Permutation-Substitution architecture based image encryption algorithm using middle square and RC4 PRNG

Anirban Bhowmick, Nishith Sinha, R. Vijaya Arjunan, B. Kishore

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

The growing importance of information security over recent years has prompted development of secure encryption algorithms. Most of the traditional algorithms such as AES and DES are computationally intensive. Hence, in this paper we propose a simple but secure symmetric key encryption algorithm. The image encryption approach makes use of two pseudorandom number generators to encrypt images. Middle Square Algorithm is used to swap the columns of the image followed by the swapping of the rows. This permutation step produces the intermediary cipher image. Subsequently, RC4 algorithm is used to produce a stream of pseudo-random numbers. These numbers are used to substitute the intensity of pixels of the intermediary cipher image, which gives the final encrypted image. Various analysis tests are performed on the quality of the encrypted image. The results of these tests prove that the proposed algorithm is secure and efficient.

Original languageEnglish
Title of host publicationProceedings of the International Conference on Inventive Systems and Control, ICISC 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509047154
DOIs
Publication statusPublished - 13-10-2017
Externally publishedYes
Event2017 International Conference on Inventive Systems and Control, ICISC 2017 - Coimbatore, India
Duration: 19-01-201720-01-2017

Conference

Conference2017 International Conference on Inventive Systems and Control, ICISC 2017
CountryIndia
CityCoimbatore
Period19-01-1720-01-17

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Information Systems
  • Energy Engineering and Power Technology
  • Control and Optimization

Fingerprint Dive into the research topics of 'Permutation-Substitution architecture based image encryption algorithm using middle square and RC4 PRNG'. Together they form a unique fingerprint.

  • Cite this

    Bhowmick, A., Sinha, N., Arjunan, R. V., & Kishore, B. (2017). Permutation-Substitution architecture based image encryption algorithm using middle square and RC4 PRNG. In Proceedings of the International Conference on Inventive Systems and Control, ICISC 2017 [8068729] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICISC.2017.8068729