A secure image encryption algorithm using LFSR and RC4 key stream generator

B. Mondal, Nishith Sinha, T. Mandal

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

Abstract

The increasing importance of security of multimedia data has prompted greater attention towards secure image encryption algorithms. In this paper, the authors propose a highly secure encryption algorithm with permutation-substitution architecture. In the permutation step, image pixels of the plain image are shuffled using Linear Feedback Shift Register (LFSR). The output of this step is an intermediary cipher image which is of the same size as that of the plain image. In the substitution step, sequence of random numbers is generated using the RC4 key stream generator which is XORed with the pixel value of the intermediary cipher image to produce the final cipher image. Experimental results and security analysis of the proposed scheme show that the proposed scheme is efficient and secure.

Original languageEnglish
Title of host publicationProceedings of 3rd International Conference on Advanced Computing, Networking and Informatics, ICACNI 2015
PublisherSpringer Science and Business Media Deutschland GmbH
Pages227-237
Number of pages11
ISBN (Print)9788132225379
DOIs
Publication statusPublished - 01-01-2016
Externally publishedYes
Event3rd International Conference on Advanced Computing, Networking and Informatics, ICACNI 2015 - Bhubaneshwar, India
Duration: 23-06-201525-06-2015

Publication series

NameSmart Innovation, Systems and Technologies
Volume43
ISSN (Print)2190-3018
ISSN (Electronic)2190-3026

Conference

Conference3rd International Conference on Advanced Computing, Networking and Informatics, ICACNI 2015
Country/TerritoryIndia
CityBhubaneshwar
Period23-06-1525-06-15

All Science Journal Classification (ASJC) codes

  • Decision Sciences(all)
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'A secure image encryption algorithm using LFSR and RC4 key stream generator'. Together they form a unique fingerprint.

Cite this