Image Encryption Using Meitei Lock Sequence Generated from Hash Functions

Yumnam Kirani Singh

Abstract


Proposed here is a secure image encryption scheme based on generalized Vigenere cipher and Meitei Lock Sequence (MLS) generated from standard hash functions. MLS is a unique random sequence of any length greater than 2 generated from a non-negative array having two or more elements. It is unique in the sense that no two arrays can generate the same sequence however close or similar the two arrays are. In other words, when there is any slight change in any of the input array, the generated MLS’s are drastically different. Also, the length of the sequence can be as infinitely long. These properties make MLS a good key string for a secure encryption scheme. SHA(Secure Hashing Algorithm) or any hash code generator has desirable feature which can be used for generation of MLS. In a hash code generator, it produces unique fixed length sequence from any input string, if there is any slight change in the input, the generated output will be totally different. This feature is made used of  in generating an MLS of any desired length for use in the proposed image  encryption scheme. Experimental results show that the proposed encryption scheme is a secure encryption scheme. The correlation coefficient between the original image and encrypted images are negligibly small indicating that there is no trace of original image information in the encrypted image. Also, the correlation coefficients between the original image and decrypted images with wrong passwords which are close to the encryption password are also negligibly small. These show the tightness of the key system in the encryption scheme.   

Full Text:

PDF

References


Souyah A, Faraoun KM (2016) An image encryption scheme combining chaos-memory cellular automata and weighted histogram. Nonlinear Dyn 86(1):639–653

Norouzi B, Mirzakuchaki S (2017) An image encryption algorithm based on DNA sequence operations and cellular neural network. Multimed Tools Appl 76(11):13681–13701

Xiuli Chai , Yiran Chen, Lucie Broyde (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng Volume 88, pp. 197–213

Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 144:134–144

Li S, Zhao Y, Qu B et al (2013) Image scrambling based on chaotic sequences and veginère cipher. Multimed Tools Appl 66(3):573–588

Zeng L, Liu R, Zhang LY, Liu Y, Wong K-W (2016) Cryptanalyzing an image encryption algorithm based on scrambling and veginere cipher. Multimed Tools Appl 75(10):5439–5453

Niyat AY, Moattar MH, Torshiz MN (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt Lasers Eng 90:225–237

Lala Kirkor, Sami Baba, Thawar Arif, Zayad Shaban, “Image Encryption using DCT and Stream Cipher”, European Journal of Scientific Research, Volume 32.,No. 1, pp. 48-58, 2009.

Wang Y, Zhao Y, Zhou Q, Lin Z (2018) Image encryption using partitioned cellular automata. Neurocomputing 275:1318–1332

Zhang Y (2018) The image encryption algorithm based on chaos and DNA computing. Multimed Tools Appl 77:1–27

Avinsh Kak, “Lecture Note: Hashing for Message Authentication” https://engineering.purdue.edu/kak/compsec/NewLectures/Lecture15.pdf

Y. K. Singh, S.K. Parui, “Simplet and Its application in Signal Encryption”, Multidimensional Systems and Signal Processing, Volume 15, Issue 4, October 2004, pp. 375-394

Y. K. Singh, A Simple, fast and secure Cipher, ARPN Journal of Engineering and Applied Sciences, Volume 6, No. 10, pp. 61-69.

Y. K. Singh, “Generalization of Vigenere Cipher”, ARPN Journal of Engineering and Applied Sciences, Volume 7, no. 1, 2012, pp. 39-44.


Refbacks

  • There are currently no refbacks.


------------------------------------------------------------------------------------------------------------------------

The ADBU Journal of Engineering Technology (AJET)" ISSN:2348-7305

This journal is published under the terms of the Creative Commons Attribution (CC-BY) (http://creativecommons.org/licenses/)

Number of Visitors to this Journal: