today is to design lightweight encryption schemes which can perform effectively on hand-held devices like mobiles and provide security as per the requirements of the applications. The standard encryption schemes address the security aspect of only plain textual data and are not suitable for securing voluminous real-time data transfers, having significant level of redundancies, over resource-constrained environments. Focusing on this requirement introduced as the need of the hour, the paper proposes novel lightweight encryption schemes, based on conditional approach, using simple S-Box look-ups, shifting, negation and XORing (standard Exclusive OR) as the basic building blocks. To address the issue of significant redundancy present in the plain text, pixel position has been introduced as one of the parameters in the encryption process. The results of empirical analysis demonstrate the strength of the proposed schemes and they perform equally well for worst case scenarios (white image). The comparative results demonstrate complete removal of redundancies in the proposed cipher with much higher computational efficiency as compared to the standard schemes like AES.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Stinson, D.R.: Cryptography: Theory and Practice, 3rd edn. Chapman & Hall, Boca Raton (2005)
Menezes, A. (ed.): Handbook of Applied Cryptography. CRC-Press, Boca Raton (1996)
Furht, B. (ed.): Encyclopedia of Multimedia. Springer, New York (2005)
Gonzalez, R.C., Woods R.E.: Digital Image Processing, 3rd edn. Prentice Hall, Upper Saddle River (2007)
Leitold, H., Markatos, E.: Communication & multimedia security: In: Proceedings of the 10th IFIP International Conference, LNCS, Springer (2006)
Stallings, W.: Cryptography & Network Security Principles and Practices, 3rd edn. Pearson Education (2004)
Lian, S., Zhang, Y.: Handbook of research on secure multimedia distribution, Information Science Reference, IGI Global (2009)
Lian, S.: Multimedia Content Encryption—Techniques and Applications, pp. 21–42. CRC Press, Taylor & Francis Group, New York (2009)
Kang, X., Peng, A., Xu, X., Cao, X.: Performing scalable lossy compression on pixel encrypted images. EURASIP J. Image Video Process. 2013, 32. http://jivp.eurasipjournals.com/content/2013/1/32
Agrawal, P., Rajpoot, M.: Partial encryption algorithm for secure transmission of multimedia messages. Int. J. Comp. Sci. 3(1), 467–470 (2012)
Lini, A., Neenu, D.: Secure image encryption algorithms: a review. Int. J.Sci. Technol. Res. 2(4) (2013) ISSN 2277-8616
Ahmed, F., Resch, C.L.: Characterizing cryptographic primitives for lightweight digital image encryption. In: Proceeding of Mobile Multimedia/Image Processing, Security, and Applications. SPIE 7351, 73510G, pp. 10G 1–11, (2009)
Dhall, S., Pal S.K.: Design of a new block cipher based on conditional encryption, ITNG 2010. IEEE Computer Society/CPS, IEEE Conference Publishing Services, Las Vegas, pp. 714–718 (2010)
Krishnamurthy, G.N., Ramaswamy, V.: Making AES stronger: AES with key dependent S-box. Int. J. Comput. Sci. Netw. Secur. 8(9), 388–398 (2009)
Abd-ElGhafar, I., Rohiem, A., Diaa, A., Mohammed, F.: Generation of AES key dependent S-boxes using RC4 algorithm. In: 13th International Conference on Aerospace Sciences & Aviation Technology (ASAT–13), 26–28 May 2009
Jing, F., Fei, H.: FAN transform in image scrambling encryption application. (2009) doi:978-1-4244-5668-0/09
Li, B., Xu, J.: Period of Arnold transformation & its application in image scrambling. J. Central South Univ. Technol. 12(1), 278–282 (2005)
Wu, Y., Noonan, JP., Agaian, S.: NPCR and UACI randomness tests for image encryption, cyber journals: multidisciplinary journals in science and technology. J. Sel. Areas Telecommun. (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Dhall, S., Pal, S.K., Sharma, K. (2014). New Lightweight Conditional Encryption Schemes for Multimedia. In: Pant, M., Deep, K., Nagar, A., Bansal, J. (eds) Proceedings of the Third International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 258. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1771-8_32
Download citation
DOI: https://doi.org/10.1007/978-81-322-1771-8_32
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1770-1
Online ISBN: 978-81-322-1771-8
eBook Packages: EngineeringEngineering (R0)