Design and Analysis of New Shuffle Encryption Schemes for Multimedia

  • Rajan Gupta University of Delhi, Delhi
  • Ankur Aggarwal University of Delhi, Delhi
  • Saibal K. Pal Scientific Analysis Group, DRDO
Keywords: Multimedia security, shuffle, S-box, chaotic encryption, security analysis


Securing the contents of visual data and multimedia requires specific design consideration for use in different applications. The major issue with this type of data has been occurrence of redundancy, at various places particularly in images, which makes data values repetitive at several places. The focus of this paper is on design of new shuffling schemes that can efficiently destroy redundancy in the visual data ensuring its secured transmission and distribution over public networks. Different variants of these shuffling schemes will be used as pre-processing schemes on multimedia data values especially in light weight devices using images. Standard as well as chaotic permutation and substitution schemes together with S-box rotation have been used to shuffle and map the plain data into random uncorrelated values via various variants of the presented schemes. For further improving the security, the processed data is encrypted using a computationally fast algorithm in its normal mode of operation. Security analysis using different types of images show that the proposed schemes satisfy the parameters required for securing visual contents even with very high redundancy.

Defence Science Journal, 2012, 62(1), pp.159-166, DOI:

Author Biographies

Rajan Gupta, University of Delhi, Delhi
Mr Rajan Gupta completed his postgraduation studies in Computer Science from University of Delhi in 2011 and post-graduate program in Management from IMT, Ghaziabad and is presently pursuing his PhD. He is currently associated with University of Delhi as a Guest Faculty. His area of interest includes: cryptography, multimedia and operating system in technical area and marketing research in  management area. He has over 10 research publications under his name in different areas of Technology and Management Studies.
Ankur Aggarwal, University of Delhi, Delhi
Mr Ankur Aggarwal completed his postgraduation studies in Computer Science from University of Delhi in 2011. He is presently working with ONE97 Company. His area of interest includes: Cryptography,
multimedia and mobile services. He has presented his work at both national and international forums and has 2 publications under his name in Multimedia area.
Saibal K. Pal, Scientific Analysis Group, DRDO
Mr Saibal K. Pal completed his postgraduation studies in Computer Science from University of Allahabad in 1990 and PhD (Information Security) from University of Delhi. He is presently working as Scientist ‘F’ at Scientific Analysis Group, Delhi. His areas of interest include: Cryptography & network security, multimedia & signal processing, computational intelligence & data mining. He has over 100 research publications in different areas of science, technology & management studies.


Stinson, D.R. Cryptography: Theory and practice. Ed 3rd , 1, Chapman & Hall, 2005.

Menezes, A.J.; Oorschot P.C.van & Vanstone, S. The handbook of applied cryptography, CRC Press, 1997.

Multimedia Design. Encyclopedia of multimedia. Edited by B. Furht. Springer, Berlin, 2006. pp. 834-43.

Advanced Encryption Standard. Stallings, W. Cryptography and network security: Principles and practices. Ed 4th, Pearson Education, 2004. pp. 135-173.

Agrawal, P. & Rajpoot, M. Partial Encryption Algorithm for Secure transmission of Multimedia messages. Int. J. Comp. Sci., 2012, 3(1), 467-70.

Complete Encryption. Lian, S. Multimedia content encryption – Techniques and applications. CRC Press, Taylor & Francis Group, 2009. pp. 21-42.

Lian, S. & Zhang, Y . Handbook of research on secure multimedia distribution. Information Science Reference, IGI Global, 2009.

Ahmed, F. & Resch C.L. Characterizing cryptographic primitives for lightweight digital image encryption. In the Proceeding of Mobile Multimedia/Image Processing, Security, and Applications. SPIE 7351, 73510G, 2009, pp. 10G 1-11

Mitra, Y .V.; Rao, S.R. & Prasanna, S.R.M. A new image encryption approach using combinational permutation techniques. Int. J. Comp. Sci., 2006, 1(2), 127-31.

Li, B. & Xu, J. Period of Arnold Transformation & its application in image Scrambling, J. Central South Univ. Technol., 2005, 12(1), 278-82.

Ma, X.; Fu, C.; Lei, W. & Li, S. A novel chaos based image encryption scheme with an improved permutation process. Int. J. Advancements in Computing Technol., 2011, 3(5), pp. 223-33.

Zou, J.; Ward, R.K. & Qi, D. The generalized fibonacci transform & application to image scrambling. In Proceedings of the ICASSP, 2004, pp. III-385-88.

Nedjah, N. & Mourelle, M.L. Designing substitution boxes for secure cipher. Int. J. Innovative Computing Appl., 2007, 1(1), 86-91.

Shahid, Z.; Chaumont, M. & Puech, W. Selective and scalable encryption of enhancement layers for dyadic scalable H.264/AVC by scrambling of scan patterns. In the Proceedings of the ICIP, Cairo, Egypt, 2009, pp.1273-276.

Fridrich, J. Image encryption based on chaotic map. In the Proceedings of the IEEE International Conference on System, Man and Cybernetics, Orlando, Florida, 1997, 2, 1105-110.

Yang, T.; Wu, C.W. & Chua, L.O. Cryptography based on chaotic systems. IEEE Trans. Circuits Syst. I, Fundam. Theory Appl., 2001, 44(5), 1997, pp. 469-72.

Nien, H.H.; Changchien, S.K.; Wu, S.Y. & Huang, C.K. A new pixel-chaotic-shuffle method for image encryption. In the Proceedings of the International Conference on Control, Automation, Robotics and Vision, Hanoi, 2008, pp. 883-87.

El-Wahed, M.A.; Mesbah, S. & Shoukry, A. Efficiency and security of some image encryption algorithms. In the Proceedings of the World Congress on Engineering, 2008,I, London, U.K.

Wikipedia, Magic Square, [Accessed on 10 July 2010].

Kazlaukas, K. & Kazlaukas, J. Key-dependent S-box generation in AES block cipher system. Informatika, 2009, 20(1), pp. 23-34.

Krishnamurthy, G.N. & Ramaswamy, V. Making AES stronger: AES with key dependent S-box. Int. J. Comp. Sci. Network Secu., 2008, 8(9), pp. 388-98.

Borujeni, S.E. & Eshghi, M. Chaotic image encryption design using tompkins -paige algorithm. In Mathematical Problems in Engineering. Hindwai Publishing Corporation, Online journal , 2009. pp. 1-22.

Standaert, F.X.; Piret, G. & Quasiquater, J.J. Cryptanalysis of block ciphers: A survey. UCL Crypto Group Technical Report Series, Technical Report No. CG-2003/2., [Accessed on 21 August 2011].

Furht, B. & Kirovski, D. Multimedia security handbook. CRC Press, Boca Raton, USA, 2005.

Wu, Y . & Noonan, JP. NPCR and UACI Randomness Tests for Image Encryption. J. Sel. Areas Telecommumn., 2011, 31-38.

How to Cite
Gupta, R., Aggarwal, A., & Pal, S. (2012). Design and Analysis of New Shuffle Encryption Schemes for Multimedia. Defence Science Journal, 62(3), 159-166.
Computers & Systems Studies