TY - GEN
T1 - Permutation-Substitution architecture based image encryption algorithm using middle square and RC4 PRNG
AU - Bhowmick, Anirban
AU - Sinha, Nishith
AU - Arjunan, R. Vijaya
AU - Kishore, B.
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/10/13
Y1 - 2017/10/13
N2 - The growing importance of information security over recent years has prompted development of secure encryption algorithms. Most of the traditional algorithms such as AES and DES are computationally intensive. Hence, in this paper we propose a simple but secure symmetric key encryption algorithm. The image encryption approach makes use of two pseudorandom number generators to encrypt images. Middle Square Algorithm is used to swap the columns of the image followed by the swapping of the rows. This permutation step produces the intermediary cipher image. Subsequently, RC4 algorithm is used to produce a stream of pseudo-random numbers. These numbers are used to substitute the intensity of pixels of the intermediary cipher image, which gives the final encrypted image. Various analysis tests are performed on the quality of the encrypted image. The results of these tests prove that the proposed algorithm is secure and efficient.
AB - The growing importance of information security over recent years has prompted development of secure encryption algorithms. Most of the traditional algorithms such as AES and DES are computationally intensive. Hence, in this paper we propose a simple but secure symmetric key encryption algorithm. The image encryption approach makes use of two pseudorandom number generators to encrypt images. Middle Square Algorithm is used to swap the columns of the image followed by the swapping of the rows. This permutation step produces the intermediary cipher image. Subsequently, RC4 algorithm is used to produce a stream of pseudo-random numbers. These numbers are used to substitute the intensity of pixels of the intermediary cipher image, which gives the final encrypted image. Various analysis tests are performed on the quality of the encrypted image. The results of these tests prove that the proposed algorithm is secure and efficient.
UR - https://www.scopus.com/pages/publications/85037125870
UR - https://www.scopus.com/inward/citedby.url?scp=85037125870&partnerID=8YFLogxK
U2 - 10.1109/ICISC.2017.8068729
DO - 10.1109/ICISC.2017.8068729
M3 - Conference contribution
AN - SCOPUS:85037125870
T3 - Proceedings of the International Conference on Inventive Systems and Control, ICISC 2017
BT - Proceedings of the International Conference on Inventive Systems and Control, ICISC 2017
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2017 International Conference on Inventive Systems and Control, ICISC 2017
Y2 - 19 January 2017 through 20 January 2017
ER -