Design and Analysis of New Shuffle Encryption Schemes for Multimedia

Securing the contents of visual data and multimedia requires specific design consideration for use in different applications. The major issue with this type of data has been occurrence of redundancy, at various places particularly in images, which makes data values repetitive at several places. The focus of this paper is on design of new shuffling schemes that can efficiently destroy redundancy in the visual data ensuring its secured transmission and distribution over public networks. Different variants of these shuffling schemes will be used as pre-processing schemes on multimedia data values especially in light weight devices using images. Standard as well as chaotic permutation and substitution schemes together with S-box rotation have been used to shuffle and map the plain data into random uncorrelated values via various variants of the presented schemes. For further improving the security, the processed data is encrypted using a computationally fast algorithm in its normal mode of operation. Security analysis using different types of images show that the proposed schemes satisfy the parameters required for securing visual contents even with very high redundancy. Defence Science Journal, 2012, 62(1), pp.159-166 , DOI:http://dx.doi.org/10.14429/dsj.62.1008

[1]  Nadia Nedjah,et al.  Designing substitution boxes for secure ciphers , 2007 .

[2]  Leon O. Chua,et al.  Cryptography based on chaotic systems , 1997 .

[3]  Priyanka Agrawal,et al.  Partial Encryption Algorithm for Secure Transmission of Multimedia Messages , 2012 .

[4]  Kazys Kazlauskas,et al.  Key-Dependent S-Box Generation in AES Block Cipher System , 2009, Informatica.

[5]  Xin Ma,et al.  A Novel Chaos-based Image Encryption Scheme with an Improved Permutation Process , 2011 .

[6]  Rabab Kreidieh Ward,et al.  The generalized Fibonacci transformations and application to image scrambling , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[7]  Abhijit Mitra,et al.  A New Image Encryption Approach using Combinational Permutation Techniques , 2008 .

[8]  Shiguo Lian,et al.  Multimedia Content Encryption: Techniques and Applications , 2008 .

[9]  S. Agaian,et al.  NPCR and UACI Randomness Tests for Image Encryption , 2011 .

[10]  Yan Zhang,et al.  Handbook of Research on Secure Multimedia Distribution , 2009 .

[11]  Shahram Etemadi Borujeni,et al.  Chaotic Image Encryption Design Using Tompkins-Paige Algorithm , 2009 .

[12]  Bing Li,et al.  Period of arnold transformation and its application in image scrambling , 2005 .

[13]  Farid Ahmed,et al.  Characterizing cryptographic primitives for lightweight digital image encryption , 2009, Defense + Commercial Sensing.

[14]  Zafar Shahid,et al.  Selective and scalable encryption of enhancement layers for dyadic scalable H.264/AVC by scrambling of scan patterns , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[15]  J. Fridrich Image encryption based on chaotic maps , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.

[16]  Saleh Mesbah,et al.  Efficiency and Security of Some Image Encryption Algorithms , 2008 .

[17]  N KrishnamurthyG,et al.  Making AES Stronger: AES with Key Dependent S-Box , 2008 .

[18]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[19]  S. K. Changchien,et al.  A new Pixel-Chaotic-Shuffle method for image encryption , 2008, 2008 10th International Conference on Control, Automation, Robotics and Vision.