Design and Analysis of New Shuffle Encryption Schemes for Multimedia
Abstract
Securing the contents of visual data and multimedia requires specific design consideration for use in different applications. The major issue with this type of data has been occurrence of redundancy, at various places particularly in images, which makes data values repetitive at several places. The focus of this paper is on design of new shuffling schemes that can efficiently destroy redundancy in the visual data ensuring its secured transmission and distribution over public networks. Different variants of these shuffling schemes will be used as pre-processing schemes on multimedia data values especially in light weight devices using images. Standard as well as chaotic permutation and substitution schemes together with S-box rotation have been used to shuffle and map the plain data into random uncorrelated values via various variants of the presented schemes. For further improving the security, the processed data is encrypted using a computationally fast algorithm in its normal mode of operation. Security analysis using different types of images show that the proposed schemes satisfy the parameters required for securing visual contents even with very high redundancy.
Defence Science Journal, 2012, 62(1), pp.159-166, DOI:http://dx.doi.org/10.14429/dsj.62.1008
References
Stinson, D.R. Cryptography: Theory and practice. Ed 3rd , 1, Chapman & Hall, 2005.
Menezes, A.J.; Oorschot P.C.van & Vanstone, S. The handbook of applied cryptography, CRC Press, 1997.
Multimedia Design. Encyclopedia of multimedia. Edited by B. Furht. Springer, Berlin, 2006. pp. 834-43.
Advanced Encryption Standard. Stallings, W. Cryptography and network security: Principles and practices. Ed 4th, Pearson Education, 2004. pp. 135-173.
Agrawal, P. & Rajpoot, M. Partial Encryption Algorithm for Secure transmission of Multimedia messages. Int. J. Comp. Sci., 2012, 3(1), 467-70.
Complete Encryption. Lian, S. Multimedia content encryption – Techniques and applications. CRC Press, Taylor & Francis Group, 2009. pp. 21-42.
Lian, S. & Zhang, Y . Handbook of research on secure multimedia distribution. Information Science Reference, IGI Global, 2009.
Ahmed, F. & Resch C.L. Characterizing cryptographic primitives for lightweight digital image encryption. In the Proceeding of Mobile Multimedia/Image Processing, Security, and Applications. SPIE 7351, 73510G, 2009, pp. 10G 1-11
Mitra, Y .V.; Rao, S.R. & Prasanna, S.R.M. A new image encryption approach using combinational permutation techniques. Int. J. Comp. Sci., 2006, 1(2), 127-31.
Li, B. & Xu, J. Period of Arnold Transformation & its application in image Scrambling, J. Central South Univ. Technol., 2005, 12(1), 278-82.
Ma, X.; Fu, C.; Lei, W. & Li, S. A novel chaos based image encryption scheme with an improved permutation process. Int. J. Advancements in Computing Technol., 2011, 3(5), pp. 223-33.
Zou, J.; Ward, R.K. & Qi, D. The generalized fibonacci transform & application to image scrambling. In Proceedings of the ICASSP, 2004, pp. III-385-88.
Nedjah, N. & Mourelle, M.L. Designing substitution boxes for secure cipher. Int. J. Innovative Computing Appl., 2007, 1(1), 86-91.
Shahid, Z.; Chaumont, M. & Puech, W. Selective and scalable encryption of enhancement layers for dyadic scalable H.264/AVC by scrambling of scan patterns. In the Proceedings of the ICIP, Cairo, Egypt, 2009, pp.1273-276.
Fridrich, J. Image encryption based on chaotic map. In the Proceedings of the IEEE International Conference on System, Man and Cybernetics, Orlando, Florida, 1997, 2, 1105-110.
Yang, T.; Wu, C.W. & Chua, L.O. Cryptography based on chaotic systems. IEEE Trans. Circuits Syst. I, Fundam. Theory Appl., 2001, 44(5), 1997, pp. 469-72.
Nien, H.H.; Changchien, S.K.; Wu, S.Y. & Huang, C.K. A new pixel-chaotic-shuffle method for image encryption. In the Proceedings of the International Conference on Control, Automation, Robotics and Vision, Hanoi, 2008, pp. 883-87.
El-Wahed, M.A.; Mesbah, S. & Shoukry, A. Efficiency and security of some image encryption algorithms. In the Proceedings of the World Congress on Engineering, 2008,I, London, U.K.
Wikipedia, Magic Square, http://en.wikipedia.org/wiki/Magic_square [Accessed on 10 July 2010].
Kazlaukas, K. & Kazlaukas, J. Key-dependent S-box generation in AES block cipher system. Informatika, 2009, 20(1), pp. 23-34.
Krishnamurthy, G.N. & Ramaswamy, V. Making AES stronger: AES with key dependent S-box. Int. J. Comp. Sci. Network Secu., 2008, 8(9), pp. 388-98.
Borujeni, S.E. & Eshghi, M. Chaotic image encryption design using tompkins -paige algorithm. In Mathematical Problems in Engineering. Hindwai Publishing Corporation, Online journal , 2009. pp. 1-22.
Standaert, F.X.; Piret, G. & Quasiquater, J.J. Cryptanalysis of block ciphers: A survey. UCL Crypto Group Technical Report Series, Technical Report No. CG-2003/2. http://www.dice.ucl.ac.be/crypto/, [Accessed on 21 August 2011].
Furht, B. & Kirovski, D. Multimedia security handbook. CRC Press, Boca Raton, USA, 2005.
Wu, Y . & Noonan, JP. NPCR and UACI Randomness Tests for Image Encryption. J. Sel. Areas Telecommumn., 2011, 31-38.
Where otherwise noted, the Articles on this site are licensed under Creative Commons License: CC Attribution-Noncommercial-No Derivative Works 2.5 India