Efficient and secure cipher scheme for multimedia contents

The impact of confidentiality and privacy breaches are more pronounced when dealing with multimedia contents. One of the obvious techniques to counter these threats is the use of encryption. A number of algorithms for robust image encryption, targeted for real-time applications with tight resource constraints, has been proposed in the literature. In this paper, first, we analyze two recent cipher schemes for image contents, which are based on two rounds. We show that the schemes are designed to ensure maximum avalanche effect in the whole image by employing the chaining block code mode (CBC) in forward and backward directions. However, they do not lend themselves to parallel implementation and they have a problem with error propagation, which is not desirable for wireless multimedia transmission. As such, we propose to redesign the underlying algorithm to make it practical when used with applications that either suffer from a high error percentage or from real-time constraints. The modified cipher employs the counter mode to eliminate the chaining process (forward and backward), which allows for parallel computations and minimizes the effect of error propagation. According to the security and performance results, the proposed scheme can respond better to the applications and/or system requirements and limitations by ensuring a better performance and an equally high level of security compared to both ciphers in addition to minimum error propagation. To the best of our knowledge, the proposed scheme is the first dynamic key-dependent stream cipher scheme with a pseudo-random key-stream generation for re-ordering of sub-matrices.

[1]  Feng Huang,et al.  Security analysis of image encryption based on twodimensional chaotic maps and improved algorithm , 2009 .

[2]  Mohammed Ghanbari,et al.  Scope of validity of PSNR in image/video quality assessment , 2008 .

[3]  Khumanthem Manglem Singh,et al.  A robust image encryption scheme based on chaotic system and elliptic curve over finite field , 2017, Multimedia Tools and Applications.

[4]  Jason Smith,et al.  SIMON and SPECK: Block Ciphers for the Internet of Things , 2015, IACR Cryptol. ePrint Arch..

[5]  Kyoji Shibutani,et al.  Piccolo: An Ultra-Lightweight Blockcipher , 2011, CHES.

[6]  Rhouma Rhouma,et al.  Cryptanalysis of a new image encryption algorithm based on hyper-chaos , 2008 .

[7]  Ana Cristina Dascalescu,et al.  A new hyperchaotic map and its application in an image encryption scheme , 2014, Signal Process. Image Commun..

[8]  Nicky Mouha,et al.  Report on Lightweight Cryptography , 2017 .

[9]  Ali Chehab,et al.  A new efficient lightweight and secure image cipher scheme , 2017, Multimedia Tools and Applications.

[10]  Shujun Li,et al.  Cryptanalysis of a chaotic image encryption method , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[11]  S. Kyoji,et al.  Piccolo: An Ultra-Lightweight Blockcipher , 2011 .

[12]  Qing Liu,et al.  An Improved Image Encryption Method Based on Total Shuffling Scheme , 2011 .

[13]  Mohammad Reza Mosavi,et al.  A novel image encryption based on hash function with only two-round diffusion process , 2013, Multimedia Systems.

[14]  Manoj Kumar,et al.  FeW: A Lightweight Block Cipher , 2019, IACR Cryptol. ePrint Arch..

[15]  Kazuhiko Minematsu,et al.  $\textnormal{\textsc{TWINE}}$ : A Lightweight Block Cipher for Multiple Platforms , 2012, Selected Areas in Cryptography.

[16]  Xing-yuan Wang,et al.  Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation , 2014 .

[17]  Dharma P. Agrawal,et al.  Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security , 2016 .

[18]  Christophe De Vleeschouwer,et al.  Overview on Selective Encryption of Image and Video: Challenges and Perspectives , 2008, EURASIP J. Inf. Secur..

[19]  Hassan N. Noura,et al.  E3SN: Efficient security scheme for sensor networks , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).

[20]  Sattar Mirzakuchaki,et al.  A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map , 2012, Signal Process..

[21]  Anne Canteaut,et al.  PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version) , 2012, IACR Cryptol. ePrint Arch..

[22]  Wenling Wu,et al.  LBlock: A Lightweight Block Cipher , 2011, ACNS.

[23]  Hassan N. Noura,et al.  An image encryption scheme based on irregularly decimated chaotic maps , 2014, Signal Process. Image Commun..

[24]  Wei Xiang,et al.  Error resilience performance evaluation of H.264 I-frame and JPWL for wireless image transmission , 2010, 2010 4th International Conference on Signal Processing and Communication Systems.

[25]  Hassan N. Noura,et al.  An efficient and secure cipher scheme for images confidentiality preservation , 2016, Signal Process. Image Commun..

[26]  Lars R. Knudsen,et al.  Provable security against a differential attack , 1994, Journal of Cryptology.

[27]  Xingyuan Wang,et al.  Cryptanalysis on a novel image encryption method based on total shuffling scheme , 2011 .

[28]  S. Li,et al.  Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption , 2009 .

[29]  Rafat Parveen,et al.  Wavelet based partial image encryption , 2009, 2009 International Multimedia, Signal Processing and Communication Technologies.

[30]  Rengarajan Amirtharajan,et al.  Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller , 2018, Microprocess. Microsystems.

[31]  Tinku Acharya,et al.  Image Processing: Principles and Applications , 2005, J. Electronic Imaging.

[32]  Zhu Wang,et al.  A new feedback image encryption scheme based on perturbation with dynamical compound chaotic sequence cipher generator , 2009 .

[33]  Safya Belghith,et al.  Cryptanalysis of a new substitution–diffusion based image cipher , 2010 .

[34]  John Kelsey,et al.  Recommendation for Random Number Generation Using Deterministic Random Bit Generators , 2014 .

[35]  D. Okada,et al.  Digital Image Processing for Medical Applications , 2009 .

[36]  Stefan Mangard,et al.  An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order , 2017, CT-RSA.

[37]  Yinglong Wang,et al.  Cryptanalysis of Two Chaotic Image Encryption Schemes Based on Permutation and XOR Operations , 2008, 2008 International Conference on Computational Intelligence and Security.

[38]  Hassan N. Noura,et al.  ERDIA: An efficient and robust data integrity algorithm for mobile and wireless networks , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).

[39]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[40]  Anil Kumar,et al.  Improved Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map , 2010, ICISTM.

[41]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[42]  Zhijian Wang,et al.  An Improved Piecewise Linear Chaotic Map Based Image Encryption Algorithm , 2014, TheScientificWorldJournal.

[43]  Bhaskar Mondal,et al.  A light weight secure image encryption scheme based on chaos & DNA computing , 2017, J. King Saud Univ. Comput. Inf. Sci..

[44]  Daesung Kwon,et al.  LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors , 2013, WISA.

[45]  Mahmoud Al-Ayyoub,et al.  Improving the performance of the needleman-wunsch algorithm using parallelization and vectorization techniques , 2017, Multimedia Tools and Applications.

[46]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[47]  Hassan N. Noura,et al.  EDCA: Efficient diffusion cipher and authentication scheme for Wireless Sensor Networks , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[48]  Kwok-Tung Lo,et al.  Breaking an Image Encryption Algorithm Based on Chaos , 2010, Int. J. Bifurc. Chaos.

[49]  Thomas Peyrin,et al.  The LED Block Cipher , 2011, IACR Cryptol. ePrint Arch..

[50]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[51]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[52]  Sang-Soo Yeo,et al.  Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value , 2011, Comput. Commun..

[53]  Wolfgang A. Halang,et al.  Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm , 2007, ArXiv.

[54]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[55]  B. B. Gupta,et al.  Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain , 2017, Multimedia Tools and Applications.

[56]  Amir Akhavan,et al.  A novel scheme for image encryption based on 2D piecewise chaotic maps , 2010 .

[57]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[58]  Eli Biham,et al.  Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.

[59]  Sean O'Melia,et al.  Enhancing the Performance of Symmetric-Key Cryptography via Instruction Set Extensions , 2010, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[60]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[61]  Shay Gueron,et al.  Intel's New AES Instructions for Enhanced Performance and Security , 2009, FSE.