Image encryption using HC-128 and HC-256 stream ciphers

In this paper, we surveyed HC-128 and HC-256 as methods for protecting the distribution of digital images in an efficient and secure way. We proposed the Hongjun Cipher (HC) image encryption algorithm based on column-wise raster scanning of the plain image. Then, we performed a series of tests and some comparisons to justify the efficiency of surveyed algorithms for image encryption. These tests included key space analysis, visual test and histogram analysis, randomness analysis, information entropy, encryption quality, correlation analysis, differential analysis, sensitivity analysis and performance analysis. Based on all analysis and experimental results, it can be concluded that the two variants of HC scheme are efficient, feasible and trustworthy to be adopted for image encryption.

[1]  A. Pisarchik,et al.  Image encryption with chaotically coupled chaotic maps , 2008 .

[2]  Vinod Patidar,et al.  A new substitution–diffusion based image cipher using chaotic standard and logistic maps , 2009 .

[3]  Alireza Jolfaei,et al.  Survey: image encryption using Salsa20 , 2010 .

[4]  Pierre L'Ecuyer,et al.  TestU01: A C library for empirical testing of random number generators , 2006, TOMS.

[5]  Kamel Faraoun Chaos-Based Key Stream Generator Based on Multiple Maps Combinations and its Application to Images Encryption , 2010, Int. Arab J. Inf. Technol..

[6]  Zhengquan Xu,et al.  An Improved Image Encryption Algorithm based on Chaotic System , 2009, J. Comput..

[7]  Zhang Jia-shu,et al.  A novel chaotic stream cipher and its application to palmprint template protection , 2010 .

[8]  S. Li,et al.  Breaking an encryption scheme based on chaotic baker map , 2004, Physics Letters.

[9]  Alireza Jolfaei,et al.  A Novel Image Encryption Scheme Using Pixel Shuffler and A5/1 , 2010, 2010 International Conference on Artificial Intelligence and Computational Intelligence.

[10]  Alireza Jolfaei,et al.  A new approach to measure quality of image encryption , 2010 .

[11]  David Arroyo Guardeño Framework for the analysis and design of encryption strategies based on discrete-time chaotic dynamical systems , 2009 .

[12]  Alireza Jolfaei,et al.  Image Encryption Using Chaos and Block Cipher , 2010, Comput. Inf. Sci..

[13]  Abdolrasoul Mirghadri,et al.  Substitution-permutation based image cipher using chaotic Henon and Baker’s maps , 2011 .

[14]  Alireza Jolfaei,et al.  Survey: Image Encryption Using A5/1 and W7 , 2010 .

[15]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[16]  Hyoungshick Kim,et al.  An image encryption scheme with a pseudorandom permutation based on chaotic maps , 2010 .

[17]  Alireza Jolfaei,et al.  An applied imagery encryption algorithm based on shuffling and baker's map , 2010 .

[18]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[19]  Shahram Etemadi Borujeni,et al.  Chaotic Image Encryption Design Using Tompkins-Paige Algorithm , 2009 .

[20]  ALIREZA JOLFAEI,et al.  An image encryption approach using chaos and stream cipher , 2010 .

[21]  Amir Akhavan,et al.  A novel scheme for image encryption based on 2D piecewise chaotic maps , 2010 .

[22]  W. Tang,et al.  A fast image encryption system based on chaotic maps with finite precision representation , 2007 .

[23]  Chengqing Li On the security of some multimedia encryption schemes , 2008 .

[24]  Hongjun Wu,et al.  The Stream Cipher HC-128 , 2008, The eSTREAM Finalists.

[25]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[26]  Ismail Amr Ismail,et al.  A Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps , 2010, Int. J. Netw. Secur..