Permutation-Substitution architecture based image encryption algorithm using middle square and RC4 PRNG

Anirban Bhowmick, Nishith Sinha, R. Vijaya Arjunan, B. Kishore

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

The growing importance of information security over recent years has prompted development of secure encryption algorithms. Most of the traditional algorithms such as AES and DES are computationally intensive. Hence, in this paper we propose a simple but secure symmetric key encryption algorithm. The image encryption approach makes use of two pseudorandom number generators to encrypt images. Middle Square Algorithm is used to swap the columns of the image followed by the swapping of the rows. This permutation step produces the intermediary cipher image. Subsequently, RC4 algorithm is used to produce a stream of pseudo-random numbers. These numbers are used to substitute the intensity of pixels of the intermediary cipher image, which gives the final encrypted image. Various analysis tests are performed on the quality of the encrypted image. The results of these tests prove that the proposed algorithm is secure and efficient.

Original languageEnglish
Title of host publicationProceedings of the International Conference on Inventive Systems and Control, ICISC 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509047154
DOIs
Publication statusPublished - 13-10-2017
Externally publishedYes
Event2017 International Conference on Inventive Systems and Control, ICISC 2017 - Coimbatore, India
Duration: 19-01-201720-01-2017

Conference

Conference2017 International Conference on Inventive Systems and Control, ICISC 2017
CountryIndia
CityCoimbatore
Period19-01-1720-01-17

Fingerprint

Image Encryption
Cryptography
Substitution
Permutation
Substitution reactions
Encryption
Pseudorandom numbers
Pseudorandom number Generator
Swap
Information Security
Security of data
Substitute
Architecture
Pixel
Pixels

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Information Systems
  • Energy Engineering and Power Technology
  • Control and Optimization

Cite this

Bhowmick, A., Sinha, N., Arjunan, R. V., & Kishore, B. (2017). Permutation-Substitution architecture based image encryption algorithm using middle square and RC4 PRNG. In Proceedings of the International Conference on Inventive Systems and Control, ICISC 2017 [8068729] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICISC.2017.8068729
Bhowmick, Anirban ; Sinha, Nishith ; Arjunan, R. Vijaya ; Kishore, B. / Permutation-Substitution architecture based image encryption algorithm using middle square and RC4 PRNG. Proceedings of the International Conference on Inventive Systems and Control, ICISC 2017. Institute of Electrical and Electronics Engineers Inc., 2017.
@inproceedings{13b3c968fe4646a9bef45d193f65cafe,
title = "Permutation-Substitution architecture based image encryption algorithm using middle square and RC4 PRNG",
abstract = "The growing importance of information security over recent years has prompted development of secure encryption algorithms. Most of the traditional algorithms such as AES and DES are computationally intensive. Hence, in this paper we propose a simple but secure symmetric key encryption algorithm. The image encryption approach makes use of two pseudorandom number generators to encrypt images. Middle Square Algorithm is used to swap the columns of the image followed by the swapping of the rows. This permutation step produces the intermediary cipher image. Subsequently, RC4 algorithm is used to produce a stream of pseudo-random numbers. These numbers are used to substitute the intensity of pixels of the intermediary cipher image, which gives the final encrypted image. Various analysis tests are performed on the quality of the encrypted image. The results of these tests prove that the proposed algorithm is secure and efficient.",
author = "Anirban Bhowmick and Nishith Sinha and Arjunan, {R. Vijaya} and B. Kishore",
year = "2017",
month = "10",
day = "13",
doi = "10.1109/ICISC.2017.8068729",
language = "English",
booktitle = "Proceedings of the International Conference on Inventive Systems and Control, ICISC 2017",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

Bhowmick, A, Sinha, N, Arjunan, RV & Kishore, B 2017, Permutation-Substitution architecture based image encryption algorithm using middle square and RC4 PRNG. in Proceedings of the International Conference on Inventive Systems and Control, ICISC 2017., 8068729, Institute of Electrical and Electronics Engineers Inc., 2017 International Conference on Inventive Systems and Control, ICISC 2017, Coimbatore, India, 19-01-17. https://doi.org/10.1109/ICISC.2017.8068729

Permutation-Substitution architecture based image encryption algorithm using middle square and RC4 PRNG. / Bhowmick, Anirban; Sinha, Nishith; Arjunan, R. Vijaya; Kishore, B.

Proceedings of the International Conference on Inventive Systems and Control, ICISC 2017. Institute of Electrical and Electronics Engineers Inc., 2017. 8068729.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Permutation-Substitution architecture based image encryption algorithm using middle square and RC4 PRNG

AU - Bhowmick, Anirban

AU - Sinha, Nishith

AU - Arjunan, R. Vijaya

AU - Kishore, B.

PY - 2017/10/13

Y1 - 2017/10/13

N2 - The growing importance of information security over recent years has prompted development of secure encryption algorithms. Most of the traditional algorithms such as AES and DES are computationally intensive. Hence, in this paper we propose a simple but secure symmetric key encryption algorithm. The image encryption approach makes use of two pseudorandom number generators to encrypt images. Middle Square Algorithm is used to swap the columns of the image followed by the swapping of the rows. This permutation step produces the intermediary cipher image. Subsequently, RC4 algorithm is used to produce a stream of pseudo-random numbers. These numbers are used to substitute the intensity of pixels of the intermediary cipher image, which gives the final encrypted image. Various analysis tests are performed on the quality of the encrypted image. The results of these tests prove that the proposed algorithm is secure and efficient.

AB - The growing importance of information security over recent years has prompted development of secure encryption algorithms. Most of the traditional algorithms such as AES and DES are computationally intensive. Hence, in this paper we propose a simple but secure symmetric key encryption algorithm. The image encryption approach makes use of two pseudorandom number generators to encrypt images. Middle Square Algorithm is used to swap the columns of the image followed by the swapping of the rows. This permutation step produces the intermediary cipher image. Subsequently, RC4 algorithm is used to produce a stream of pseudo-random numbers. These numbers are used to substitute the intensity of pixels of the intermediary cipher image, which gives the final encrypted image. Various analysis tests are performed on the quality of the encrypted image. The results of these tests prove that the proposed algorithm is secure and efficient.

UR - http://www.scopus.com/inward/record.url?scp=85037125870&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85037125870&partnerID=8YFLogxK

U2 - 10.1109/ICISC.2017.8068729

DO - 10.1109/ICISC.2017.8068729

M3 - Conference contribution

BT - Proceedings of the International Conference on Inventive Systems and Control, ICISC 2017

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Bhowmick A, Sinha N, Arjunan RV, Kishore B. Permutation-Substitution architecture based image encryption algorithm using middle square and RC4 PRNG. In Proceedings of the International Conference on Inventive Systems and Control, ICISC 2017. Institute of Electrical and Electronics Engineers Inc. 2017. 8068729 https://doi.org/10.1109/ICISC.2017.8068729