S. Janakiraman, P. Roshini, Sundararaman Rajagopalan, K. Thenmozhi, Rengarajan Amirtharajan
{"title":"Permutated Symmetric Key for Perfect Lightweight Image Encryption","authors":"S. Janakiraman, P. Roshini, Sundararaman Rajagopalan, K. Thenmozhi, Rengarajan Amirtharajan","doi":"10.1109/ICDCSYST.2018.8605175","DOIUrl":null,"url":null,"abstract":"Internet advancements and the arrival of new embedded gadgets have radically raised the information sharing in the form of images. In turn, the encryption algorithms have been widely used to secure images. Most of these image encryption algorithms have to run on resource-constrained devices that demand less computational complexity. In this regard, the algorithm proposed in this paper satisfies the need for a computationally less complex image encryption process with its simpler and efficient key generation procedure. The analysis of the implementation results in terms of statistical parameters in addition to its ability to withstand differential attacks validates the security level of the proposed Iightweight image encryption algorithm.","PeriodicalId":175583,"journal":{"name":"2018 4th International Conference on Devices, Circuits and Systems (ICDCS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 4th International Conference on Devices, Circuits and Systems (ICDCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDCSYST.2018.8605175","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Internet advancements and the arrival of new embedded gadgets have radically raised the information sharing in the form of images. In turn, the encryption algorithms have been widely used to secure images. Most of these image encryption algorithms have to run on resource-constrained devices that demand less computational complexity. In this regard, the algorithm proposed in this paper satisfies the need for a computationally less complex image encryption process with its simpler and efficient key generation procedure. The analysis of the implementation results in terms of statistical parameters in addition to its ability to withstand differential attacks validates the security level of the proposed Iightweight image encryption algorithm.