Sepideh Bahri-Laleh, M. Balafar, M. Feizi-Derakhshi
{"title":"一种基于PSO基密钥生成的RGB图像流加密方法","authors":"Sepideh Bahri-Laleh, M. Balafar, M. Feizi-Derakhshi","doi":"10.14257/ijsia.2017.11.9.06","DOIUrl":null,"url":null,"abstract":"This paper introduces a novel approach based on a stream cipher to encrypt RGB images. In this regard, a Particle Swarm Optimization (PSO) based algorithm is used to generate the keystream for encryption. Red, green and blue channels of the RGB image are shown as texts and then a stream cipher is used to encrypt the resultant image. A method named PSO Key Generation Color image Encryption (PKGCE) algorithm uses 3 character code tables for each of the 3 channels of RGB image in order to encode the keys and the plain texts showing correspondent channel of the RGB image. A zigzag operation is done on the resultant image in each of the channels to provide more security in a way that the start point of the zigzag path is dependent on the key and channel size. The main advantages of this algorithm over the previously ones, are less number of keys needed to be stored and distributed and also the appropriate speed of the algorithm. Experimental results and the comparison of the proposed algorithm with other encryption algorithms are discussed in detail.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/ijsia.2017.11.9.06","citationCount":"0","resultStr":"{\"title\":\"A stream cipher method for RGB image encryption using PSO base key generation\",\"authors\":\"Sepideh Bahri-Laleh, M. Balafar, M. Feizi-Derakhshi\",\"doi\":\"10.14257/ijsia.2017.11.9.06\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper introduces a novel approach based on a stream cipher to encrypt RGB images. In this regard, a Particle Swarm Optimization (PSO) based algorithm is used to generate the keystream for encryption. Red, green and blue channels of the RGB image are shown as texts and then a stream cipher is used to encrypt the resultant image. A method named PSO Key Generation Color image Encryption (PKGCE) algorithm uses 3 character code tables for each of the 3 channels of RGB image in order to encode the keys and the plain texts showing correspondent channel of the RGB image. A zigzag operation is done on the resultant image in each of the channels to provide more security in a way that the start point of the zigzag path is dependent on the key and channel size. The main advantages of this algorithm over the previously ones, are less number of keys needed to be stored and distributed and also the appropriate speed of the algorithm. Experimental results and the comparison of the proposed algorithm with other encryption algorithms are discussed in detail.\",\"PeriodicalId\":46187,\"journal\":{\"name\":\"International Journal of Security and Its Applications\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-09-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.14257/ijsia.2017.11.9.06\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Security and Its Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14257/ijsia.2017.11.9.06\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Security and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/ijsia.2017.11.9.06","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A stream cipher method for RGB image encryption using PSO base key generation
This paper introduces a novel approach based on a stream cipher to encrypt RGB images. In this regard, a Particle Swarm Optimization (PSO) based algorithm is used to generate the keystream for encryption. Red, green and blue channels of the RGB image are shown as texts and then a stream cipher is used to encrypt the resultant image. A method named PSO Key Generation Color image Encryption (PKGCE) algorithm uses 3 character code tables for each of the 3 channels of RGB image in order to encode the keys and the plain texts showing correspondent channel of the RGB image. A zigzag operation is done on the resultant image in each of the channels to provide more security in a way that the start point of the zigzag path is dependent on the key and channel size. The main advantages of this algorithm over the previously ones, are less number of keys needed to be stored and distributed and also the appropriate speed of the algorithm. Experimental results and the comparison of the proposed algorithm with other encryption algorithms are discussed in detail.
期刊介绍:
IJSIA aims to facilitate and support research related to security technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security technology and its applications. Journal Topics: -Access Control -Ad Hoc & Sensor Network Security -Applied Cryptography -Authentication and Non-repudiation -Cryptographic Protocols -Denial of Service -E-Commerce Security -Identity and Trust Management -Information Hiding -Insider Threats and Countermeasures -Intrusion Detection & Prevention -Network & Wireless Security -Peer-to-Peer Security -Privacy and Anonymity -Secure installation, generation and operation -Security Analysis Methodologies -Security assurance -Security in Software Outsourcing -Security products or systems -Security technology -Systems and Data Security